Publications

       
The documents listed below have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

The Bibtex file for all papers is here.

Citations: 36000+ (GoogleScholar), i10-Index: 172, H-index: 77.

Selected Recent Publications (last 2-3 years):

Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models, IEEE S&P, 2024
Towards Scalable and Robust Model Versioning, SaTML, 2024
Can Virtual Reality Protect Users from Keystroke Inference Attacks?, USENIX Security, 2024
Data Isotopes for Data Provenance in DNNs, PETS, 2024
Characterizing the Optimal 0−1 Loss for Multi-class Classification with a Test-time Attacker, NeurIPS, 2023 (Spotlight)
Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models, USENIX Security, 2023 (Internet Defense Prize)
"My face, my rules": Enabling Personalized Protection against Unacceptable Face Editing, PETS, 2023
Towards a General Video-based Keystroke Inference Attack, USENIX Security, 2023
SoK: Anti-Facial Recognition Technology, IEEE S&P, 2023
Finding Naturally-Occuring Physical Backdoors in Image Datasets, NeurIPS, 2022
Understanding Robust Learning through the Lens of Representation Similarities, NeurIPS, 2022
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models, CCS, 2022
Poison Forensics: Traceback of Targeted Data Poisoning Attacks in Neural Networks, USENIX Security, 2022
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks, USENIX Security, 2022
"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World, CCS, 2021
Backdoor Attacks Against Deep Learning Systems in the Physical World, CVPR, 2021
User Authentication via Electrical Muscle Stimulation, ACM CHI, 2021
Gotta Catch 'em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks, ACM CCS, 2020
Fawkes: Protecting Privacy against Unauthorized Deep Learning Models, USENIX Security, 2020
Wearable Microphone Jamming, (Best paper honorable mention) ACM CHI 2020.
Detecting Gender Stereotypes: Lexicon vs Supervised Learning Methods, (Best paper honorable mention) ACM CHI 2020.
Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors, NDSS, 2020
Latent Backdoor Attacks on Deep Neural Networks, ACM CCS, 2019
Safely and Automatically Updating In-Network ACL Configurations with Intent Language, ACM SIGCOMM, 2019.
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks, IEEE S&P, 2019.

Refereed Papers:

        denotes co-first authors with equal contribution.


2024

USENIX Security
2024
Can Virtual Reality Protect Users from Keystroke Inference Attacks?
Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, Haitao Zheng
To Appear: Proceedings of USENIX Security Symposium,
Philadelphia PA, August 2024.
New Scientist article
IEEE S&P
2024
Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models
Shawn Shan, Wenxin Ding, Josephine Passananti, Stanley Wu, Haitao Zheng, Ben Y. Zhao
To Appear: Proceedings of 45th IEEE Symposium on Security and Privacy,
San Francisco CA, May 2024.
IEEE SaTML
2024
Towards Scalable and Robust Model Versioning
Wenxin Ding, Arjun Nitin Bhagoji, Ben Y. Zhao, Haitao Zheng
To Appear: Proceedings of IEEE Conference on Secure and Trustworthy Machine Learning (SaTML),
Toronto Canada, April 2024.
PETS
2024
Data Isotopes for Data Provenance in DNNs
Emily Wenger, Xiuyu Li, Ben Y. Zhao, and Vitaly Shmatikov
To Appear: Proceedings of Privacy Enhancing Technologies Symposium (PETS),
Bristol UK, July 2024.
[Abstract, Paper PDF, Code ]

2023

NeurIPS
2023
Characterizing the Optimal 0−1 Loss for Multi-class Classification with a Test-time Attacker
Sihui Dai, Wenxin Ding, Arjun Nitin Bhagoji, Daniel Cullina, Haitao Zheng, Ben Y. Zhao, Prateek Mittal
Proceedings of 37th Conference on Neural Information Processing Systems (NeurIPS),
New Orleans, December 2023.
Spotlight Paper
[Abstract, Paper: PDF ]
USENIX Security
2023
Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models
Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao
Proceedings of USENIX Security Symposium,
Anaheim CA, August 2023.
Winner: Distinguished Paper Award
Winner: USENIX Internet Defense Prize

[Abstract, Project/software, Paper: PDF (3.4MB)]
USENIX Security
2023
Towards a General Video-based Keystroke Inference Attack
Zhuolin Yang, Yuxin Chen, Zain Sarwar, Hadleigh Schwartz, Ben Y. Zhao, Haitao Zheng
Proceedings of USENIX Security Symposium,
Anaheim CA, August 2023.
[Abstract, Website, Paper: PDF (3.4MB)]
PETS
2023
"My face, my rules": Enabling Personalized Protection against Unacceptable Face Editing
Zhujun Xiao, Jenna Cryan, Yuanshun Yao, Yi Hong Gordon Cheo, Yuanchao Shu, Stefan Saroiu, Ben Y. Zhao, Haitao Zheng
Proceedings of Privacy Enhancing Technologies Symposium (PETS),
Lausanne, Switzerland, July 2023.
[Abstract, Paper: PDF (4MB)]
IEEE S&P
2023
SoK: Anti-Facial Recognition Technology
Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao
Proceedings of IEEE Symposium on Security and Privacy (Oakland),
San Francisco CA, May 2023.
[Abstract, Paper: PDF (901KB)]

2022

NeurIPS
2022
Finding Naturally-Occuring Physical Backdoors in Image Datasets
Emily Wenger, Roma Bhattacharjee, Arjun Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao
Proceedings of 36th Conference on Neural Information Processing Systems (NeurIPS),
New Orleans LA, December 2022.
[Abstract, Paper: PDF (1.8MB)]
NeurIPS
2022
Understanding Robust Learning through the Lens of Representation Similarities
Christian Cianfarani, Arjun Nitin Bhagoji, Vikash Sehwag, Ben Y. Zhao, Prateek Mittal, Haitao Zheng
Proceedings of 36th Conference on Neural Information Processing Systems (NeurIPS),
New Orleans LA, December 2022.
[Paper: PDF (1.8MB)]
CCS
2022
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models
Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao
Proceedings of ACM Conference on Computer and Communications Security (CCS),
Los Angeles, CA, November 2022.
[Abstract, Paper: PDF (524KB)]
USENIX
Security
2022
Poison Forensics: Traceback of Targeted Data Poisoning Attacks in Neural Networks
Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao
Proceedings of USENIX Security Symposium,
Boston, MA, August 2022.
[Abstract, Website, Code, Paper: PDF (610KB)]
USENIX
Security
2022
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks
Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao
Proceedings of USENIX Security Symposium,
Boston, MA, August 2022.
[Abstract, Website, Paper: PDF (1.5MB)]

2021

CCS
2021
"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng,
and Ben Y. Zhao
Proceedings of ACM Conference on Computer and Communications Security (CCS),
Seoul, South Korea, November 2021.
[Abstract, Paper: PDF (632KB)]
AISec
2021
Patch-based Defenses against Web Fingerprinting Attacks
Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, and Ben Y. Zhao
Proceedings of 14th ACM Workshop on Artificial Intelligence and Security (AISec),
Seoul, South Korea, November 2021.
[Paper: PDF (720KB)]
TMC
2021
Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions
Qinge Xie, Qingyuan Gong, Xinlei He, Yang Chen, Xin Wang, Haitao Zheng, Ben Y. Zhao
IEEE Transactions on Mobile Computing, 2021.
[Paper: PDF (7.6MB)]
IEEE
TNSM
2021
On Migratory Behavior in Video Consumption
Huan Yan, Haohao Fu, Yong Li, Tzu-Heng Lin, Gang Wang, Haitao Zheng, Depeng Jin, Ben Y. Zhao
IEEE Transactions on Network and Service Management, Vol 18, No 2, Pgs 1775-1788, 2021.
[Paper: PDF (2MB)]
SEC
2021
Towards Performance Clarity of Edge Video Analytics
Zhujun Xiao, Zhengxu Xia, Haitao Zheng, Ben Y. Zhao, Junchen Jiang
Proceedings of ACM/IEEE Symposium on Edge Computing (SEC),
San Jose, December 2021.
[Paper: PDF (1.3MB)]
CVPR
2021
Backdoor Attacks Against Deep Learning Systems in the Physical World
Emily Wenger, Josephine Passananti, Arjun Nitin Bhagoji, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao
Proceedings of IEEE Computer Vision and Pattern Recognition (CVPR), June 2021.
[Abstract, Paper: PDF (1.7MB)]
CHI
2021
User Authentication via Electrical Muscle Stimulation
Yuxin Chen, Zhuolin Yang, Ruben Abbou, Pedro Lopes, Ben Y. Zhao, Haitao Zheng
Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI),
Yokohama Japan, April 2021.
[Project Homepage, Youtube Video, Paper: PDF (4.8MB)]

2020

CCS
2020
Gotta Catch 'em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks
Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao
Proceedings of ACM Conference on Computer and Communications Security (CCS),
Orlando, FL, November 2020.
[Abstract, Paper: PDF (806KB)]
CIKM
2020

Deep Graph Convolution Networks for Incident-driven Traffic Speed Prediction
Qinge Xie, Tiancheng Guo, Yang Chen, Yu Xiao, Xin Wang, Ben Y. Zhao
Proceedings of the 29th ACM International Conference on Information and Knowledge Management (CIKM),
Galway Ireland, October 2020.
[Abstract, Paper: PDF (2.8MB)]
USENIX Security
2020

Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao
Proceedings of USENIX Security Symposium (USENIX Security),
Boston, MA, August 2020.
Project webpage for downloads & source code.
[Abstract, Paper: PDF (946KB)]
CHI
2020

