Citations: 36000+ (GoogleScholar), i10-Index: 172, H-index: 77.
Selected Recent Publications (last 2-3 years):
Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models, IEEE S&P, 2024
Towards Scalable and Robust Model Versioning, SaTML, 2024
Can Virtual Reality Protect Users from Keystroke Inference Attacks?, USENIX Security, 2024
Data Isotopes for Data Provenance in DNNs, PETS, 2024
Characterizing the Optimal 0−1 Loss for Multi-class Classification with a Test-time Attacker, NeurIPS, 2023 (Spotlight)
Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models, USENIX Security, 2023 (Internet Defense Prize)
"My face, my rules": Enabling Personalized Protection against Unacceptable Face Editing, PETS, 2023
Towards a General Video-based Keystroke Inference Attack, USENIX Security, 2023
SoK: Anti-Facial Recognition Technology, IEEE S&P, 2023
Finding Naturally-Occuring Physical Backdoors in Image Datasets, NeurIPS, 2022
Understanding Robust Learning through the Lens of Representation Similarities, NeurIPS, 2022
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models, CCS, 2022
Poison Forensics: Traceback of Targeted Data Poisoning Attacks in Neural Networks, USENIX Security, 2022
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks, USENIX Security, 2022
"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World, CCS, 2021
Backdoor Attacks Against Deep Learning Systems in the Physical World, CVPR, 2021
User Authentication via Electrical Muscle Stimulation, ACM CHI, 2021
Gotta Catch 'em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks, ACM CCS, 2020
Fawkes: Protecting Privacy against Unauthorized Deep Learning Models, USENIX Security, 2020
Wearable Microphone Jamming,
(Best paper honorable mention)
ACM CHI 2020.
Detecting Gender Stereotypes: Lexicon vs Supervised Learning Methods,
(Best paper honorable mention)
ACM CHI 2020.
Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial
Motion Sensors, NDSS, 2020
Latent
Backdoor Attacks on Deep Neural Networks, ACM CCS,
2019
Safely
and Automatically Updating In-Network ACL Configurations with
Intent Language, ACM SIGCOMM, 2019.
Neural Cleanse: Identifying
and Mitigating Backdoor Attacks in Neural Networks, IEEE
S&P, 2019.
Refereed Papers:
denotes co-first authors with equal contribution.
2024 |
|
USENIX Security 2024 |
Can Virtual Reality Protect Users from Keystroke Inference Attacks? Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, Haitao Zheng To Appear: Proceedings of USENIX Security Symposium, Philadelphia PA, August 2024. New Scientist article |
IEEE S&P 2024 |
Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models Shawn Shan, Wenxin Ding, Josephine Passananti, Stanley Wu, Haitao Zheng, Ben Y. Zhao To Appear: Proceedings of 45th IEEE Symposium on Security and Privacy, San Francisco CA, May 2024. |
IEEE SaTML 2024 |
Towards Scalable and Robust Model Versioning Wenxin Ding, Arjun Nitin Bhagoji, Ben Y. Zhao, Haitao Zheng To Appear: Proceedings of IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), Toronto Canada, April 2024. |
PETS 2024 |
Data Isotopes for Data Provenance in DNNs Emily Wenger, Xiuyu Li, Ben Y. Zhao, and Vitaly Shmatikov To Appear: Proceedings of Privacy Enhancing Technologies Symposium (PETS), Bristol UK, July 2024. [Abstract, Paper PDF, Code ] |
2023 |
|
NeurIPS 2023 |
Characterizing the Optimal 0−1 Loss for Multi-class Classification with a Test-time Attacker Sihui Dai, Wenxin Ding, Arjun Nitin Bhagoji, Daniel Cullina, Haitao Zheng, Ben Y. Zhao, Prateek Mittal Proceedings of 37th Conference on Neural Information Processing Systems (NeurIPS), New Orleans, December 2023. Spotlight Paper [Abstract, Paper: PDF ] |
USENIX Security 2023 |
Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao Proceedings of USENIX Security Symposium, Anaheim CA, August 2023. Winner: Distinguished Paper Award Winner: USENIX Internet Defense Prize [Abstract, Project/software, Paper: PDF (3.4MB)] |
USENIX Security 2023 |
Towards a General Video-based Keystroke Inference Attack Zhuolin Yang, Yuxin Chen, Zain Sarwar, Hadleigh Schwartz, Ben Y. Zhao, Haitao Zheng Proceedings of USENIX Security Symposium, Anaheim CA, August 2023. [Abstract, Website, Paper: PDF (3.4MB)] |
PETS 2023 |
"My face, my rules": Enabling Personalized Protection against Unacceptable Face Editing Zhujun Xiao, Jenna Cryan, Yuanshun Yao, Yi Hong Gordon Cheo, Yuanchao Shu, Stefan Saroiu, Ben Y. Zhao, Haitao Zheng Proceedings of Privacy Enhancing Technologies Symposium (PETS), Lausanne, Switzerland, July 2023. [Abstract, Paper: PDF (4MB)] |
IEEE S&P 2023 |
SoK: Anti-Facial Recognition Technology Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao Proceedings of IEEE Symposium on Security and Privacy (Oakland), San Francisco CA, May 2023. [Abstract, Paper: PDF (901KB)] |
2022 |
|
NeurIPS 2022 |
Finding Naturally-Occuring Physical Backdoors in Image Datasets Emily Wenger, Roma Bhattacharjee, Arjun Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, Ben Y. Zhao Proceedings of 36th Conference on Neural Information Processing Systems (NeurIPS), New Orleans LA, December 2022. [Abstract, Paper: PDF (1.8MB)] |
NeurIPS 2022 |
Understanding Robust Learning through the Lens of Representation Similarities Christian Cianfarani, Arjun Nitin Bhagoji, Vikash Sehwag, Ben Y. Zhao, Prateek Mittal, Haitao Zheng Proceedings of 36th Conference on Neural Information Processing Systems (NeurIPS), New Orleans LA, December 2022. [Paper: PDF (1.8MB)] |
CCS 2022 |
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao Proceedings of ACM Conference on Computer and Communications Security (CCS), Los Angeles, CA, November 2022. [Abstract, Paper: PDF (524KB)] |
USENIX Security 2022 |
Poison Forensics: Traceback of Targeted Data Poisoning Attacks in Neural Networks Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao Proceedings of USENIX Security Symposium, Boston, MA, August 2022. [Abstract, Website, Code, Paper: PDF (610KB)] |
