Benjamin Zi Hao Zhao
Benjamin Zi Hao Zhao
UNSW, Data61 CSIRO
Verified email at data61.csiro.au
Title
Cited by
Cited by
Year
Invisible backdoor attacks against deep neural networks
S Li, BZH Zhao, J Yu, M Xue, D Kaafar, H Zhu
arXiv preprint arXiv:1909.02742, 2019
232019
Touch and you’re trapp (ck) ed: Quantifying the uniqueness of touch gestures for tracking
R Masood, BZH Zhao, HJ Asghar, MA Kaafar
Proceedings on Privacy Enhancing Technologies 2018 (2), 122-142, 2018
92018
Invisible backdoor attacks on deep neural networks via steganography and regularization
S Li, M Xue, B Zhao, H Zhu, X Zhang
IEEE Transactions on Dependable and Secure Computing, 2020
82020
A decade of mal-activity reporting: A retrospective analysis of internet malicious activity blacklists
BZH Zhao, M Ikram, HJ Asghar, MA Kaafar, A Chaabane, K Thilakarathna
Proceedings of the 2019 ACM Asia Conference on Computer and Communications†…, 2019
82019
On inferring training data attributes in machine learning models
BZH Zhao, HJ Asghar, R Bhaskar, MA Kaafar
arXiv preprint arXiv:1908.10558, 2019
42019
BehavioCog: An observation resistant authentication scheme
J Chauhan, BZH Zhao, HJ Asghar, J Chan, MA Kaafar
International Conference on Financial Cryptography and Data Security, 39-58, 2017
42017
Deep Learning Backdoors
S Li, S Ma, M Xue, BZH Zhao
arXiv preprint arXiv:2007.08273, 2020
32020
The audio auditor: Participant-level membership inference in voice-based IoT
Y Miao, BZH Zhao, M Xue, C Chen, L Pan, J Zhang, D Kaafar, Y Xiang
CCS Workshop of Privacy Preserving Machine Learning, 2019
32019
On the Resilience of Biometric Authentication Systems against Random Inputs
BZH Zhao, HJ Asghar, MA Kaafar
Network and Distributed System Security Symposium 2020, 2020
22020
POSTER: TouchTrack: How Unique are your Touch Gestures?
R Masood, BZH Zhao, HJ Asghar, MA K‚afar
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications†…, 2017
22017
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning
BZH Zhao, MA Kaafar, N Kourtellis
Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security†…, 2020
12020
Oriole: Thwarting Privacy against Trustworthy Deep Learning Models
L Chen, H Wang, BZH Zhao, M Xue, H Qian
arXiv preprint arXiv:2102.11502, 2021
2021
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services
Y Miao, M Xue, C Chen, L Pan, J Zhang, BZH Zhao, D Kaafar, Y Xiang
Proceedings on Privacy Enhancing Technologies 2021 (1), 209-228, 2021
2021
PALOR: Poisoning Attacks Against Logistic Regression
J Wen, BZH Zhao, M Xue, H Qian
Australasian Conference on Information Security and Privacy, 447-460, 2020
2020
Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes
BZH Zhao, HJ Asghar, MA Kaafar, F Trevisan, H Yuan
ACM Transactions on Privacy and Security (TOPS) 24 (1), 1-33, 2020
2020
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Online Regression Models
J Wen, BZH Zhao, M Xue, H Qian
arXiv preprint arXiv:2006.11928, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–16