Detecting Gender Stereotypes: Lexicon vs. Supervised Learning Methods
Jenna Cryan, Shiliang Tang, Xinyi Zhang, Miriam Metzger, Haitao Zheng, Ben Y. Zhao
Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI),
Honolulu, HI, April 2020.
Best paper honorable mention award.
[Abstract, Paper: PDF (1.3MB)]
CHI
2020
Wearable Microphone Jamming
Yuxin Chen, Huiying Li, Shan-Yuan Teng, Steven Nagels, Zhijing Li, Pedro Lopes, Ben Y. Zhao, Haitao Zheng
Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI),
Honolulu, HI, April 2020.
Best paper honorable mention award.
[Abstract, Paper: PDF (1.2MB)]
[Two-minute demo video (30MB)]
NYTimes Article, More Press: UK, India, France, Brazil, Russia, Latvia, Mexico, Germany, China, and more
NDSS
2020
Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors
Yanzi Zhu, Zhujun Xiao, Yuxin Chen, Zhijing Li, Max Liu, Ben Y. Zhao, Haitao Zheng
Proceedings of Network and Distributed System Security Symposium (NDSS),
San Diego, CA, February 2020.
[Abstract, Paper: PDF (684KB)]


2019

CCS
2019
Latent Backdoor Attacks on Deep Neural Networks
Yuanshun Yao, Huiying Li, Haitao Zheng, Ben Y. Zhao
Proceedings of ACM Conference on Computer and Communications Security (CCS),
London UK, November 2019.
[Abstract, Paper: PDF (2.9MB)]
SIGCOMM
2019
Safely and Automatically Updating In-Network ACL Configurations with Intent Language
Bingchuan Tian, Xinyi Zhang, Ennan Zhai, Hongqiang Harry Liu, Qiaobo Ye, Chunsheng Wang, Xin Wu, Zhiming Ji, Yihong Sang, Ming Zhang, Da Yu, Chen Tian, Haitao Zheng, Ben Y. Zhao
Proceedings of ACM SIGCOMM,
Beijing, China, August 2019.
[Abstract, Paper: PDF (1.1MB)]
MobiHoc
2019
Scaling Deep Learning Models for Spectrum Anomaly Detection
Zhijing Li, Zhujun Xiao, Bolun Wang, Ben. Y. Zhao and Haitao Zheng
Proceedings of 20th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc),
Catania, Italy, July 2019.
[Abstract, Paper: PDF (1.05MB)]
IEEE S&P
2019
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks
Bolun Wang, Yuanshun Yao, Shawn Shan, Huiying Li, Bimal Viswanath, Haitao Zheng and Ben Y. Zhao
Proceedings of 40th IEEE Symposium on Security and Privacy (Oakland),
San Francisco CA, May 2019.
[Abstract, Paper: PDF (639KB)]
HICSS
2019

Towards Understanding the Adoption and Social Experience of Digital Wallet Systems
Shiliang Tang, Ziming Wu, Xinyi Zhang, Gang Wang, Xiaojuan Ma, Haitao Zheng and Ben Y. Zhao
Proceedings of Hawaii International Conference on System Sciences,
Maui HI, January 2019.
[Paper: PDF (266KB)]

2018

IMC
2018
Predictive Analysis in Network Function Virtualization
Zhijing Li, Zihui Ge, Ajay Mahimkar, Jia Wang, Ben Y. Zhao, Haitao Zheng, Joanne Emmons, and Laura Ogden
Proceedings of 18th ACM SIGCOMM Internet Measurement Conference (IMC),
Boston MA, November 2018.
[Abstract, Paper: PDF (231KB)]
CSCW
2018
Understanding Motivations behind Inaccurate Check-ins
Fengli Xu, Guozhen Zhang, Jiaxin Huang, Yong Li, Diyi Yang, Ben Y. Zhao, and Fanchao Meng
Proceedings of 21st ACM conference on Computer-Supported Cooperative Work and Social Computing (CSCW),
Jersey City, NJ, November 2018.
[Abstract, Paper: PDF (2.6MB)]
CSCW
2018
Gender Bias in the Job Market: a Longitudinal Analysis
Shiliang Tang, Xinyi Zhang, Jenna Cryan, Miriam Metzger, Haitao Zheng and Ben Y. Zhao
Proceedings of 21st ACM conference on Computer-Supported Cooperative Work and Social Computing (CSCW),
Jersey City, NJ, November 2018.
[Abstract, Paper: PDF (739KB)]
USENIX
Security
2018
With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning
Bolun Wang, Yuanshun Yao, Bimal Viswanath, Haitao Zheng and Ben Y. Zhao
Proceedings of 27th USENIX Security Symposium,
Baltimore, MD, August 2018.
[Abstract, Paper: PDF (3MB)]
ACM/IEEE
TON
2018
Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services
Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng and Ben Y. Zhao
ACM/IEEE Transactions on Networking, Vol. 26, No. 3, Pgs. 1123-1136, June 2018.
[Abstract, Paper: PDF (2.2MB)]
HyperText
2018
Penny Auctions are Predictable: Predicting and profiling user behavior on DealDash
Xinyi Zhang, Shawn Shan, Shiliang Tang, Haitao Zheng and Ben Y. Zhao
Proceedings of ACM Conference on Hypertext and Social Media (HT),
Baltimore, MD, July 2018.
[Paper: PDF (823KB)]
ICWSM
2018
DeepCredit: Clickstream-based model for loan Risk Prediction in P2P Lending
Zhi Yang, Yusi Zhang, Binghui Guo, Ben Y. Zhao and Yafei Dai
Proceedings of International AAAI Conference on Web and Social Media (ICWSM),
Stanford, CA, June 2018.
[Paper: PDF (750KB)]
JCMC
2018
Benefits of Browsing? The Prevalence, Nature, and Effects of Profile Consumption Behavior in Social Network Sites
Miriam Metzger, Christo Wilson and Ben Y. Zhao
Journal of Computer-Mediated Communication, Vol. 23, No. 2, Pgs. 72-89 March 2018.
[Abstract, Paper: PDF (429 KB)]
HotMobile
2018
Adversarial Localization against Wireless Cameras
Zhijing Li, Zhujun Xiao, Yanzi Zhu, Irene Pattarachanyakul, Ben Y. Zhao, Haitao Zheng
Proceedings of 19th International Workshop on Mobile Computing Systems and Applications (HotMobile),
Tempe AZ, February 2018.
[Paper: PDF (1.5MB)]

2017

CIKM
2017
On Migratory Behavior in Video Consumption
Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin and Ben Zhao
Proceedings of ACM International Conference on Information and Knowledge Management (CIKM),
Singapore, November 2017.
[Paper: PDF (996KB)]
IMC
2017
Complexity vs. Performance: Empirical Analysis of Machine Learning as a Service
Yuanshun Yao, Zhujun Xiao, Bolun Wang, Bimal Viswanath, Haitao Zheng and Ben Y. Zhao
Proceedings of the 17th ACM SIGCOMM Internet Measurement Conference (IMC),
London, UK, November 2017.
[Abstract, Paper: PDF (2MB)]
CCS
2017
Automated Crowdturfing Attacks and Defenses in Online Review Systems
Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng and Ben Y. Zhao
Proceedings of ACM Conference on Computer and Communications Security (CCS),
Dallas, TX, October 2017.
[Abstract, Paper: PDF (2MB)]
FOCI
2017
SecurePost: Verified Group-Anonymity on Social Media
Michael Nekrasov, Daniel Iland, Miriam Metzger, Ben Zhao and Elizabeth Belding
Proceedings of 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI),
Vancouver, Canada, August 2017.
[Paper: PDF (611KB)]
MobiSys
2017
Object Recognition and Navigation using a Single Networking Device
Yanzi Zhu, Yuanshun Yao, Ben Y. Zhao and Haitao Zheng
Proceedings of 15th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys),
Niagara Falls, NY, June 2017.
[Abstract, Paper: PDF (1.34MB)]
ACM
TWeb
2017
Clickstream User Behavior Models
Gang Wang, Xinyi Zhang, Shiliang Tang, Christo Wilson, Haitao Zheng, and Ben Y. Zhao
ACM Transactions on the Web (TWEB), Vol. 11, Issue 4, #21, July 2017.
[Abstract, Paper: PDF (2.7MB)]
ICWSM
2017
Echo Chambers in Investment Discussion Boards
Shiliang Tang, Qingyun Liu, Megan McQueen, Scott Counts, Apurv Jain, Haitao Zheng, and Ben Y. Zhao
Proceedings of International AAAI Conference on Web and Social Media (ICWSM),
Montreal, Canada, May 2017.
[Abstract, Paper: PDF (412KB)]
ICWSM
2017
Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System
Xinyi Zhang, Shiliang Tang, Yun Zhao, Gang Wang, Haitao Zheng, and Ben Y. Zhao
Proceedings of International AAAI Conference on Web and Social Media (ICWSM),
Montreal, Canada, May 2017.
[Abstract, Paper: PDF (272KB)]
ICWSM
2017
A First Look at User Switching Behaviors Over Multiple Video Content Providers
Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao
Proceedings of International AAAI Conference on Web and Social Media (ICWSM),
Montreal, Canada, May 2017.
Paper: PDF (713KB)
ICA
2017
Passive Social Interaction in Social Networking Sites
Miriam Metzger, Christo Wilson, Ben Y. Zhao
Proceedings of the 67th Annual International Communication Association Conference (ICA),
San Diego, CA, May 2017.
ACM
TWeb
2017
Value and Misinformation in Collaborative Investing Platforms
Tianyi Wang, Gang Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Xing Li, Haitao Zheng and Ben Y. Zhao
ACM Transactions on the Web (TWEB), Vol. 11, No. 2, May 2017.
[Abstract, Paper: PDF (1.5MB)]
WWW
2017
Identifying Value in Crowdsourced Wireless Signal Measurements
Zhijing Li, Ana Nika, Xinyi Zhang, Yanzi Zhu, Yuanshun Yao, Ben Y. Zhao and Haitao Zheng
Proceedings of the 26th World Wide Web Conference (WWW),
Perth, Australia, April 2017.
[Abstract, Paper: PDF (266KB)]
IEEE
TCCN
2017
Towards Practical Spectrum Permits
Ana Nika, Zengbin Zhang, Ben Y. Zhao and Haitao Zheng
IEEE Transactions on Cognitive Communications and Networking (TCCN), Vol. 3, No. 1, Pgs. 1-11, March 2017.
[Abstract, Paper: PDF (945KB)]