USENIX Security 2022 |
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao Proceedings of USENIX Security Symposium, Boston, MA, August 2022. [Abstract, Website, Paper: PDF (1.5MB)] |
2021 |
|
CCS 2021 |
"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World Emily Wenger, Max Bronckers, Christian Cianfarani, Jenna Cryan, Angela Sha, Haitao Zheng, and Ben Y. Zhao Proceedings of ACM Conference on Computer and Communications Security (CCS), Seoul, South Korea, November 2021. [Abstract, Paper: PDF (632KB)] |
AISec 2021 |
Patch-based Defenses against Web Fingerprinting Attacks Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, and Ben Y. Zhao Proceedings of 14th ACM Workshop on Artificial Intelligence and Security (AISec), Seoul, South Korea, November 2021. [Paper: PDF (720KB)] |
TMC 2021 |
Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions Qinge Xie, Qingyuan Gong, Xinlei He, Yang Chen, Xin Wang, Haitao Zheng, Ben Y. Zhao IEEE Transactions on Mobile Computing, 2021. [Paper: PDF (7.6MB)] |
IEEE TNSM 2021 |
On Migratory Behavior in Video Consumption Huan Yan, Haohao Fu, Yong Li, Tzu-Heng Lin, Gang Wang, Haitao Zheng, Depeng Jin, Ben Y. Zhao IEEE Transactions on Network and Service Management, Vol 18, No 2, Pgs 1775-1788, 2021. [Paper: PDF (2MB)] |
SEC 2021 |
Towards Performance Clarity of Edge Video Analytics Zhujun Xiao, Zhengxu Xia, Haitao Zheng, Ben Y. Zhao, Junchen Jiang Proceedings of ACM/IEEE Symposium on Edge Computing (SEC), San Jose, December 2021. [Paper: PDF (1.3MB)] |
CVPR 2021 |
Backdoor Attacks Against Deep Learning Systems in the Physical World Emily Wenger, Josephine Passananti, Arjun Nitin Bhagoji, Yuanshun Yao, Haitao Zheng, Ben Y. Zhao Proceedings of IEEE Computer Vision and Pattern Recognition (CVPR), June 2021. [Abstract, Paper: PDF (1.7MB)] |
CHI 2021 |
User Authentication via Electrical Muscle Stimulation Yuxin Chen, Zhuolin Yang, Ruben Abbou, Pedro Lopes, Ben Y. Zhao, Haitao Zheng Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI), Yokohama Japan, April 2021. [Project Homepage, Youtube Video, Paper: PDF (4.8MB)] |
2020 |
|
CCS 2020 |
Gotta Catch 'em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao Proceedings of ACM Conference on Computer and Communications Security (CCS), Orlando, FL, November 2020. [Abstract, Paper: PDF (806KB)] |
CIKM 2020 |
Deep Graph Convolution Networks for Incident-driven Traffic Speed Prediction Qinge Xie, Tiancheng Guo, Yang Chen, Yu Xiao, Xin Wang, Ben Y. Zhao Proceedings of the 29th ACM International Conference on Information and Knowledge Management (CIKM), Galway Ireland, October 2020. [Abstract, Paper: PDF (2.8MB)] |
USENIX Security 2020 |
Fawkes: Protecting Privacy against Unauthorized Deep Learning Models Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao Proceedings of USENIX Security Symposium (USENIX Security), Boston, MA, August 2020. Project webpage for downloads & source code. [Abstract, Paper: PDF (946KB)] |
CHI 2020 |
Detecting Gender Stereotypes: Lexicon vs. Supervised Learning Methods Jenna Cryan, Shiliang Tang, Xinyi Zhang, Miriam Metzger, Haitao Zheng, Ben Y. Zhao Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI), Honolulu, HI, April 2020. Best paper honorable mention award. [Abstract, Paper: PDF (1.3MB)] |
CHI 2020 |
Wearable Microphone Jamming Yuxin Chen, Huiying Li, Shan-Yuan Teng, Steven Nagels, Zhijing Li, Pedro Lopes, Ben Y. Zhao, Haitao Zheng Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI), Honolulu, HI, April 2020. Best paper honorable mention award. [Abstract, Paper: PDF (1.2MB)] [Two-minute demo video (30MB)] NYTimes Article, More Press: UK, India, France, Brazil, Russia, Latvia, Mexico, Germany, China, and more |
NDSS 2020 |
Et Tu Alexa? When Commodity WiFi Devices Turn into
Adversarial Motion Sensors Yanzi Zhu, Zhujun Xiao, Yuxin Chen, Zhijing Li, Max Liu, Ben Y. Zhao, Haitao Zheng Proceedings of Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2020. [Abstract, Paper: PDF (684KB)] |
2019 |
|
CCS 2019 |
Latent Backdoor Attacks on Deep Neural Networks Yuanshun Yao, Huiying Li, Haitao Zheng, Ben Y. Zhao Proceedings of ACM Conference on Computer and Communications Security (CCS), London UK, November 2019. [Abstract, Paper: PDF (2.9MB)] |
SIGCOMM 2019 |
Safely and Automatically Updating In-Network ACL
Configurations with Intent Language Bingchuan Tian, Xinyi Zhang, Ennan Zhai, Hongqiang Harry Liu, Qiaobo Ye, Chunsheng Wang, Xin Wu, Zhiming Ji, Yihong Sang, Ming Zhang, Da Yu, Chen Tian, Haitao Zheng, Ben Y. Zhao Proceedings of ACM SIGCOMM, Beijing, China, August 2019. [Abstract, Paper: PDF (1.1MB)] |
MobiHoc 2019 |
Scaling Deep Learning Models for Spectrum Anomaly
Detection Zhijing Li, Zhujun Xiao, Bolun Wang, Ben. Y. Zhao and Haitao Zheng Proceedings of 20th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Catania, Italy, July 2019. [Abstract, Paper: PDF (1.05MB)] |
IEEE
S&P 2019 |
Neural Cleanse: Identifying and Mitigating Backdoor
Attacks in Neural Networks Bolun Wang, Yuanshun Yao, Shawn Shan, Huiying Li, Bimal Viswanath, Haitao Zheng and Ben Y. Zhao Proceedings of 40th IEEE Symposium on Security and Privacy (Oakland), San Francisco CA, May 2019. [Abstract, Paper: PDF (639KB)] |
HICSS 2019 |
Towards Understanding the Adoption and Social Experience
of Digital Wallet Systems Shiliang Tang, Ziming Wu, Xinyi Zhang, Gang Wang, Xiaojuan Ma, Haitao Zheng and Ben Y. Zhao Proceedings of Hawaii International Conference on System Sciences, Maui HI, January 2019. [Paper: PDF (266KB)] |
2018 |
|
IMC 2018 |
Predictive Analysis in Network Function Virtualization
Zhijing Li, Zihui Ge, Ajay Mahimkar, Jia Wang, Ben Y. Zhao, Haitao Zheng, Joanne Emmons, and Laura Ogden Proceedings of 18th ACM SIGCOMM Internet Measurement Conference (IMC), Boston MA, November 2018. [Abstract, Paper: PDF (231KB)] |
CSCW 2018 |
Understanding Motivations behind Inaccurate Check-ins
