Invisible backdoor attacks against deep neural networks S Li, BZH Zhao, J Yu, M Xue, D Kaafar, H Zhu arXiv preprint arXiv:1909.02742, 2019 | 23 | 2019 |
Touch and you’re trapp (ck) ed: Quantifying the uniqueness of touch gestures for tracking R Masood, BZH Zhao, HJ Asghar, MA Kaafar Proceedings on Privacy Enhancing Technologies 2018 (2), 122-142, 2018 | 9 | 2018 |
Invisible backdoor attacks on deep neural networks via steganography and regularization S Li, M Xue, B Zhao, H Zhu, X Zhang IEEE Transactions on Dependable and Secure Computing, 2020 | 8 | 2020 |
A decade of mal-activity reporting: A retrospective analysis of internet malicious activity blacklists BZH Zhao, M Ikram, HJ Asghar, MA Kaafar, A Chaabane, K Thilakarathna Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 8 | 2019 |
On inferring training data attributes in machine learning models BZH Zhao, HJ Asghar, R Bhaskar, MA Kaafar arXiv preprint arXiv:1908.10558, 2019 | 4 | 2019 |
BehavioCog: An observation resistant authentication scheme J Chauhan, BZH Zhao, HJ Asghar, J Chan, MA Kaafar International Conference on Financial Cryptography and Data Security, 39-58, 2017 | 4 | 2017 |
Deep Learning Backdoors S Li, S Ma, M Xue, BZH Zhao arXiv preprint arXiv:2007.08273, 2020 | 3 | 2020 |
The audio auditor: Participant-level membership inference in voice-based IoT Y Miao, BZH Zhao, M Xue, C Chen, L Pan, J Zhang, D Kaafar, Y Xiang CCS Workshop of Privacy Preserving Machine Learning, 2019 | 3 | 2019 |
On the Resilience of Biometric Authentication Systems against Random Inputs BZH Zhao, HJ Asghar, MA Kaafar Network and Distributed System Security Symposium 2020, 2020 | 2 | 2020 |
POSTER: TouchTrack: How Unique are your Touch Gestures? R Masood, BZH Zhao, HJ Asghar, MA Kâafar Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 2 | 2017 |
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning BZH Zhao, MA Kaafar, N Kourtellis Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security …, 2020 | 1 | 2020 |
Oriole: Thwarting Privacy against Trustworthy Deep Learning Models L Chen, H Wang, BZH Zhao, M Xue, H Qian arXiv preprint arXiv:2102.11502, 2021 | | 2021 |
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services Y Miao, M Xue, C Chen, L Pan, J Zhang, BZH Zhao, D Kaafar, Y Xiang Proceedings on Privacy Enhancing Technologies 2021 (1), 209-228, 2021 | | 2021 |
PALOR: Poisoning Attacks Against Logistic Regression J Wen, BZH Zhao, M Xue, H Qian Australasian Conference on Information Security and Privacy, 447-460, 2020 | | 2020 |
Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes BZH Zhao, HJ Asghar, MA Kaafar, F Trevisan, H Yuan ACM Transactions on Privacy and Security (TOPS) 24 (1), 1-33, 2020 | | 2020 |
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Online Regression Models J Wen, BZH Zhao, M Xue, H Qian arXiv preprint arXiv:2006.11928, 2020 | | 2020 |