2016
HotNets
2016
Trimming the Smartphone Network Stack
Yanzi Zhu, Yibo Zhu, Ana Nika, Ben Y. Zhao, Haitao Zheng
Proceedings of the 15th ACM Workshop on Hot Topics in Networks (HotNets)
Atlanta, GA, November 2016.
[Abstract, Paper: PDF (200KB)]
ACM
TOMPECS
2016
Self-similarity in Social Network Dynamics
Qingyun Liu, Xiaohan Zhao, Walter Willinger, Xiao Wang, Ben Y. Zhao and Haitao Zheng
ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS), Vol. 2, No. 5, Pgs. 1-26, November 2016.
[Abstract, Paper: PDF (1.9MB)]
IMC
2016
Network Growth and Link Prediction Through an Empirical Lens
Qingyun Liu, Shiliang Tang, Xinyi Zhang, Xiaohan Zhao, Ben Y. Zhao and Haitao Zheng
Proceedings of the 16th ACM SIGCOMM Internet Measurement Conference (IMC),
Santa Monica, CA, November 2016.
[Abstract, Paper: PDF (350KB)]
IMC
2016
Anatomy of a Personalized Livestreaming System
Bolun Wang, Xinyi Zhang, Gang Wang, Haitao Zheng, Ben Y. Zhao.
Proceedings of the 16th ACM SIGCOMM Internet Measurement Conference (IMC),
Santa Monica, CA, November 2016.
[Abstract, Paper: PDF (1.3MB)]
SenSys
2016
Empirical Validation of Commodity Spectrum Monitoring
Ana Nika, Zhijing Li, Yanzi Zhu, Yibo Zhu, Ben Y. Zhao, Xia Zhou, and Haitao Zheng
Proceedings of ACM Conference on Embedded Networked Sensor Systems (SenSys)
Stanford, CA, November 2016.
[Abstract, Paper: PDF (3.8MB)]
IWQoS
2016
On the Performance of Cloud Storage Applications with Global Measurement
Guangyuan Wu, Fangming Liu, Haowen Tang, Keke Huang, Qixia Zhang, Zhenhua Li, Ben Y. Zhao, Hai Jin
Proceedings of ACM/IEEE International Symposium on Quality of Service (IWQoS)
Beijing, China, June 2016.
[Paper: PDF (315KB)]
ICWSM
2016
"Will Check-in for Badges": Understanding Bias and Misbehavior on Location-based Social Networks
Gang Wang, Sarita Y. Schoenebeck, Haitao Zheng, Ben Y. Zhao
Proceedings of 10th International AAAI Conference on Web and Social Media (ICWSM)
Cologne, Germany, May 2016.
[Abstract, Paper: PDF (183KB)]
MobiSys
2016
Defending against Sybil Devices in Crowdsourced Mapping Services
Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao
Proceedings of 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
Singapore, June 2016.
[Abstract, Paper: PDF (1.8MB)]
FCS
2016
The Power of Comments: Fostering Social Interactions in Microblog Networks
Tianyi Wang, Yang Chen, Yi Wang, Bolun Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao
Frontiers of Computer Science, Vol. 10, No. 5, Pgs. 889-907, 2016
[Paper: PDF (1.08MB)]
CHI
2016
Unsupervised Clickstream Clustering For User Behavior Analysis
Gang Wang, Xinyi Zhang, Shiliang Tang, Haitao Zheng, Ben Y. Zhao
Proceedings of SIGCHI Conference on Human Factors in Computing Systems (CHI)
San Jose, CA May 2016.
[Abstract, Paper: PDF (1.09MB)]
NSDI
2016
Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard
Zhenhua Li, Weiwei Wang, Tianyin Xu, Xin Zhong, Xiang-Yang Li, Yunhao Liu, Christo Wilson, Ben Y. Zhao
Proceedings of 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI)
Santa Clara, CA March 2016.
[Abstract, Paper: PDF (1.4MB)]
MONET
2016
Understanding and Predicting Data Hotspots in Cellular Networks
Ana Nika, Asad Ismail, Ben Y. Zhao, Sabrina Gaito, Gian Paolo Rossi, Haitao Zheng,
Mobile Networks and Applications, Vol. 21, No. 3, Pg. 402-413, June 2016.

2015
COSN
2015
Towards Graph Watermarks
Xiaohan Zhao, Qingyun Liu, Haitao Zheng, and Ben Y. Zhao.
Proceedings of 3rd ACM Conference in Online Social Networks (COSN)
Stanford, CA, November 2015.
[Abstract, Paper: PDF (750KB)]
COSN
2015
Process-driven Analysis of Dynamics in Online Social Interactions
Zhi Yang, Jilong Xue, Christo Wilson, Ben Y. Zhao and Yafei Dai.
Proceedings of 3rd ACM Conference in Online Social Networks (COSN)
Stanford, CA, November 2015.
[Paper: PDF (835KB)]
Mobicom
2015
Reusing 60GHz Radios for Mobile Radar Imaging
Yanzi Zhu, Yibo Zhu, Ben Y. Zhao and Haitao Zheng.
Proceedings of 21st Annual International Conference on Mobile Computing and Networking (MobiCom)
Paris, France, September 2015.
[Abstract, Paper: PDF (877KB)]
SIGCOMM
2015
Packet-Level Telemetry in Large Datacenter Networks
Yibo Zhu, Nanxi Kang, Jiaxin Cao, Albert Greenberg, Guohan Lu, Ratul Mahajan, Dave Maltz, Lihua Yuan, Ming Zhang, Ben Y. Zhao and Haitao Zheng.
Proceedings of ACM SIGCOMM
London, UK, August 2015.
[Abstract, Paper: PDF (476KB)]
ICWSM
2015
Uncovering User Interaction Dynamics in Online Social Networks
Zhi Yang, Jilong Xue, Christo Wilson, Ben Y. Zhao, and Yafei Dai.
Proceedings of International AAAI Conference on Weblogs and Social Media (ICWSM)
Oxford, UK, May 2015.
[Abstract, Paper: PDF (2MB)]
WWW
2015
Energy and Performance of Smartphone Radio Bundling in Outdoor Environments
Ana Nika, Yibo Zhu, Ning Ding, Abhilash Jindal, Y. Charlie Hu, Xia Zhou, Ben Y. Zhao and Haitao Zheng
Proceedings of 24th International World Wide Web Conference (WWW)
Florence, Italy, May 2015.
[Abstract, Paper: PDF (572KB)]
HotMobile
2015
60GHz Mobile Imaging Radar
Yibo Zhu, Yanzi Zhu, Zengbin Zhang, Ben Y. Zhao, Haitao Zheng
Proceedings of 16th Workshop on Mobile Computing Systems and Applications (HotMobile)
Santa Fe, NM, February 2015.
[Abstract, Paper: PDF (549KB)]
CSCW
2015
Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms
Gang Wang, Tianyi Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Haitao Zheng, Ben Y. Zhao
Proceedings of 18th ACM conference on Computer-Supported Cooperative Work and Social Computing (CSCW)
Vancouver, Canada, March 2015.
[Abstract, Paper: PDF (537KB)]
ACM/IEEE
ToN
2015
Practical Conflict Graphs in the Wild
Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao and Haitao Zheng
ACM Transactions on Networking (TON), Vol. 23, No. 3, Pgs 824-835, June 2015.
[Abstract, Paper: PDF (1.7MB)]

2014
IMC
2014

Whispers in the Dark: Analysis of an Anonymous Social Network
Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao
Proceedings of the 14th ACM SIGCOMM Internet Measurement Conference (IMC)
Vancouver, Canada, November 2014.
[Abstract, Paper: PDF (337KB)]
HotWireless
2014

Towards Commoditized Real-time Spectrum Monitoring
Ana Nika, Zengbin Zhang, Xia Zhou, Ben Y. Zhao, Haitao Zheng
Proceedings of First ACM Workshop on Hot Topics in Wireless (HotWireless)
Maui, HI, September 2014.
[Abstract, Paper: PDF (237KB)]
Mobicom
2014

Cutting the Cord: A Robust Wireless Facilities Network for Data Centers
Yibo Zhu, Xia Zhou, Zengbin Zhang, Lin Zhou, Amin Vahdat, Ben Y. Zhao, Haitao Zheng
Proceedings of 20th Annual International Conference on Mobile Computing and Networking (MobiCom)
Maui, HI, September 2014.
[Abstract, Paper: PDF (614KB)]
Mobicom
2014

Demystifying 60GHz Outdoor Picocells
Yibo Zhu, Zengbin Zhang, Zhinous Marzi, Chris Nelson, Upamanyu Madhow, Ben Y. Zhao, Haitao Zheng
Proceedings of 20th Annual International Conference on Mobile Computing and Networking (MobiCom)
Maui, HI, September 2014.
[Abstract, Paper: PDF (975KB)]
QShine
2014

Understanding Data Hotspots in Cellular Networks
Ana Nika, Asad Ismail, Ben Y. Zhao, Sabrina Gaito, Haitao Zheng
Proceedings of 10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine)
Rhodes, Greece, August 2014.
[Paper: PDF (613KB)]
USENIX
Security
2014

Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers
Gang Wang, Tianyi Wang, Haitao Zheng, and Ben Y. Zhao
Proceedings of 23rd USENIX Security Symposium (Usenix Security)
San Diego, CA, August 2014.
[Abstract, Paper: PDF (595KB)]
ICWSM
2014