Fengli Xu, Guozhen Zhang, Jiaxin Huang, Yong Li, Diyi Yang, Ben Y. Zhao, and Fanchao Meng Proceedings of 21st ACM conference on Computer-Supported Cooperative Work and Social Computing (CSCW), Jersey City, NJ, November 2018. [Abstract, Paper: PDF (2.6MB)] |
CSCW 2018 |
Gender Bias in the Job Market: a Longitudinal Analysis
Shiliang Tang, Xinyi Zhang, Jenna Cryan, Miriam Metzger, Haitao Zheng and Ben Y. Zhao Proceedings of 21st ACM conference on Computer-Supported Cooperative Work and Social Computing (CSCW), Jersey City, NJ, November 2018. [Abstract, Paper: PDF (739KB)] |
USENIX Security 2018 |
With Great Training Comes Great Vulnerability: Practical
Attacks against Transfer Learning Bolun Wang, Yuanshun Yao, Bimal Viswanath, Haitao Zheng and Ben Y. Zhao Proceedings of 27th USENIX Security Symposium, Baltimore, MD, August 2018. [Abstract, Paper: PDF (3MB)] |
ACM/IEEE TON 2018 |
Ghost Riders: Sybil Attacks on Crowdsourced Mobile
Mapping Services Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng and Ben Y. Zhao ACM/IEEE Transactions on Networking, Vol. 26, No. 3, Pgs. 1123-1136, June 2018. [Abstract, Paper: PDF (2.2MB)] |
HyperText 2018 |
Penny Auctions are Predictable: Predicting and profiling
user behavior on DealDash Xinyi Zhang, Shawn Shan, Shiliang Tang, Haitao Zheng and Ben Y. Zhao Proceedings of ACM Conference on Hypertext and Social Media (HT), Baltimore, MD, July 2018. [Paper: PDF (823KB)] |
ICWSM 2018 |
DeepCredit: Clickstream-based model for loan Risk
Prediction in P2P Lending Zhi Yang, Yusi Zhang, Binghui Guo, Ben Y. Zhao and Yafei Dai Proceedings of International AAAI Conference on Web and Social Media (ICWSM), Stanford, CA, June 2018. [Paper: PDF (750KB)] |
JCMC 2018 |
Benefits of Browsing? The Prevalence, Nature, and Effects
of Profile Consumption Behavior in Social Network Sites
Miriam Metzger, Christo Wilson and Ben Y. Zhao Journal of Computer-Mediated Communication, Vol. 23, No. 2, Pgs. 72-89 March 2018. [Abstract, Paper: PDF (429 KB)] |
HotMobile 2018 |
Adversarial Localization against Wireless Cameras Zhijing Li, Zhujun Xiao, Yanzi Zhu, Irene Pattarachanyakul, Ben Y. Zhao, Haitao Zheng Proceedings of 19th International Workshop on Mobile Computing Systems and Applications (HotMobile), Tempe AZ, February 2018. [Paper: PDF (1.5MB)] |
2017 |
|
CIKM 2017 |
On Migratory Behavior in Video Consumption Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin and Ben Zhao Proceedings of ACM International Conference on Information and Knowledge Management (CIKM), Singapore, November 2017. [Paper: PDF (996KB)] |
IMC 2017 |
Complexity vs. Performance: Empirical Analysis of Machine
Learning as a Service Yuanshun Yao, Zhujun Xiao, Bolun Wang, Bimal Viswanath, Haitao Zheng and Ben Y. Zhao Proceedings of the 17th ACM SIGCOMM Internet Measurement Conference (IMC), London, UK, November 2017. [Abstract, Paper: PDF (2MB)] |
CCS 2017 |
Automated Crowdturfing Attacks and Defenses in Online
Review Systems Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng and Ben Y. Zhao Proceedings of ACM Conference on Computer and Communications Security (CCS), Dallas, TX, October 2017. [Abstract, Paper: PDF (2MB)] |
FOCI 2017 |
SecurePost: Verified Group-Anonymity on Social Media
Michael Nekrasov, Daniel Iland, Miriam Metzger, Ben Zhao and Elizabeth Belding Proceedings of 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI), Vancouver, Canada, August 2017. [Paper: PDF (611KB)] |
MobiSys 2017 |
Object Recognition and Navigation using a Single
Networking Device Yanzi Zhu, Yuanshun Yao, Ben Y. Zhao and Haitao Zheng Proceedings of 15th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), Niagara Falls, NY, June 2017. [Abstract, Paper: PDF (1.34MB)] |
ACM TWeb 2017 |
Clickstream User Behavior Models Gang Wang, Xinyi Zhang, Shiliang Tang, Christo Wilson, Haitao Zheng, and Ben Y. Zhao ACM Transactions on the Web (TWEB), Vol. 11, Issue 4, #21, July 2017. [Abstract, Paper: PDF (2.7MB)] |
ICWSM 2017 |
Echo Chambers in Investment Discussion Boards Shiliang Tang, Qingyun Liu, Megan McQueen, Scott Counts, Apurv Jain, Haitao Zheng, and Ben Y. Zhao Proceedings of International AAAI Conference on Web and Social Media (ICWSM), Montreal, Canada, May 2017. [Abstract, Paper: PDF (412KB)] |
ICWSM 2017 |
Cold Hard E-Cash: Friends and Vendors in the Venmo
Digital Payments System Xinyi Zhang, Shiliang Tang, Yun Zhao, Gang Wang, Haitao Zheng, and Ben Y. Zhao Proceedings of International AAAI Conference on Web and Social Media (ICWSM), Montreal, Canada, May 2017. [Abstract, Paper: PDF (272KB)] |
ICWSM 2017 |
A First Look at User Switching Behaviors Over Multiple
Video Content Providers Huan Yan, Tzu-Heng Lin, Gang Wang, Yong Li, Haitao Zheng, Depeng Jin, Ben Y. Zhao Proceedings of International AAAI Conference on Web and Social Media (ICWSM), Montreal, Canada, May 2017. Paper: PDF (713KB) |
ICA 2017 |
Passive Social Interaction in Social Networking Sites
Miriam Metzger, Christo Wilson, Ben Y. Zhao Proceedings of the 67th Annual International Communication Association Conference (ICA), San Diego, CA, May 2017. |
ACM TWeb 2017 |
Value and Misinformation in Collaborative Investing
Platforms Tianyi Wang, Gang Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Xing Li, Haitao Zheng and Ben Y. Zhao ACM Transactions on the Web (TWEB), Vol. 11, No. 2, May 2017. [Abstract, Paper: PDF (1.5MB)] |
WWW 2017 |
Identifying Value in Crowdsourced Wireless Signal
Measurements Zhijing Li, Ana Nika, Xinyi Zhang, Yanzi Zhu, Yuanshun Yao, Ben Y. Zhao and Haitao Zheng Proceedings of the 26th World Wide Web Conference (WWW), Perth, Australia, April 2017. [Abstract, Paper: PDF (266KB)] |
IEEE TCCN 2017 |
Towards Practical Spectrum Permits Ana Nika, Zengbin Zhang, Ben Y. Zhao and Haitao Zheng IEEE Transactions on Cognitive Communications and Networking (TCCN), Vol. 3, No. 1, Pgs. 1-11, March 2017. [Abstract, Paper: PDF (945KB)] |
2016 |
|
HotNets 2016 |
Trimming the Smartphone Network Stack Yanzi Zhu, Yibo Zhu, Ana Nika, Ben Y. Zhao, Haitao Zheng Proceedings of the 15th ACM Workshop on Hot Topics in Networks (HotNets) Atlanta, GA, November 2016. [Abstract, Paper: PDF (200KB)] |
ACM TOMPECS 2016 |
Self-similarity in Social Network Dynamics Qingyun Liu, Xiaohan Zhao, Walter Willinger, Xiao Wang, Ben Y. Zhao and Haitao Zheng ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS), Vol. 2, No. 5, Pgs. 1-26, November 2016. [Abstract, Paper: PDF (1.9MB)] |
IMC 2016 |
Network Growth and Link Prediction Through an Empirical
Lens Qingyun Liu, Shiliang Tang, Xinyi Zhang, Xiaohan Zhao, Ben Y. Zhao and Haitao Zheng Proceedings of the 16th ACM SIGCOMM Internet Measurement Conference (IMC), Santa Monica, CA, November 2016. [Abstract, Paper: PDF (350KB)] |
IMC 2016 |
Anatomy of a Personalized Livestreaming System Bolun Wang, Xinyi Zhang, Gang Wang, Haitao Zheng, Ben Y. Zhao. Proceedings of the 16th ACM SIGCOMM Internet Measurement Conference (IMC), Santa Monica, CA, November 2016. [Abstract, Paper: PDF (1.3MB)] |
SenSys 2016 |
Empirical Validation of Commodity Spectrum Monitoring
Ana Nika, Zhijing Li, Yanzi Zhu, Yibo Zhu, Ben Y. Zhao, Xia Zhou, and Haitao Zheng Proceedings of ACM Conference on Embedded Networked Sensor Systems (SenSys) Stanford, CA, November 2016. [Abstract, Paper: PDF (3.8MB)] |
IWQoS 2016 |
On the Performance of Cloud Storage Applications with
Global Measurement Guangyuan Wu, Fangming Liu, Haowen Tang, Keke Huang, Qixia Zhang, Zhenhua Li, Ben Y. Zhao, Hai Jin Proceedings of ACM/IEEE International Symposium on Quality of Service (IWQoS) Beijing, China, June 2016. [Paper: PDF (315KB)] |
ICWSM 2016 |
"Will Check-in for Badges": Understanding Bias and
Misbehavior on Location-based Social Networks Gang Wang, Sarita Y. Schoenebeck, Haitao Zheng, Ben Y. Zhao Proceedings of 10th International AAAI Conference on Web and Social Media (ICWSM) Cologne, Germany, May 2016. [Abstract, Paper: PDF (183KB)] |
MobiSys 2016 |
Defending against Sybil Devices in Crowdsourced Mapping
Services Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao Proceedings of 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys) Singapore, June 2016. [Abstract, Paper: PDF (1.8MB)] |
FCS 2016 |
The Power of Comments: Fostering Social Interactions in
Microblog Networks Tianyi Wang, Yang Chen, Yi Wang, Bolun Wang, Gang Wang, Xing Li, Haitao Zheng, Ben Y. Zhao Frontiers of Computer Science, Vol. 10, No. 5, Pgs. 889-907, 2016 [Paper: PDF (1.08MB)] |
CHI 2016 |
Unsupervised Clickstream Clustering For User Behavior
Analysis Gang Wang, Xinyi Zhang, Shiliang Tang, Haitao Zheng, Ben Y. Zhao Proceedings of SIGCHI Conference on Human Factors in Computing Systems (CHI) San Jose, CA May 2016. [Abstract, Paper: PDF (1.09MB)] |
NSDI 2016 |
Exploring Cross-Application Cellular Traffic Optimization
with Baidu TrafficGuard Zhenhua Li, Weiwei Wang, Tianyin Xu, Xin Zhong, Xiang-Yang Li, Yunhao Liu, Christo Wilson, Ben Y. Zhao Proceedings of 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI) Santa Clara, CA March 2016. [Abstract, Paper: PDF (1.4MB)] |
MONET 2016 |
Understanding and Predicting Data Hotspots in Cellular
Networks Ana Nika, Asad Ismail, Ben Y. Zhao, Sabrina Gaito, Gian Paolo Rossi, Haitao Zheng, Mobile Networks and Applications, Vol. 21, No. 3, Pg. 402-413, June 2016. |
2015 |
|
COSN 2015 |
Towards Graph Watermarks Xiaohan Zhao, Qingyun Liu, Haitao Zheng, and Ben Y. Zhao. Proceedings of 3rd ACM Conference in Online Social Networks (COSN) Stanford, CA, November 2015. [Abstract, Paper: PDF (750KB)] |
COSN 2015 |
Process-driven Analysis of Dynamics in Online Social
Interactions Zhi Yang, Jilong Xue, Christo Wilson, Ben Y. Zhao and Yafei Dai. Proceedings of 3rd ACM Conference in Online Social Networks (COSN) Stanford, CA, November 2015. [Paper: PDF (835KB)] |
Mobicom 2015 |
Reusing 60GHz Radios for Mobile Radar Imaging Yanzi Zhu, Yibo Zhu, Ben Y. Zhao and Haitao Zheng. Proceedings of 21st Annual International Conference on Mobile Computing and Networking (MobiCom) Paris, France, September 2015. [Abstract, Paper: PDF (877KB)] |
SIGCOMM 2015 |
Packet-Level Telemetry in Large Datacenter Networks Yibo Zhu, Nanxi Kang, Jiaxin Cao, Albert Greenberg, Guohan Lu, Ratul Mahajan, Dave Maltz, Lihua Yuan, Ming Zhang, Ben Y. Zhao and Haitao Zheng. Proceedings of ACM SIGCOMM London, UK, August 2015. [Abstract, Paper: PDF (476KB)] |
ICWSM 2015 |
Uncovering User Interaction Dynamics in Online Social
Networks Zhi Yang, Jilong Xue, Christo Wilson, Ben Y. Zhao, and Yafei Dai. Proceedings of International AAAI Conference on Weblogs and Social Media (ICWSM) Oxford, UK, May 2015. [Abstract, Paper: PDF (2MB)] |
WWW 2015 |
Energy and Performance of Smartphone Radio Bundling in
Outdoor Environments Ana Nika, Yibo Zhu, Ning Ding, Abhilash Jindal, Y. Charlie Hu, Xia Zhou, Ben Y. Zhao and Haitao Zheng Proceedings of 24th International World Wide Web Conference (WWW) Florence, Italy, May 2015. [Abstract, Paper: PDF (572KB)] |
HotMobile 2015 |
60GHz Mobile Imaging Radar Yibo Zhu, Yanzi Zhu, Zengbin Zhang, Ben Y. Zhao, Haitao Zheng Proceedings of 16th Workshop on Mobile Computing Systems and Applications (HotMobile) Santa Fe, NM, February 2015. [Abstract, Paper: PDF (549KB)] |
CSCW 2015 |
Crowds on Wall Street: Extracting Value from
Collaborative Investing Platforms Gang Wang, Tianyi Wang, Bolun Wang, Divya Sambasivan, Zengbin Zhang, Haitao Zheng, Ben Y. Zhao Proceedings of 18th ACM conference on Computer-Supported Cooperative Work and Social Computing (CSCW) Vancouver, Canada, March 2015. [Abstract, Paper: PDF (537KB)] |
ACM/IEEE ToN 2015 |
Practical Conflict Graphs in the Wild Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao and Haitao Zheng ACM Transactions on Networking (TON), Vol. 23, No. 3, Pgs 824-835, June 2015. [Abstract, Paper: PDF (1.7MB)] |
2014 |
|
IMC 2014 |
Whispers in the Dark: Analysis of an Anonymous Social
Network Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao Proceedings of the 14th ACM SIGCOMM Internet Measurement Conference (IMC) Vancouver, Canada, November 2014. [Abstract, Paper: PDF (337KB)] |