Link and Triadic Closure Delay: Temporal Metrics for Social Network Dynamics
Matteo Zignani, Sabrina Gaito, Gian Paolo Rossi, Xiaohan Zhao, Haitao Zheng, Ben Y. Zhao
Proceedings of 8th AAAI International Conference on Weblogs and Social Media (ICWSM).
Ann Arbor, MI, June 2014.
[Abstract, Paper: PDF (1.2MB)]
TKDD
2014

Uncovering Social Network Sybils in the Wild
Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y. Zhao and Yafei Dai
ACM Transactions on Knowledge Discovery from Data (TKDD), Vol. 8, No. 1, Pgs. 1-29, February 2014.
[Abstract, Paper: PDF (1.5MB)]
IEEE
TMC
2014

Preserving Location Privacy in Geo-Social Applications
Krishna P. N. Puttaswamy, Shiyuan Wang, Troy Steinbauer, Divyakant Agrawal, Amr El Abbadi, Christopher Kruegel and Ben Y. Zhao
IEEE Transactions on Mobile Computing, Vol. 13, No. 1, Pgs 159-173, January 2014.
[Abstract, Paper: PDF (1.07 MB)]


2013
HotNets
2013

On the Validity of Geosocial Mobility Traces
Zengbin Zhang, Lin Zhou, Xiaohan Zhao, Gang Wang, Yu Su, Miriam Metzger, Haitao Zheng and Ben Y. Zhao
Proceedings of ACM Workshop on Hot Topics in Networks (HotNets-XII).
College Park, MD, November, 2013.
[Abstract, Paper: PDF (362KB)]
VLDB
2014

On the Embeddability of Random Walk Distances
Xiaohan Zhao, Adelbert Chang, Atish Das Sarma, Haitao Zheng and Ben Y. Zhao
Proceedings of the VLDB Endowment, Vol. 6, No. 14, Pgs. 1690-1701, September 2013.
Presentation at the 40th International Conference on Very Large Data Bases (VLDB/PVLDB),
Hangzhou, China, September, 2014.
[Abstract, Paper: PDF (490KB)]
ACM
TWeb
2013

Understanding Latent Interactions in Online Social Networks
Jing Jiang, Christo Wilson, Xiao Wang, Wenpeng Sha, Peng Huang, Yafei Dai and Ben Y. Zhao
ACM Transactions on the Web (TWEB), Vol. 7, No. 4, October 2013.
[Abstract, Paper: PDF (3MB)]
Middleware
2013

Efficient Batched Synchronization in Dropbox-like Cloud Storage Services
Zhenhua Li, Christo Wilson, Zhefu Jiang, Yao Liu, Ben Zhao, Cheng Jin, Zhi-Li Zhang and Yafei Dai
Proceedings of ACM International Middleware Conference (Middleware)
Beijing, China, December, 2013.
[Paper: PDF (370KB)]
IMC
2013

Follow the Green: Growth and Dynamics in Twitter Follower Markets
Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, Ben Y. Zhao
Proceedings of The 13th ACM SIGCOMM Internet Measurement Conference (IMC)
Barcelona, Spain, October 2013.
[Abstract, Paper: PDF (1.29MB)]
USENIX
Security
2013

You are How You Click: Clickstream Analysis for Sybil Detection
Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng and Ben Y. Zhao
Proceedings of the 22nd USENIX Security Symposium
Washington, DC, August 2013.
[Abstract, Paper: PDF (498KB)]
SIGMETRICS
2013

Practical Conflict Graphs for Dynamic Spectrum Distribution
Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao and Haitao Zheng
Proceedings of ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS) Best Practical Paper Award
Pittsburgh, PA, June 2013.
[Abstract, Paper: PDF (1.3MB)]
WWW
2013

Wisdom in the Social Crowd: an Analysis of Quora
Gang Wang, Konark Gill, Manish Mohanlal, Haitao Zheng and Ben Y. Zhao
Proceedings of The 22nd International World Wide Web Conference (WWW)
Rio de Janeiro, Brazil, May 2013.
[Abstract, Paper: PDF (2.5MB)]
NDSS
2013

Social Turing Tests: Crowdsourcing Sybil Detection
Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam Metzger, Haitao Zheng and Ben Y. Zhao
Proceedings of the 20th Network & Distributed System Security Symposium (NDSS)
San Diego, CA, February 2013.
[Abstract, Paper: PDF (453KB)]


2012
IMC
2012

Multi-scale Dynamics in a Massive Online Social Network
Xiaohan Zhao, Alessandra Sala, Christo Wilson, Xiao Wang, Sabrina Gaito, Haitao Zheng and Ben Y. Zhao
Proceedings of The 12th ACM SIGCOMM Internet Measurement Conference (IMC)
Boston, MA, November 2012.
[Abstract, Paper: PDF (607KB)]
ACM
TWeb
2012

Beyond Social Graphs: User Interactions in Online Social Networks and their Implications
Christo Wilson, Alessandra Sala, Krishna P. N. Puttaswamy, and Ben Y. Zhao
ACM Transactions on the Web (TWEB), Vol. 6, No. 4, Article 17, November 2012
[Abstract, Paper: PDF (2.3MB)]
HotSocial
2012

On the Bursty Evolution of Online Social Networks
Sabrina Gaito, Matteo Zignani, Gian Paolo Rossi, Alessandra Sala, Xiaohan Zhao, Haitao Zheng and Ben Y. Zhao
Proceedings of ACM KDD HotSocial Workshop
Beijing, China, August 2012.
[Abstract, Paper: PDF (400KB)]
SIGCOMM
2012

Mirror Mirror on the Ceiling: Flexible Wireless Links for Data Centers
Xia Zhou, Zengbin Zhang, Yibo Zhu, Yubo Li, Saipriya Kumar, Amin Vahdat, Ben Y. Zhao and Haitao Zheng
Proceedings of ACM SIGCOMM
Helsinki, Finland, August 2012.
[Abstract, Paper: PDF (634KB)]
WOSN
2012

Shortest Paths in Less Than a Millisecond
Rachit Agarwal, Matthew Caesar, P. Brighten Godfrey and Ben Y. Zhao
Proceedings of SIGCOMM Workshop on Online Social Networks (WOSN)
Helsinki, Finland, August 2012.
[Abstract, Paper: PDF (332KB)]
IEEE
TMC
2012

Measurement-based Design of Roadside Content Delivery Systems
Vinod Kone, Haitao Zheng, Ant Rowstron, Greg O'Shea and Ben Y. Zhao
IEEE Transactions on Mobile Computing, Vol. 12, No. 6, Pgs. 1160-1173, June 2013.
Featured Spotlight paper

[Abstract, Paper: PDF (1.39MB)]
MobiHoc
2012
Enforcing Dynamic Spectrum Access with Spectrum Permits
Lei Yang, Zengbin Zhang, Ben Y. Zhao, Christopher Kruegel and Haitao Zheng
Proceedings of 13th International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
Hilton Head Island, SC, June 2012.
[Abstract, Paper: PDF (653KB)]
ACM/IEEE
ToN
2012

The Effectiveness of Opportunistic Spectrum Access: A Measurement Study
Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao and Haitao Zheng
ACM/IEEE Transactions on Networking, Vol. 20, Number 6, Pgs 2005-2016, December 2012
[Abstract, Paper: PDF (1.41MB)]
ICA
2012

Invisible Interactions: What Latent Social Interaction Can Tell Us about Social Relationships in Social Networking Sites
Miriam Metzger, Christo Wilson, Rebekah Pure, Ben Y. Zhao.
Proceedings of the International Communication Association Conference (ICA)
Phoenix, AZ, May 2012.
[Paper: PDF (510KB)]
WWW
2012
Serf and Turf: Crowdturfing for Fun and Profit
Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng and Ben Y. Zhao
Proceedings of The 21st International World Wide Web Conference (WWW)
Lyon, France, April 2012.
[Abstract, Paper: PDF (504KB)]


2011
Middleware
2011

Scaling Microblogging Services with Divergent Traffic Demands
Tianyin Xu, Yang Chen, Lei Jiao, Ben Y. Zhao, Pan Hui and Xiaoming Fu
Proceedings of The ACM/IFIP/USENIX 12th International Middleware Conference (Middleware)
Lisboa, Portugal, December 2011.
[Paper: PDF (2.3MB)]
HotNets
2011

3D Beamforming for Wireless Data Centers
Weile Zhang, Xia Zhou, Lei Yang, Zengbin Zhang, Ben Y. Zhao and Haitao Zheng
Proceedings of 10th ACM Workshop on Hot Topics in Networks (HotNets-X)
Cambridge, MA, November 2011.
[Abstract, Paper: PDF (392KB)]
IMC
2011

Sharing Graphs using Differentially Private Graph Models
Alessandra Sala, Xiaohan Zhao, Christo Wilson, Haitao Zheng and Ben Y. Zhao
Proceedings of The 11th ACM SIGCOMM Internet Measurement Conference (IMC)
Berlin, Germany, November 2011.
[Abstract, Paper: PDF (461KB)]
IMC
2011

Uncovering Social Network Sybils in the Wild
Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y. Zhao and Yafei Dai
Proceedings of The 11th ACM SIGCOMM Internet Measurement Conference (IMC)
Berlin, Germany, November 2011.
[Abstract, Paper: PDF (537KB)]
CollaborateCom
2011

Efficient Shortest Paths on Massive Social Graphs
Xiaohan Zhao, Alessandra Sala, Haitao Zheng and Ben Y. Zhao
(Invited Paper) Proceedings of 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
Orlando, FL, October 2011.
[Abstract, Paper: PDF (228KB)]
SoCC
2011