HotWireless 2014 |
Towards Commoditized Real-time Spectrum Monitoring Ana Nika, Zengbin Zhang, Xia Zhou, Ben Y. Zhao, Haitao Zheng Proceedings of First ACM Workshop on Hot Topics in Wireless (HotWireless) Maui, HI, September 2014. [Abstract, Paper: PDF (237KB)] |
Mobicom 2014 |
Cutting the Cord: A Robust Wireless Facilities Network
for Data Centers Yibo Zhu, Xia Zhou, Zengbin Zhang, Lin Zhou, Amin Vahdat, Ben Y. Zhao, Haitao Zheng Proceedings of 20th Annual International Conference on Mobile Computing and Networking (MobiCom) Maui, HI, September 2014. [Abstract, Paper: PDF (614KB)] |
Mobicom 2014 |
Demystifying 60GHz Outdoor Picocells Yibo Zhu, Zengbin Zhang, Zhinous Marzi, Chris Nelson, Upamanyu Madhow, Ben Y. Zhao, Haitao Zheng Proceedings of 20th Annual International Conference on Mobile Computing and Networking (MobiCom) Maui, HI, September 2014. [Abstract, Paper: PDF (975KB)] |
QShine 2014 |
Understanding Data Hotspots in Cellular Networks Ana Nika, Asad Ismail, Ben Y. Zhao, Sabrina Gaito, Haitao Zheng Proceedings of 10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine) Rhodes, Greece, August 2014. [Paper: PDF (613KB)] |
USENIX Security 2014 |
Man vs. Machine: Practical Adversarial Detection of
Malicious Crowdsourcing Workers Gang Wang, Tianyi Wang, Haitao Zheng, and Ben Y. Zhao Proceedings of 23rd USENIX Security Symposium (Usenix Security) San Diego, CA, August 2014. [Abstract, Paper: PDF (595KB)] |
ICWSM 2014 |
Link and Triadic Closure Delay: Temporal Metrics for
Social Network Dynamics Matteo Zignani, Sabrina Gaito, Gian Paolo Rossi, Xiaohan Zhao, Haitao Zheng, Ben Y. Zhao Proceedings of 8th AAAI International Conference on Weblogs and Social Media (ICWSM). Ann Arbor, MI, June 2014. [Abstract, Paper: PDF (1.2MB)] |
TKDD 2014 |
Uncovering Social Network Sybils in the Wild Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y. Zhao and Yafei Dai ACM Transactions on Knowledge Discovery from Data (TKDD), Vol. 8, No. 1, Pgs. 1-29, February 2014. [Abstract, Paper: PDF (1.5MB)] |
IEEE TMC 2014 |
Preserving Location Privacy in Geo-Social Applications
Krishna P. N. Puttaswamy, Shiyuan Wang, Troy Steinbauer, Divyakant Agrawal, Amr El Abbadi, Christopher Kruegel and Ben Y. Zhao IEEE Transactions on Mobile Computing, Vol. 13, No. 1, Pgs 159-173, January 2014. [Abstract, Paper: PDF (1.07 MB)] |
2013 |
|
HotNets 2013 |
On the Validity of Geosocial Mobility Traces Zengbin Zhang, Lin Zhou, Xiaohan Zhao, Gang Wang, Yu Su, Miriam Metzger, Haitao Zheng and Ben Y. Zhao Proceedings of ACM Workshop on Hot Topics in Networks (HotNets-XII). College Park, MD, November, 2013. [Abstract, Paper: PDF (362KB)] |
VLDB 2014 |
On the Embeddability of Random Walk Distances Xiaohan Zhao, Adelbert Chang, Atish Das Sarma, Haitao Zheng and Ben Y. Zhao Proceedings of the VLDB Endowment, Vol. 6, No. 14, Pgs. 1690-1701, September 2013. Presentation at the 40th International Conference on Very Large Data Bases (VLDB/PVLDB), Hangzhou, China, September, 2014. [Abstract, Paper: PDF (490KB)] |
ACM TWeb 2013 |
Understanding Latent Interactions in Online Social
Networks Jing Jiang, Christo Wilson, Xiao Wang, Wenpeng Sha, Peng Huang, Yafei Dai and Ben Y. Zhao ACM Transactions on the Web (TWEB), Vol. 7, No. 4, October 2013. [Abstract, Paper: PDF (3MB)] |
Middleware 2013 |
Efficient Batched Synchronization in Dropbox-like Cloud
Storage Services Zhenhua Li, Christo Wilson, Zhefu Jiang, Yao Liu, Ben Zhao, Cheng Jin, Zhi-Li Zhang and Yafei Dai Proceedings of ACM International Middleware Conference (Middleware) Beijing, China, December, 2013. [Paper: PDF (370KB)] |
IMC 2013 |
Follow the Green: Growth and Dynamics in Twitter Follower
Markets Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, Ben Y. Zhao Proceedings of The 13th ACM SIGCOMM Internet Measurement Conference (IMC) Barcelona, Spain, October 2013. [Abstract, Paper: PDF (1.29MB)] |
USENIX Security 2013 |
You are How You Click: Clickstream Analysis for Sybil
Detection Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng and Ben Y. Zhao Proceedings of the 22nd USENIX Security Symposium Washington, DC, August 2013. [Abstract, Paper: PDF (498KB)] |
SIGMETRICS 2013 |
Practical Conflict Graphs for Dynamic Spectrum
Distribution Xia Zhou, Zengbin Zhang, Gang Wang, Xiaoxiao Yu, Ben Y. Zhao and Haitao Zheng Proceedings of ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS) Best Practical Paper Award Pittsburgh, PA, June 2013. [Abstract, Paper: PDF (1.3MB)] |
WWW 2013 |
Wisdom in the Social Crowd: an Analysis of Quora Gang Wang, Konark Gill, Manish Mohanlal, Haitao Zheng and Ben Y. Zhao Proceedings of The 22nd International World Wide Web Conference (WWW) Rio de Janeiro, Brazil, May 2013. [Abstract, Paper: PDF (2.5MB)] |
NDSS 2013 |
Social Turing Tests: Crowdsourcing Sybil Detection Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam Metzger, Haitao Zheng and Ben Y. Zhao Proceedings of the 20th Network & Distributed System Security Symposium (NDSS) San Diego, CA, February 2013. [Abstract, Paper: PDF (453KB)] |
2012 |
|
IMC 2012 |
Multi-scale Dynamics in a Massive Online Social Network
Xiaohan Zhao, Alessandra Sala, Christo Wilson, Xiao Wang, Sabrina Gaito, Haitao Zheng and Ben Y. Zhao Proceedings of The 12th ACM SIGCOMM Internet Measurement Conference (IMC) Boston, MA, November 2012. [Abstract, Paper: PDF (607KB)] |
ACM TWeb 2012 |
Beyond Social Graphs: User Interactions in Online Social
Networks and their Implications Christo Wilson, Alessandra Sala, Krishna P. N. Puttaswamy, and Ben Y. Zhao ACM Transactions on the Web (TWEB), Vol. 6, No. 4, Article 17, November 2012 [Abstract, Paper: PDF (2.3MB)] |
HotSocial 2012 |
On the Bursty Evolution of Online Social Networks Sabrina Gaito, Matteo Zignani, Gian Paolo Rossi, Alessandra Sala, Xiaohan Zhao, Haitao Zheng and Ben Y. Zhao Proceedings of ACM KDD HotSocial Workshop Beijing, China, August 2012. [Abstract, Paper: PDF (400KB)] |
SIGCOMM 2012 |
Mirror Mirror on the Ceiling: Flexible Wireless Links for
Data Centers Xia Zhou, Zengbin Zhang, Yibo Zhu, Yubo Li, Saipriya Kumar, Amin Vahdat, Ben Y. Zhao and Haitao Zheng Proceedings of ACM SIGCOMM Helsinki, Finland, August 2012. [Abstract, Paper: PDF (634KB)] |
WOSN 2012 |
Shortest Paths in Less Than a Millisecond Rachit Agarwal, Matthew Caesar, P. Brighten Godfrey and Ben Y. Zhao Proceedings of SIGCOMM Workshop on Online Social Networks (WOSN) Helsinki, Finland, August 2012. [Abstract, Paper: PDF (332KB)] |
IEEE TMC 2012 |
Measurement-based Design of Roadside Content Delivery
Systems Vinod Kone, Haitao Zheng, Ant Rowstron, Greg O'Shea and Ben Y. Zhao IEEE Transactions on Mobile Computing, Vol. 12, No. 6, Pgs. 1160-1173, June 2013. Featured Spotlight paper [Abstract, Paper: PDF (1.39MB)] |
MobiHoc 2012 |
Enforcing Dynamic Spectrum Access with Spectrum Permits
Lei Yang, Zengbin Zhang, Ben Y. Zhao, Christopher Kruegel and Haitao Zheng Proceedings of 13th International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) Hilton Head Island, SC, June 2012. [Abstract, Paper: PDF (653KB)] |
ACM/IEEE ToN 2012 |
The Effectiveness of Opportunistic Spectrum Access: A
Measurement Study Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao and Haitao Zheng ACM/IEEE Transactions on Networking, Vol. 20, Number 6, Pgs 2005-2016, December 2012 [Abstract, Paper: PDF (1.41MB)] |
ICA 2012 |
Invisible Interactions: What Latent Social Interaction
Can Tell Us about Social Relationships in Social Networking
Sites Miriam Metzger, Christo Wilson, Rebekah Pure, Ben Y. Zhao. Proceedings of the International Communication Association Conference (ICA) Phoenix, AZ, May 2012. [Paper: PDF (510KB)] |
WWW 2012 |
Serf and Turf: Crowdturfing for Fun and Profit Gang Wang, Christo Wilson, Xiaohan Zhao, Yibo Zhu, Manish Mohanlal, Haitao Zheng and Ben Y. Zhao Proceedings of The 21st International World Wide Web Conference (WWW) Lyon, France, April 2012. [Abstract, Paper: PDF (504KB)] |
2011 |
|
Middleware 2011 |
Scaling Microblogging Services with Divergent Traffic
Demands Tianyin Xu, Yang Chen, Lei Jiao, Ben Y. Zhao, Pan Hui and Xiaoming Fu Proceedings of The ACM/IFIP/USENIX 12th International Middleware Conference (Middleware) Lisboa, Portugal, December 2011. [Paper: PDF (2.3MB)] |
HotNets 2011 |
3D Beamforming for Wireless Data Centers Weile Zhang, Xia Zhou, Lei Yang, Zengbin Zhang, Ben Y. Zhao and Haitao Zheng Proceedings of 10th ACM Workshop on Hot Topics in Networks (HotNets-X) Cambridge, MA, November 2011. [Abstract, Paper: PDF (392KB)] |
IMC 2011 |
Sharing Graphs using Differentially Private Graph Models
Alessandra Sala, Xiaohan Zhao, Christo Wilson, Haitao Zheng and Ben Y. Zhao Proceedings of The 11th ACM SIGCOMM Internet Measurement Conference (IMC) Berlin, Germany, November 2011. [Abstract, Paper: PDF (461KB)] |
IMC 2011 |
Uncovering Social Network Sybils in the Wild Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y. Zhao and Yafei Dai Proceedings of The 11th ACM SIGCOMM Internet Measurement Conference (IMC) Berlin, Germany, November 2011. [Abstract, Paper: PDF (537KB)] |
CollaborateCom 2011 |
Efficient Shortest Paths on Massive Social Graphs Xiaohan Zhao, Alessandra Sala, Haitao Zheng and Ben Y. Zhao (Invited Paper) Proceedings of 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom) Orlando, FL, October 2011. [Abstract, Paper: PDF (228KB)] |
SoCC 2011 |
Silverline: Toward Data Confidentiality in
Storage-Intensive Cloud Applications Krishna P. N. Puttaswamy, Chris Kruegel and Ben Y. Zhao Proceedings of The 2nd ACM Symposium on Cloud Computing (SoCC) Cascais, Portugal, October 2011. [Abstract, Paper: PDF (762KB)] |
Mobicom 2011 |
I Am the Antenna: Accurate Outdoor AP Location using
Smartphones Zengbin Zhang, Xia Zhou, Weile Zhang, Yuanyang Zhang, Gang Wang, Ben Y. Zhao, and Haitao Zheng Proceedings of The 17th Annual International Conference on Mobile Computing and Networking (MobiCom) Las Vegas, NV, September 2011. [Abstract, Paper: PDF (648KB)] |
Book
Chapter 2011 |
Invisible Interactions: What Latent Social Interaction
Can Tell Us about Social Relationships in Social Networking
Sites Miriam Metzger, Christo Wilson, Rebekah Pure, and Ben Y. Zhao Book Chapter in Networked sociability and individualism. Technology for personal and professional relationships, Ed. Francesca Comunello. IGI Global Publishing, November 2011. |
HotMobile 2011 |
Privacy, Availability and Economics in the Polaris Mobile
Social Network Christo Wilson, Troy Steinbauer, Gang Wang, Alessandra Sala, Haitao Zheng and Ben Y. Zhao Proceedings of 12th ACM Workshop on Mobile Computing Systems and Applications (HotMobile) Phoenix, AZ, March 2011. [Abstract, Paper: PDF (187KB)] |
CCR 2011 |
AirLab: Consistency, Fidelity and Privacy in Wireless
Measurements Vinod Kone, Mariya Zheleva, Mike Wittie, Ben Y. Zhao, Elizabeth Belding, Haitao Zheng, Kevin Almeroth ACM Computer Communication Review (CCR), Vol. 41, No. 1, Pgs. 60-65, January 2011. [Abstract, Paper: PDF (701KB)] |
CCR 2011 |
Papyrus: A Software Platform for Distributed Dynamic
Spectrum Sharing Using SDRs Lei Yang, Zengbin Zhang, Wei Hou, Ben Y. Zhao, and Haitao Zheng ACM Computer Communication Review (CCR), Vol. 41, No. 1, Pgs. 32-37, January 2011. [Abstract, Paper: PDF (904KB)] |
2010 |
|
ECR 2010 |
The Design of a Reliable Reputation System Gayatri Swamynathan, Kevin Almeroth and Ben Y. Zhao Electronic Commerce Research Journal, Special Issue on Trust and Privacy Aspects of Electronic Commerce, Vol. 10, No. 3-4, Pages 239-270, 2010. [Abstract, Paper: PDF (855KB)] |
MONET 2010 |
The Impact of Infostation Density on Vehicular Data
Dissemination Vinod Kone, Haitao Zheng, Antony Rowstron and Ben Y. Zhao ACM Mobile Networking and Applications (MONET), November 2010. [Abstract, Paper: PDF (377KB)] |
TPDS 2010 |
Protector: a Probabilistic Failure Detector for