Silverline: Toward Data Confidentiality in Storage-Intensive Cloud Applications
Krishna P. N. Puttaswamy, Chris Kruegel and Ben Y. Zhao
Proceedings of The 2nd ACM Symposium on Cloud Computing (SoCC)
Cascais, Portugal, October 2011.
[Abstract, Paper: PDF (762KB)]
Mobicom
2011

I Am the Antenna: Accurate Outdoor AP Location using Smartphones
Zengbin Zhang, Xia Zhou, Weile Zhang, Yuanyang Zhang, Gang Wang, Ben Y. Zhao, and Haitao Zheng
Proceedings of The 17th Annual International Conference on Mobile Computing and Networking (MobiCom)
Las Vegas, NV, September 2011.
[Abstract, Paper: PDF (648KB)]
Book Chapter
2011

Invisible Interactions: What Latent Social Interaction Can Tell Us about Social Relationships in Social Networking Sites
Miriam Metzger, Christo Wilson, Rebekah Pure, and Ben Y. Zhao
Book Chapter in Networked sociability and individualism. Technology for personal and professional relationships, Ed. Francesca Comunello.
IGI Global Publishing, November 2011.
HotMobile
2011

Privacy, Availability and Economics in the Polaris Mobile Social Network
Christo Wilson, Troy Steinbauer, Gang Wang, Alessandra Sala, Haitao Zheng and Ben Y. Zhao
Proceedings of 12th ACM Workshop on Mobile Computing Systems and Applications (HotMobile)
Phoenix, AZ, March 2011.
[Abstract, Paper: PDF (187KB)]
CCR
2011
AirLab: Consistency, Fidelity and Privacy in Wireless Measurements
Vinod Kone, Mariya Zheleva, Mike Wittie, Ben Y. Zhao, Elizabeth Belding, Haitao Zheng, Kevin Almeroth
ACM Computer Communication Review (CCR), Vol. 41, No. 1, Pgs. 60-65, January 2011.
[Abstract, Paper: PDF (701KB)]
CCR
2011
Papyrus: A Software Platform for Distributed Dynamic Spectrum Sharing Using SDRs
Lei Yang, Zengbin Zhang, Wei Hou, Ben Y. Zhao, and Haitao Zheng
ACM Computer Communication Review (CCR), Vol. 41, No. 1, Pgs. 32-37, January 2011.
[Abstract, Paper: PDF (904KB)]


2010
ECR
2010

The Design of a Reliable Reputation System
Gayatri Swamynathan, Kevin Almeroth and Ben Y. Zhao
Electronic Commerce Research Journal, Special Issue on Trust and Privacy Aspects of Electronic Commerce, Vol. 10, No. 3-4, Pages 239-270, 2010.
[Abstract, Paper: PDF (855KB)]
MONET
2010

The Impact of Infostation Density on Vehicular Data Dissemination
Vinod Kone, Haitao Zheng, Antony Rowstron and Ben Y. Zhao
ACM Mobile Networking and Applications (MONET), November 2010.
[Abstract, Paper: PDF (377KB)]
TPDS
2010

Protector: a Probabilistic Failure Detector for Cost-effective Peer-to-Peer Storage
Zhi Yang, Jing Tian, Wei Chen, Ben Y. Zhao and Yafei Dai
IEEE Transactions on Parallel and Distributed Systems (TPDS), September 2011, Vol. 22, No. 9, Pages 1514-1527.
[PDF (1.27MB)]
IMC
2010

Understanding Latent Interactions in Online Social Networks
Jing Jiang, Christo Wilson, Xiao Wang, Peng Huang, Wenpeng Sha, Yafei Dai and Ben Y. Zhao
Proceedings of The 10th ACM SIGCOMM Internet Measurement Conference (IMC)
Melbourne, Australia, November, 2010.
[Abstract, Paper: PDF (778KB)]
IMC
2010

Detecting and Characterizing Social Spam Campaigns
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen and Ben Y. Zhao
Proceedings of The 10th ACM SIGCOMM Internet Measurement Conference (IMC)
Melbourne, Australia, November, 2010.
[Abstract, Paper: PDF (1.6MB)]
IMC
2010

On the Feasibility of Effective Opportunistic Spectrum Access
Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao and Haitao Zheng
Proceedings of The 10th ACM SIGCOMM Internet Measurement Conference (IMC)
Melbourne, Australia, November, 2010.
[Abstract, Paper: PDF (1.29MB)]
Mobicom
2010

The Spaces Between Us: Setting and Maintaining Boundaries in Wireless Spectrum Access
Lei Yang, Ben Y. Zhao and Haitao Zheng
Proceedings of The 16th Annual International Conference on Mobile Computing and Networking (MobiCom)
Chicago IL, September, 2010.
[Abstract, Paper: PDF (356 KB), Compressed Postscript (516 KB)]
PODC
2010

Brief Announcement: Revisiting the Power-law Degree Distribution for Social Graph Analysis
Alessandra Sala, Sabrina Gaito, Gian Paolo Rossi, Haitao Zheng and Ben Y. Zhao
Proceedings of The 29th Annual Symposium of Principles of Distributed Computing (PODC)
July 2010, Zurich Switzerland.
WOSN
2010

Orion: Shortest Path Estimation for Large Social Graphs
Xiaohan Zhao, Alessandra Sala, Christo Wilson, Haitao Zheng and Ben Y. Zhao
Proceedings of The 3rd Workshop on Online Social Networks (WOSN)
Boston MA, June 2010.
[Abstract, Paper: PDF (173 KB)]
WOSN
2010
Don't Tread on Me: Moderating Access to OSN Data with SpikeStrip
Christo Wilson, Alessandra Sala, Joseph Bonneau, Robert Zablit and Ben Y. Zhao
Proceedings of The 3rd Workshop on Online Social Networks (WOSN)
Boston MA, June 2010.
[Abstract, Paper: PDF (195 KB)]
SECON
2010
Coexistence-Aware Scheduling For Wireless System-on-a-Chip Devices
Lei Yang, Vinod Kone, Xue Yang, York Liu, Ben Y. Zhao and Haitao Zheng
Proceedings of The 7th IEEE Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON)
Boston MA, June 2010.
[Abstract, Paper: PDF (389 KB)]
IPTPS
2010
AmazingStore: Available, Low-cost Online Storage Service Using Cloudlets
Zhi Yang, Ben Y. Zhao, Yuanjian Xing, Song Ding, Feng Xiao and Yafei Dai
Proceedings of The 9th International Workshop on Peer-to-Peer Systems (IPTPS)
San Jose, CA, April 2010.
[Abstract, Paper: PDF (416 KB)]
WWW
2010
Measurement-calibrated Graph Models for Social Network Experiments
Alessandra Sala, Lili Cao, Christo Wilson, Robert Zablit, Haitao Zheng and Ben Y. Zhao
Proceedings of The 19th International World Wide Web Conference (WWW)
Raleigh, NC, April 2010.
[Abstract, Paper: PDF (527 KB), Compressed Postscript (337 KB)]
NSDI
2010
Supporting Demanding Wireless Applications with Frequency-agile Radios
Lei Yang, Wei Hou, Lili Cao, Ben Y. Zhao and Haitao Zheng
Proceedings of 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI)
San Jose, CA, April 2010.
[Abstract, Paper: PDF (339 KB)]
WICON
2010
On Infostation Density of Vehicular Networks
Vinod Kone, Haitao Zheng, Antony Rowstron and Ben Y. Zhao
Proceedings of The 5th Annual International Wireless Internet Conference (WICON)
Singapore, March 2010.
[Abstract, Paper: PDF (198 KB), Compressed Postscript (260 KB)]
HotMobile
2010
Preserving Privacy in Location-based Mobile Social Applications
Krishna Puttaswamy and Ben Y. Zhao
Proceedings of 11th Workshop on Mobile Computing Systems and Applications (ACM HotMobile)
Annapolis, MD, February 2010.
[Abstract, Paper: PDF (403 KB), Compressed Postscript (1191 KB)]


2009
CoNEXT
2009

StarClique: Guaranteeing User Privacy in Social Networks Against Intersection Attacks
Krishna P. N. Puttaswamy, Alessandra Sala, and Ben Y. Zhao
Proc. of ACM Conference on emerging Networking EXperiments and Technologies (CoNEXT) 2009
Rome, Italy, December 2009.
[Abstract, Paper: PDF (328 KB), Compressed Postscript (290 KB)]
JSC
2009

Peer-exchange schemes to handle mismatch in peer-to-peer systems
Tongqing Qiu, Edward Chan, Mao Ye, Guihai Chen, and Ben Y. Zhao
The Journal of Supercomputing, Vol. 48, No. 1, Pgs. 15-42, April, 2009.
[Paper: PDF (945 KB)]
EuroSys
2009

User Interactions in Social Networks and their Implications
Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy and Ben Y. Zhao
Proceedings of the 4th ACM European Conference on Computer Systems (EuroSys)
Nuremburg, Germany, April 2009.
[Abstract, Paper: PDF (182 KB), Compressed Postscript (158 KB)]
INFOCOM
Mini
2009

Rome: Performance and Anonymity using Route Meshes
Krishna P. N. Puttaswamy, Alessandra Sala, Omer Egecioglu, and Ben Y. Zhao
Proc. of IEEE INFOCOM 2009 Minisymposium
Rio de Janeiro, Brazil, April 2009.
[Abstract, Paper: PDF (124 KB), Compressed Postscript (144 KB)]
TPDS
2009

Securing Structured Overlays Against Identity Attacks
Krishna P. N. Puttaswamy, Haitao Zheng and Ben Y. Zhao
IEEE Transactions on Parallel and Distributed Systems, Vol. 20, No. 10, Pgs 1487-1498, October 2009.
[Abstract, Paper: PDF (2 MB)]