Cost-effective Peer-to-Peer Storage Zhi Yang, Jing Tian, Wei Chen, Ben Y. Zhao and Yafei Dai IEEE Transactions on Parallel and Distributed Systems (TPDS), September 2011, Vol. 22, No. 9, Pages 1514-1527. [PDF (1.27MB)] |
IMC 2010 |
Understanding Latent Interactions in Online Social
Networks Jing Jiang, Christo Wilson, Xiao Wang, Peng Huang, Wenpeng Sha, Yafei Dai and Ben Y. Zhao Proceedings of The 10th ACM SIGCOMM Internet Measurement Conference (IMC) Melbourne, Australia, November, 2010. [Abstract, Paper: PDF (778KB)] |
IMC 2010 |
Detecting and Characterizing Social Spam Campaigns Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Yan Chen and Ben Y. Zhao Proceedings of The 10th ACM SIGCOMM Internet Measurement Conference (IMC) Melbourne, Australia, November, 2010. [Abstract, Paper: PDF (1.6MB)] |
IMC 2010 |
On the Feasibility of Effective Opportunistic Spectrum
Access Vinod Kone, Lei Yang, Xue Yang, Ben Y. Zhao and Haitao Zheng Proceedings of The 10th ACM SIGCOMM Internet Measurement Conference (IMC) Melbourne, Australia, November, 2010. [Abstract, Paper: PDF (1.29MB)] |
Mobicom 2010 |
The Spaces Between Us: Setting and Maintaining Boundaries
in Wireless Spectrum Access Lei Yang, Ben Y. Zhao and Haitao Zheng Proceedings of The 16th Annual International Conference on Mobile Computing and Networking (MobiCom) Chicago IL, September, 2010. [Abstract, Paper: PDF (356 KB), Compressed Postscript (516 KB)] |
PODC 2010 |
Brief Announcement: Revisiting the Power-law Degree
Distribution for Social Graph Analysis Alessandra Sala, Sabrina Gaito, Gian Paolo Rossi, Haitao Zheng and Ben Y. Zhao Proceedings of The 29th Annual Symposium of Principles of Distributed Computing (PODC) July 2010, Zurich Switzerland. |
WOSN 2010 |
Orion: Shortest Path Estimation for Large Social Graphs
Xiaohan Zhao, Alessandra Sala, Christo Wilson, Haitao Zheng and Ben Y. Zhao Proceedings of The 3rd Workshop on Online Social Networks (WOSN) Boston MA, June 2010. [Abstract, Paper: PDF (173 KB)] |
WOSN 2010 |
Don't Tread on Me: Moderating Access to OSN Data with
SpikeStrip Christo Wilson, Alessandra Sala, Joseph Bonneau, Robert Zablit and Ben Y. Zhao Proceedings of The 3rd Workshop on Online Social Networks (WOSN) Boston MA, June 2010. [Abstract, Paper: PDF (195 KB)] |
SECON 2010 |
Coexistence-Aware Scheduling For Wireless
System-on-a-Chip Devices Lei Yang, Vinod Kone, Xue Yang, York Liu, Ben Y. Zhao and Haitao Zheng Proceedings of The 7th IEEE Conference on Sensor, Mesh, and Ad Hoc Communications and Networks (SECON) Boston MA, June 2010. [Abstract, Paper: PDF (389 KB)] |
IPTPS 2010 |
AmazingStore: Available, Low-cost Online Storage Service
Using Cloudlets Zhi Yang, Ben Y. Zhao, Yuanjian Xing, Song Ding, Feng Xiao and Yafei Dai Proceedings of The 9th International Workshop on Peer-to-Peer Systems (IPTPS) San Jose, CA, April 2010. [Abstract, Paper: PDF (416 KB)] |
WWW 2010 |
Measurement-calibrated Graph Models for Social Network
Experiments Alessandra Sala, Lili Cao, Christo Wilson, Robert Zablit, Haitao Zheng and Ben Y. Zhao Proceedings of The 19th International World Wide Web Conference (WWW) Raleigh, NC, April 2010. [Abstract, Paper: PDF (527 KB), Compressed Postscript (337 KB)] |
NSDI 2010 |
Supporting Demanding Wireless Applications with
Frequency-agile Radios Lei Yang, Wei Hou, Lili Cao, Ben Y. Zhao and Haitao Zheng Proceedings of 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI) San Jose, CA, April 2010. [Abstract, Paper: PDF (339 KB)] |
WICON 2010 |
On Infostation Density of Vehicular Networks Vinod Kone, Haitao Zheng, Antony Rowstron and Ben Y. Zhao Proceedings of The 5th Annual International Wireless Internet Conference (WICON) Singapore, March 2010. [Abstract, Paper: PDF (198 KB), Compressed Postscript (260 KB)] |
HotMobile 2010 |
Preserving Privacy in Location-based Mobile Social
Applications Krishna Puttaswamy and Ben Y. Zhao Proceedings of 11th Workshop on Mobile Computing Systems and Applications (ACM HotMobile) Annapolis, MD, February 2010. [Abstract, Paper: PDF (403 KB), Compressed Postscript (1191 KB)] |
2009 |
|
CoNEXT 2009 |
StarClique: Guaranteeing User Privacy in Social Networks
Against Intersection Attacks Krishna P. N. Puttaswamy, Alessandra Sala, and Ben Y. Zhao Proc. of ACM Conference on emerging Networking EXperiments and Technologies (CoNEXT) 2009 Rome, Italy, December 2009. [Abstract, Paper: PDF (328 KB), Compressed Postscript (290 KB)] |
JSC 2009 |
Peer-exchange schemes to handle mismatch in peer-to-peer
systems Tongqing Qiu, Edward Chan, Mao Ye, Guihai Chen, and Ben Y. Zhao The Journal of Supercomputing, Vol. 48, No. 1, Pgs. 15-42, April, 2009. [Paper: PDF (945 KB)] |
EuroSys 2009 |
User Interactions in Social Networks and their
Implications Christo Wilson, Bryce Boe, Alessandra Sala, Krishna P. N. Puttaswamy and Ben Y. Zhao Proceedings of the 4th ACM European Conference on Computer Systems (EuroSys) Nuremburg, Germany, April 2009. [Abstract, Paper: PDF (182 KB), Compressed Postscript (158 KB)] |
INFOCOM Mini 2009 |
Rome: Performance and Anonymity using Route Meshes Krishna P. N. Puttaswamy, Alessandra Sala, Omer Egecioglu, and Ben Y. Zhao Proc. of IEEE INFOCOM 2009 Minisymposium Rio de Janeiro, Brazil, April 2009. [Abstract, Paper: PDF (124 KB), Compressed Postscript (144 KB)] |
TPDS 2009 |
Securing Structured Overlays Against Identity Attacks
Krishna P. N. Puttaswamy, Haitao Zheng and Ben Y. Zhao IEEE Transactions on Parallel and Distributed Systems, Vol. 20, No. 10, Pgs 1487-1498, October 2009. [Abstract, Paper: PDF (2 MB)] |
2008 |
|
NPSec 2008 |
Improving Anonymity using Social Links Krishna P. N. Puttaswamy, Alessandra Sala and Ben Y. Zhao Proceedings of IEEE Workshop on Secure Network Protocols (NPSec 2008) Orlando, FL, October 2008. [Abstract, Paper: PDF (164 KB), Compressed Postscript (80 KB)] |
ICNP 2008 |
Protecting Anonymity in Dynamic Peer-to-Peer Networks
Krishna P. N. Puttaswamy, Alessandra Sala, Christo Wilson, and Ben Y. Zhao Proceedings of IEEE International Conference on Network Protocols (ICNP 2008) Orlando, FL, October 2008. [Abstract, Paper: PDF (311 KB), Compressed Postscript (331 KB)] |