2008
NPSec
2008

Improving Anonymity using Social Links
Krishna P. N. Puttaswamy, Alessandra Sala and Ben Y. Zhao
Proceedings of IEEE Workshop on Secure Network Protocols (NPSec 2008)
Orlando, FL, October 2008.
[Abstract, Paper: PDF (164 KB), Compressed Postscript (80 KB)]
ICNP
2008

Protecting Anonymity in Dynamic Peer-to-Peer Networks
Krishna P. N. Puttaswamy, Alessandra Sala, Christo Wilson, and Ben Y. Zhao
Proceedings of IEEE International Conference on Network Protocols (ICNP 2008)
Orlando, FL, October 2008.
[Abstract, Paper: PDF (311 KB), Compressed Postscript (331 KB)]
SRDS
2008

Towards Reliable Reputations for Dynamic Networked Systems
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almeroth, and S. Rao Jammalamadaka
Proceedings of IEEE Symposium on Reliable Distributed Systems (SRDS 2008)
Naples, Italy, October 2008.
[Abstract, Paper: PDF (156 KB), Compressed Postscript (116 KB)]
SRDS
2008

Probabilistic Failure Detection for Efficient Distributed Storage Maintenance
Jing Tian, Zhi Yang, Wei Chen, Ben Y. Zhao and Yafei Dai
Proceedings of IEEE Symposium on Reliable Distributed Systems (SRDS 2008)
Naples, Italy, October 2008.
[Abstract, Paper: PDF (762 KB)]
WOSN
2008

Do Social Networks Improve e-Commerce: a Study on Social Marketplaces
Gayatri Swamynathan, Christo Wilson, Bryce Boe, Kevin C. Almeroth and Ben Y. Zhao
Proceedings of the First SIGCOMM Workshop on Online Social Networks (WOSN 2008)
Seattle, WA, August 2008.
[Abstract, Paper: PDF (132 KB), Compressed Postscript (73 KB)]
CROWNCom
2008

High Throughput Spectrum-aware Routing for Cognitive Radio Based Ad-hoc Networks
Ashwin Sampath, Lei Yang, Lili Cao, Haitao Zheng, Ben Y. Zhao
Proceedings of Third International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM 2008)
Singapore, May 2008.
[Abstract, Paper: PDF (166 KB), Compressed Postscript (147 KB)]
MONET
2007

QUORUM - QUality Of service RoUting in wireless Mesh networks
Vinod Kone, Sudipto Das, Ben Y. Zhao and Haitao Zheng
ACM Mobile Networking and Applications (MONET), Vol. 12, No. 5-6, Pgs. 358-369, December 2007.
[Abstract, Paper: PDF (446 KB)]
INFOCOM
2008

Searching for Rare Objects using Index Replication
Krishna P. N. Puttaswamy, Alessandra Sala and Ben Y. Zhao
Proceedings of The 27th IEEE International Conference on Computer Communications (INFOCOM 2008)
Phoenix, AZ, April 2008.
[Abstract, Paper: PDF (251 KB), Compressed Postscript (138 KB)]


2007
ICPP
2007

Towards Location-aware Topology in both Unstructured and Structured P2P Systems
Tongqing Qiu, Edward Chan, Mao Ye, Guihai Chen and Ben Y. Zhao
Proceedings of International Conference on Parallel Processing (ICPP)
XiAn, China, September 2007.
[Paper: PDF (193 KB)]
QShine
2007

QUORUM - QUality Of service RoUting in wireless Mesh networks
Vinod Kone, Sudipto Das, Ben Y. Zhao and Haitao Zheng
Proceedings of IEEE/ICST International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine)
Vancouver, Canada, August 2007.
[Abstract, Paper: PDF (220 KB), Compressed Postscript (244 KB)]
ICCCN
2007

Multi-channel Jamming Attacks using Cognitive Radios
Ashwin Sampath, Hui Dai, Haitao Zheng and Ben Y. Zhao
Proceedings of International Conference on Computer Communications and Networks (ICCCN)
Honolulu, HI, August 2007.
[Paper: PDF (1 MB)]
ICDCS
2007

Deploying Video-on-Demand Services on Cable Networks
Matthew Allen, Ben Y. Zhao and Rich Wolski
Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS)
Toronto, Canada, June 2007.
[Abstract, Paper: PDF (296 KB), Compressed Postscript (112 KB)]
ICDCS
2007

An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System
Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yafei Dai and Xiaoming Li
Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS)
Toronto, Canada, June 2007.
[Abstract, Paper: PDF (887 KB), Compressed Postscript (1737 KB)]
IWQoS
2007

Fairness Attacks in the Explicit Control Protocol
Christo Wilson, Chris Coakley and Ben Y. Zhao
Proceedings of Fifteenth IEEE International Workshop on Quality of Service (IWQoS)
Nominated for Best Student Paper Award
Chicago, IL, June 2007.
[Abstract, Paper: PDF (163 KB), Compressed Postscript (503 KB)]
CCPE
2007

Exploring the Feasibility of Proactive Reputations
Gayatri Swamynathan, Ben Y. Zhao and Kevin C. Almeroth
Concurrency and Computation: Practice and Experience, Special Issue on Recent Advances in Peer-to-Peer Systems and Security. Vol. 20, No. 2, Pgs 155-166. May 2007.
[Paper: PDF (160 KB)]
GI
2007

A Case for Unstructured Distributed Hash Tables
Krishna P. N. Puttaswamy and Ben Y. Zhao
Proceedings of IEEE Global Internet Symposium
Anchorage, AK, May 2007.
[Abstract, Paper: PDF (60 KB), Compressed Postscript (48 KB)]
IPTPS
2007

HPTP: Relieving the Tension between ISPs and P2P
Guobin Shen, Ye Wang, Yongqiang Xiong, Ben Y. Zhao and Zhi-Li Zhang
Proceedings of the 6th International Workshop on Peer-to-Peer Systems (IPTPS)
Bellevue, WA, February 2007.
[Abstract, Paper: PDF (276 KB), Compressed Postscript (610 KB)]
AiM
2007
Globally Decoupled Reputations for Large Distributed Networks
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almeroth and Haitao Zheng
Advances in Multimedia. Vol. 2007, No. 1. January 2007.
[Paper: PDF (870 KB)]
C5
2007
Scalable Access Control For Web Services
Gayatri Swamynathan, Tyler Close, Sujata Banerjee, Rick McGeer, Ben Y. Zhao and
Kevin C. Almeroth. Proceedings of the Fifth International Conference on Creating, Connecting and Collaborating through Computing (C5)
Kyoto, Japan, January 2007.
[Paper: PDF (51 KB)]
COMSWARE
2007
Integrated Data Location in Multihop Wireless Networks
Irfan Sheriff, Prashanth Acharya, Ashwin Sampath, Ben Y. Zhao and Elizabeth Belding-Royer
Proceedings of IEEE/Create-Net COMSWARE
Bangalore, India, January 2007.
[Abstract, Paper: PDF (156 KB), Compressed Postscript (216 KB)]


2006
MILCOM
2006

Increasing TCP Throughput with an Enhanced Control Plane
A. Davier, L. Peterson, J. Brassil, R. McGeer, D. Reed, P. Sharma, P. Yalagandula, A. Henderson, L. Roberts, S. Schwab, R. Thomas, E. Wu, B. Mark, B. Zhao and A. Joseph
Proceedings of MILCOM
Washington, DC, October 2006.
MobiShare
2006

Energy Consumption and Conservation in Mobile Peer-to-Peer Systems
Selim Gurun, Priya Nagpurkar and Ben Y. Zhao
Proceedings of ACM MobiShare
Los Angeles, CA, September 2006.
[Abstract, Paper: PDF (115 KB), Compressed Postscript (148 KB)]
MobiShare
2006

Location Independent Compact Routing for Wireless Networks
Robert Gilbert, Kerby Johnson, Shaomei Wu, Ben Y. Zhao and Haitao Zheng
Proceedings of ACM MobiShare
Los Angeles, CA, September 2006.
[Abstract, Paper: PDF (115 KB), Compressed Postscript (335 KB)]
EuroSys
2006

Understanding User Behavior in Large Scale Video-on-Demand Systems
Hongliang Yu, Dongdong Zheng, Ben Y. Zhao and Weimin Zheng
Proceedings of the first ACM European Conference on Computer Systems (EuroSys)
Leuven, Belgium, April 2006.
[Abstract, Paper: PDF (1.8 MB), Compressed Postscript (2.1 MB)]
IPTPS
2006

Exploring the Feasibility of Proactive Reputations
Gayatri Swamynathan, Ben Y. Zhao and Kevin C. Almeroth
Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS)
Santa Barbara, CA, February 2006.
[Abstract, Paper: PDF (76 KB), Compressed Postscript (53 KB)]
EDBT
2006

Parallelizing Skyline Queries for Scalable Distribution
Ping Wu, Caijie Zhang, Ying Feng, Ben Y. Zhao, Divyakant Agrawal and Amr El Abbadi
Proceedings of the 10th International Conference on Extending Database Technology (EDBT)
Munich, Germany, March 2006.
[Abstract, Paper: PDF (433 KB), Compressed Postscript (350 KB)]
JCSS
2006

Determining Model Accuracy of Network Traces
Almudena Konrad, Ben Y. Zhao, and Anthony D. Joseph
Elsevier Journal of Computer and System Sciences, Vol. 72, No. 7, Pgs. 1156-1171, November 2006.
[Abstract, Paper: PDF (502 KB), Compressed Postscript (335 KB)]
MONET
2006

Utilization and Fairness in Spectrum Assignment for Opportunistic Spectrum Access
Chunyi Peng, Haitao Zheng, and Ben Y. Zhao
ACM Mobile Networks and Applications (MONET)
May 2006, Vol. 11, Pgs. 555 - 576.

[Abstract, Paper: PDF (591 KB), Compressed Postscript (308 KB)]


2005
ICNP
2005

Z-Ring: Fast Prefix Routing via a Low Maintenance Membership Protocol
Qiao Lian, Wei Chen, Zheng Zhang, Shaomei Wu, and Ben Y. Zhao
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP)
Boston, MA, November 2005.
[Abstract, Paper: PDF (581 KB)]
NPSec
2005

Identity Theft Protection in Structured Overlays
Lakshmi Ganesh and Ben Y. Zhao
Proceedings of the 1st Workshop on Secure Network Protocols (NPSec)
Boston, MA, November 2005.
[Abstract, Paper: PDF (73 KB), Compressed Postscript (62 KB)]
AEPP
2005

Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System
Gayatri Swamynathan, Ben Y. Zhao and Kevin Almeroth
Proceedings of the 1st International Workshop on Applications and Economics of Peer-to-Peer Systems (AEPP)
Nanjing, China, November 2005.
[Abstract, Paper: PDF (61 KB), Compressed Postscript (49 KB)]
PMWWMC
2005

Choosing an Accurate Network Model using Domain Analysis
Almudena Konrad, Ben Y. Zhao and Anthony D. Joseph
Proceedings of the 1st International Workshop on Performance Modelling in Wired, Wireless, Mobile Networking and Computing
Fukuoka, Japan, July, 2005.
[Abstract, Paper: PDF (116 KB), Compressed Postscript (119 KB)]
NSDI
2005

Cashmere: Resilient Anonymous Routing
Li Zhuang, Feng Zhou, Ben Y. Zhao and Antony Rowstron
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI)
Boston, MA, May, 2005.
[Abstract, Paper: PDF (191 KB), Compressed Postscript (158 KB)]
IPTPS
2005

Hybrid Overlay Structure Based on Random Walk
Ruixiong Tian, Yongqiang Xiong, Qian Zhang, Bo Li, Ben Y. Zhao and Xing Li
Proceedings of the 4th International Workshop on Peer-To-Peer Systems (IPTPS)
Ithaca, NY, February, 2005.
[Abstract, Paper: PDF (410 KB), Compressed Postscript (316 KB)]
IPTPS
2005

Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks
Byung-Gon Chun, Ben Y. Zhao and John Kubiatowicz
Proceedings of the 4th International Workshop on Peer-To-Peer Systems (IPTPS)
Ithaca, NY, February, 2005.
[Abstract, Paper: PDF (118 KB), Compressed Postscript (70 KB)]
WORLDS
2005

Deployment of a Large-scale Peer-to-Peer Social Network
Mao Yang, Hua Chen, Ben Y. Zhao, Yafei Dai and Zheng Zhang
Proceedings of the 1st Workshop on Real Large Distributed Systems (WORLDS)
San Francisco, CA, December, 2004.
[Abstract, Paper: PDF (462 KB), Compressed Postscript (57 KB)]


2004 and Pre-faculty
IPTPS
2004

Rapid Mobility via Type Indirection
Ben Y. Zhao, Ling Huang, Anthony D. Joseph and John D. Kubiatowicz
Proceedings of the 3rd International Workshop on Peer-to-Peer Systems (IPTPS'04)
San Diego, CA. February, 2004.
Also appears in Lecture Notes in Computer Science, Vol. 3279, p. 64-74, 2004. (PDF)
[Abstract, Paper: PDF(120KB), Compressed Postscript(70KB)]
ICNP
2003

Exploiting Routing Redundancy via Structured Peer-to-Peer Overlays
Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph and John D. Kubiatowicz
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP'03)
Atlanta, GA, November 2003.
[Abstract, Paper: PDF(163KB), Compressed Postscript(120KB)]
IEEE
JSAC
2004

Tapestry: A Resilient Global-scale Overlay for Service Deployment
Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, and John Kubiatowicz
IEEE Journal on Selected Areas in Communications,
January 2004, Vol. 22, No. 1, Pgs. 41-53.

[Abstract, Paper: PDF(432KB), Compressed Postscript(101KB)]
Middleware
2003

Approximate Object Location and Spam Filtering on Peer-to-Peer Systems
Feng Zhou, Li Zhuang, Ben Zhao, Ling Huang, Anthony Joseph and John Kubiatowicz
Proceedings of ACM/IFIP/USENIX International Middleware Conference (Middleware 2003)
Rio de Janeiro, Brazil, June 2003.
Published in LNCS, Vol. 2672, June 2003, pgs 1-20.
[Abstract, Paper: PDF(263KB), Compressed Postscript(131KB)]
IPTPS
2003

Towards a Common API for Structured P2P Overlays
Frank Dabek, Ben Zhao, Peter Druschel, John Kubiatowicz, and Ion Stoica
Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS'03)
Also as Lecture Notes in Computer Science, Vol. 2735, p. 33-44, 2003
Berkeley, CA. February 2003.
[Abstract, Paper: PDF(95KB), Compressed Postscript(39KB)]
ToCS
2004

Distributed Object Location in a Dynamic Network
Kirsten Hildrum, John Kubiatowicz, Satish Rao and Ben Y. Zhao
Theory of Computing Systems, March 2004, No. 37, Pgs. 405-440, Springer-Verlag
Expanded journal version of SPAA 2002 paper. (PDF: TOCS version)
[Abstract, Paper: PDF(217KB), Compressed Postscript(107KB)]
FAST
2003
Pond: The OceanStore Prototype
Sean Rhea, Patrick Eaton, Dennis Geels, Hakim Weatherspoon, Ben Zhao, and John Kubiatowicz
Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST'03)
Best Student Paper Award
San Francisco, CA. March 2003
[Abstract, Paper: PDF(82KB), Compressed Postscript(116KB)]
SPAA
2002

Distributed Object Location in a Dynamic Network
Kirsten Hildrum, John Kubiatowicz, Satish Rao and Ben Y. Zhao
Proceedings of the 14th ACM Symposium on Parallel Algorithms and Architectures (SPAA'02)
Winnipeg, Canada. August 2002.
[Abstract, Paper: PDF(181KB), Compressed Postscript(91KB)]
FuDiCo
2002

Locality-aware Mechanisms for Large-scale Networks
Ben Y. Zhao, Anthony Joseph and John Kubiatowicz
Workshop on Future Directions in Distributed Computing (FuDiCo)
Bertinoro, Italy. June 2002.
[Abstract, Paper: PDF(31KB), Compressed Postscript(21KB)]
IPTPS
2002
Brocade: Landmark Routing on Overlay Networks
Ben Y. Zhao, Yitao Duan, Ling Huang, Anthony D. Joseph, and John Kubiatowicz
Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02)
Cambridge, MA. March 2002.
Also as Lecture Notes in Computer Science, Vol. 2429, p. 34-44, 2002. (PDF)
[Abstract, Paper: PDF (91KB), Compressed Postscript (62KB)]
ACM WiNET
2003
A Markov-Based Channel Model Algorithm for Wireless Networks
Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph and Reiner Ludwig
ACM Baltzer Wireless Networks, Selected papers from MSWiM 2001.
May 2003, Vol. 9, No. 3, Pgs. 189-199
.
[Abstract, Paper: PDF (321K)]
IEEE
IC
2001
Maintenance-Free Global Storage in OceanStore
Sean Rhea, Chris Wells, Patrick Eaton, Dennis Geels, Ben Zhao, Hakim Weatherspoon, and John Kubiatowicz
IEEE Internet Computing, Sept/Oct 2001, Vol 5, No. 5, pgs 40-49.
[Abstract, Paper: PDF(250KB), Compressed Postscript(540KB)]
MSWiM
2001
A Markov-Based Channel Model Algorithm for Wireless Networks
Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph and Reiner Ludwig
Proceedings of the 4th ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2001)
Best Paper Award
Rome, Italy, July 2001.
[Abstract, Paper: PDF(268KB), Compressed Postscript(262KB)]
ACM WINET
2002
An Architecture for Secure Wide-Area Service Discovery
Todd D. Hodes, Steven E. Czerwinski, Ben Y. Zhao, Anthony D. Joseph and Randy H. Katz.
ACM Baltzer Wireless Networks: Selected papers from MobiCom 1999.
March 2002, Vol. 8, No. 2-3, Pgs. 213-230.

[Abstract, Paper: PDF(332KB), Compressed Postscript(132KB)]
NOSSDAV
2001
Bayeux: An Architecture for Scalable and Fault-tolerant Wide-Area Data Dissemination
Shelley Q. Zhuang, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz, John Kubiatowicz
Proceedings of the 11th International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV 2001)
[Abstract, Paper: PDF(110KB), Compressed Postscript(102KB)]
IEEE
Computer
Networks
2001
The Ninja Architecture for Robust Internet-Scale Systems and Services
Steven D. Gribble, Matt Welsh, Rob von Behren, Eric A. Brewer, David Culler, N. Borisov, S. Czerwinski, R. Gummadi, J. Hill, A. Joseph, R. H. Katz, Z. M. Mao, S. Ross, and B. Zhao
IEEE Computer Networks: Special Issue on Pervasive Computing, March 2001, Vol 35, No. 4
Best paper award
[Abstract, Paper: PDF(560KB), Compressed Postscript(595KB)].
ASPLOS
2000
OceanStore: An Architecture for Global-scale Persistent Storage
John Kubiatowicz, David Bindel, Yan Chen, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Westly Weimer, Christopher Wells, and Ben Zhao.
Proceedings of the 9th International Conference on Architecture Support for Programming Languages and Operating Systems (ASPLOS 2000), November, 2000.
[Abstract, Paper: PDF(130KB), Compressed Postscript(309KB)]
IEEE
Personal
Comm
2000
ICEBERG: An Internet-core Network Architecture for Integrated Communications
Helen J. Wang, Bhaskaran Raman, Chen-nee Chuah, Rahul Biswas, Ramakrishna Gummadi, Barbara Hohlt, Xia Hong, Emre Kiciman, Zhuoqing Mao, Jimmy S. Shih, Lakshminarayanan Subramanian, Ben Y. Zhao, Anthony D. Joseph, and Randy H. Katz.
IEEE Personal Communications 2000, Special Issue on IP-based Mobile Telecommunication Networks
[Abstract, Paper: PDF(2.2MB), Compressed Postscript(517KB)]
IECON
1999
Flexible Internetworking of Devices and Controls
Michelle Munson, Todd Hodes, Thomas Fischer, Keung-hae Lee, Toby Lehman and Ben Y. Zhao.
Proceedings of IECON, San Jose, CA, December 1999.
Mobicom
1999
An Architecture for a Secure Service Discovery Service
Steven Czerwinski, Ben Y. Zhao, Todd Hodes, Anthony Joseph and Randy Katz.
Proceedings of The 5th ACM/IEEE International Conference on MobileComputing and Networks (MobiCom '99), Seattle, WA, August 1999.
[Abstract, Paper: PDF(285KB), Compressed Postscript(89KB)]

Books:

Future Directions in Distributed Computing
Research and Position Papers
Andre Schiper, Alex A. Shvartsman, Hakim Weatherspoon, Ben Y. Zhao (Eds.)
Series: Lecture Notes in Computer Science. Volume. 2584
Heidelberg, Germany: Springer-Verlag Heidelberg, 2003.

Thesis Work and Technical Reports:

Improving Anonymity using Social Links
Krishna P. N. Puttaswamy, Alessandra Sala and Ben Y. Zhao
UC Santa Barbara Technical Report: 2008-13, September 2008
[PDF (140KB)]

Protecting Anonymity in Dynamic Peer-to-Peer Networks
Krishna P. N. Puttaswamy, Alessandra Sala, Christo Wilson, and Ben Y. Zhao
UC Santa Barbara Technical Report: 2008-12, September 2008
[PDF (236KB)]

Rome: Performance and Anonymity using Route Meshes
Krishna P. N. Puttaswamy, Alessandra Sala, Omer Egecioglu, and Ben Y. Zhao
UC Santa Barbara Technical Report: 2008-11, September 2008
[PDF (305KB)]

Securing Structured Overlays Against Identity Attacks
Krishna P. N. Puttaswamy, Ben Y. Zhao and Haitao Zheng
UC Santa Barbara Technical Report: 2008-1, January 2008.
[PDF (1.4MB)]

Searching for Rare Objects Using Index Replication
Krishna P. N. Puttaswamy, Alessandra Sala, and Ben Y. Zhao
UC Santa Barbara Technical Report: 2007-12, December 2007
[PDF (348KB)]

An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System
Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yafei Dai, and Xiaoming Li
Microsoft Research Technical Report: MSR-TR-2006-14, February 2006
[Abstract, PDF (294KB)]

Decentralized Object Location and Routing: A New Networking Paradigm
Ben Y. Zhao, Ph.D. Thesis, U. C. Berkeley, August 2004
[Abstract, PDF (1.7MB), Compressed Postscript (937KB), Postscript (3.5MB)]

Exploiting Routing Redundancy Using a Wide-area Overlay
Ben Y. Zhao, Ling Huang, Anthony D. Joseph and John D. Kubiatowicz
U. C. Berkeley Technical Report UCB/CSD-02-1215, November 2002
[Compressed Postscript (176KB), PDF (155KB)]

Supporting Rapid Mobility via Locality in an Overlay Network
Ben Y. Zhao, Anthony D. Joseph and John D. Kubiatowicz
U. C. Berkeley Technical Report UCB/CSD-02-1216, November 2002
[Compressed Postscript (228KB), PDF (257KB)]

Distributed Data Location in a Dynamic Network
Kirsten Hildrum, John D. Kubiatowicz, Satish Rao and Ben Y. Zhao
U. C. Berkeley Technical Report UCB/CSD-02-1178, April, 2002.
[Compressed Postscript (204KB), PDF (91KB)]

A Decentralized Location and Routing Infrastructure for Fault-tolerant Wide-area Applications
Ben Y. Zhao, Ph.D. Qualifying Examination, April 18, 2001.
[Abstract, Talk: PDF (74KB), PPT Slideshow (278KB), Paper: PDF (148KB)]

A Markov-Based Channel Model Algorithm for Wireless Networks
Almudena Konrad, Anthony D. Joseph, Reiner Ludwig, and Ben Y. Zhao.
U. C. Berkeley Technical Report UCB/CSD-01-1142, May, 2001.
[Compressed Postscript (264KB), PDF (339KB)]

Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing
Ben Y. Zhao, John D. Kubiatowicz, and Anthony D. Joseph.
U. C. Berkeley Technical Report UCB/CSD-01-1141, April, 2001.
[Compressed Postscript (206KB), PDF (194KB)]

Silverback: A Global-Scale Archival System
Hakim Weatherspoon, Chris Wells, Patrick R. Eaton, Ben Y. Zhao, and John D. Kubiatowicz.
U. C. Berkeley Technical Report UCB/CSD-01-1139, March 2001.
[Compressed Postscript (135KB), PDF (261KB)]

OceanStore: An Extremely Wide-Area Storage System
David Bindel, Yan Chen, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Westly Weimer, Christopher Wells, Ben Zhao and John Kubiatowicz.
U.C. Berkeley Technical Report UCB/CSD-00-1102, May 2000.
[Compressed Postscript (76KB)].

XSet: A Lightweight Database for Internet Applications
Ben Y. Zhao and Anthony Joseph
Submitted for publication (updated version of MS thesis), May 2000.
[Compressed Postscript (124KB), PDF (320KB)].

The XSet XML Search Engine and XBench XML Query Benchmark
Ben Y. Zhao
Thesis filed as partial requirement for Masters of Science, May 2000
[Compressed Postscript(123KB), PDF (384KB)].
U.C. Berkeley Technical Report UCB/CSD-00-1112, September 2000.
[Compressed Postscript (137KB), PDF (404KB)].

Talks:

Z-Ring: Fast Prefix Routing via a Low Maintenance Membership Protocol
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP)
Slides: [PDF (251KB), PPT (793KB)]

Identity Theft Protection in Structured Overlays
Proceedings of the 1st Workshop on Secure Network Protocols (NPSec)
Slides: [PDF (218KB), PPT (467KB)]

Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System
1st International Workshop on Applications and Economics of Peer-to-Peer Systems (AEPP)
Slides: [PDF (273KB), PPT (240KB)]

Cashmere: Resilient Anonymous Routing
2nd Symposium on Networked Systems Design and Implementation (NSDI)
Slides: [PDF (575KB), PPT (2.7MB)]

Rapid mobility via type indirection
3rd International Workshop on Peer to Peer Systems (IPTPS) 2004
Slides: [PDF (580KB), PowerpointShow (405KB)]

Infrastructure-based Resilient Routing
ICSI Lunch Seminar, Jan. 21, 2004
Slides: [PPT (257KB)]

Exploiting Route Redundancy via Structured Peer to Peer Overlays
IEEE 11th International Conference of Networking Protocols (ICNP) 2003
Slides: [PDF (603KB), PowerPointShow (151KB)]

Approximate Object Location and Spam Filtering on Peer-to-Peer Systems
ACM International Conference on Middleware 2003
Slides: [PDF, PPT]

Towards a Common API for Structured P2P Overlays
2nd International Workshop on Peer to Peer Systems (IPTPS) 2003
Slides: [PDF, Powerpoint Show]

A Common API for Structured Peer to Peer Overlays
Talk at OceanStore/ROC/Sahara Winter Retreat, 1/14/2002
[PDF (163KB)]

Implementation and Deployment of a Wide-area Network Infrastructure
Talk at HP Labs, November 2002
[PowerPoint PPS (377KB), PDF (486KB)]

Mobile Tapestry
Talk given at Sahara/ROC retreat
[PDF, PowerPoint Show]

Panel slides on "Challenges of Computing on a Massive Scale"
International Workshop on Future Directions in Distributed Computing
Slides: [pdf, Powerpoint Show]

Locality Aware Mechanisms for Large-scale Networks
International Workshop on Future Directions in Distributed Computing
Talk slides: [pdf, Powerpoint Show]

Brocade: Landmark Routing on Overlay Networks.
International Workshop on Peer to Peer Systems (IPTPS) 2002
Talk: pdf (349K), powerpoint show (137K)

Tapestry: Architecture and Status
UCB ROC and Sahara Retreats joint session, January 17, 2002
pdf, PowerpointShow.

Tapestry: Scalable and Fault-tolerant Routing and Location
Networking Seminar, Fall 2001, Stanford University, October 18, 2001, Stanford, CA.
[PDF, PowerpointShow]

Tapestry: Decentralized Routing and Location
System Seminar (SPAM), Summer 2001, Yale University, June 22, 2001, New Haven, CT.
[PDF, PowerpointShow]

Tapestry: Decentralized Routing and Location
System Seminar 590S, Spring 2001, University of Washington, May 2001, Seattle WA.
[PDF(554KB)]

WiPs / Posters:

DISSENT: Defeating Sinkholes in Sensor NeTworks
2nd Symposium on Networked Systems Design and Implementation (NSDI), May 2005.

Holmes: Probabilistic Object Location in MANETs
2nd Symposium on Networked Systems Design and Implementation (NSDI), May 2005.

Tapestry Poster Abstract
Abstract of poster presented at SIGCOMM 2001, to be included in a forthcoming issue of Computer Communication Review. [pdf, Abstract]

Tapestry: Wide-area Location and Routing
4th Conference on Operating System Design and Implementation (OSDI), October 2000.
Work in Progress abstract (text), talk slides (PDF)

Tapestry: Fault-resilient Wide-area Location and Routing
4th Conference on Operating System Design and Implementation (OSDI), October 2000.
Poster (PDF)