SRDS 2008 |
Towards Reliable Reputations for Dynamic Networked
Systems Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almeroth, and S. Rao Jammalamadaka Proceedings of IEEE Symposium on Reliable Distributed Systems (SRDS 2008) Naples, Italy, October 2008. [Abstract, Paper: PDF (156 KB), Compressed Postscript (116 KB)] |
SRDS 2008 |
Probabilistic Failure Detection for Efficient Distributed
Storage Maintenance Jing Tian, Zhi Yang, Wei Chen, Ben Y. Zhao and Yafei Dai Proceedings of IEEE Symposium on Reliable Distributed Systems (SRDS 2008) Naples, Italy, October 2008. [Abstract, Paper: PDF (762 KB)] |
WOSN 2008 |
Do Social Networks Improve e-Commerce: a Study on Social
Marketplaces Gayatri Swamynathan, Christo Wilson, Bryce Boe, Kevin C. Almeroth and Ben Y. Zhao Proceedings of the First SIGCOMM Workshop on Online Social Networks (WOSN 2008) Seattle, WA, August 2008. [Abstract, Paper: PDF (132 KB), Compressed Postscript (73 KB)] |
CROWNCom 2008 |
High Throughput Spectrum-aware Routing for Cognitive
Radio Based Ad-hoc Networks Ashwin Sampath, Lei Yang, Lili Cao, Haitao Zheng, Ben Y. Zhao Proceedings of Third International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM 2008) Singapore, May 2008. [Abstract, Paper: PDF (166 KB), Compressed Postscript (147 KB)] |
MONET 2007 |
QUORUM - QUality Of service RoUting in wireless Mesh
networks Vinod Kone, Sudipto Das, Ben Y. Zhao and Haitao Zheng ACM Mobile Networking and Applications (MONET), Vol. 12, No. 5-6, Pgs. 358-369, December 2007. [Abstract, Paper: PDF (446 KB)] |
INFOCOM 2008 |
Searching for Rare Objects using Index Replication Krishna P. N. Puttaswamy, Alessandra Sala and Ben Y. Zhao Proceedings of The 27th IEEE International Conference on Computer Communications (INFOCOM 2008) Phoenix, AZ, April 2008. [Abstract, Paper: PDF (251 KB), Compressed Postscript (138 KB)] |
2007 |
|
ICPP 2007 |
Towards Location-aware Topology in both Unstructured and
Structured P2P Systems Tongqing Qiu, Edward Chan, Mao Ye, Guihai Chen and Ben Y. Zhao Proceedings of International Conference on Parallel Processing (ICPP) XiAn, China, September 2007. [Paper: PDF (193 KB)] |
QShine 2007 |
QUORUM - QUality Of service RoUting in wireless Mesh
networks Vinod Kone, Sudipto Das, Ben Y. Zhao and Haitao Zheng Proceedings of IEEE/ICST International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine) Vancouver, Canada, August 2007. [Abstract, Paper: PDF (220 KB), Compressed Postscript (244 KB)] |
ICCCN 2007 |
Multi-channel Jamming Attacks using Cognitive Radios
Ashwin Sampath, Hui Dai, Haitao Zheng and Ben Y. Zhao Proceedings of International Conference on Computer Communications and Networks (ICCCN) Honolulu, HI, August 2007. [Paper: PDF (1 MB)] |
ICDCS 2007 |
Deploying Video-on-Demand Services on Cable Networks
Matthew Allen, Ben Y. Zhao and Rich Wolski Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS) Toronto, Canada, June 2007. [Abstract, Paper: PDF (296 KB), Compressed Postscript (112 KB)] |
ICDCS 2007 |
An Empirical Study of Collusion Behavior in the Maze P2P
File-Sharing System Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yafei Dai and Xiaoming Li Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS) Toronto, Canada, June 2007. [Abstract, Paper: PDF (887 KB), Compressed Postscript (1737 KB)] |
IWQoS 2007 |
Fairness Attacks in the Explicit Control Protocol Christo Wilson, Chris Coakley and Ben Y. Zhao Proceedings of Fifteenth IEEE International Workshop on Quality of Service (IWQoS) Nominated for Best Student Paper Award Chicago, IL, June 2007. [Abstract, Paper: PDF (163 KB), Compressed Postscript (503 KB)] |
CCPE 2007 |
Exploring the Feasibility of Proactive Reputations Gayatri Swamynathan, Ben Y. Zhao and Kevin C. Almeroth Concurrency and Computation: Practice and Experience, Special Issue on Recent Advances in Peer-to-Peer Systems and Security. Vol. 20, No. 2, Pgs 155-166. May 2007. [Paper: PDF (160 KB)] |
GI 2007 |
A Case for Unstructured Distributed Hash Tables Krishna P. N. Puttaswamy and Ben Y. Zhao Proceedings of IEEE Global Internet Symposium Anchorage, AK, May 2007. [Abstract, Paper: PDF (60 KB), Compressed Postscript (48 KB)] |
IPTPS 2007 |
HPTP: Relieving the Tension between ISPs and P2P Guobin Shen, Ye Wang, Yongqiang Xiong, Ben Y. Zhao and Zhi-Li Zhang Proceedings of the 6th International Workshop on Peer-to-Peer Systems (IPTPS) Bellevue, WA, February 2007. [Abstract, Paper: PDF (276 KB), Compressed Postscript (610 KB)] |
AiM 2007 |
Globally Decoupled Reputations for Large Distributed
Networks Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almeroth and Haitao Zheng Advances in Multimedia. Vol. 2007, No. 1. January 2007. [Paper: PDF (870 KB)] |
C5 2007 |
Scalable Access Control For Web Services Gayatri Swamynathan, Tyler Close, Sujata Banerjee, Rick McGeer, Ben Y. Zhao and Kevin C. Almeroth. Proceedings of the Fifth International Conference on Creating, Connecting and Collaborating through Computing (C5) Kyoto, Japan, January 2007. [Paper: PDF (51 KB)] |
COMSWARE 2007 |
Integrated Data Location in Multihop Wireless Networks
Irfan Sheriff, Prashanth Acharya, Ashwin Sampath, Ben Y. Zhao and Elizabeth Belding-Royer Proceedings of IEEE/Create-Net COMSWARE Bangalore, India, January 2007. [Abstract, Paper: PDF (156 KB), Compressed Postscript (216 KB)] |
2006 |
|
MILCOM 2006 |
Increasing TCP Throughput with an Enhanced Control Plane
A. Davier, L. Peterson, J. Brassil, R. McGeer, D. Reed, P. Sharma, P. Yalagandula, A. Henderson, L. Roberts, S. Schwab, R. Thomas, E. Wu, B. Mark, B. Zhao and A. Joseph Proceedings of MILCOM Washington, DC, October 2006. |
MobiShare 2006 |
Energy Consumption and Conservation in Mobile
Peer-to-Peer Systems Selim Gurun, Priya Nagpurkar and Ben Y. Zhao Proceedings of ACM MobiShare Los Angeles, CA, September 2006. [Abstract, Paper: PDF (115 KB), Compressed Postscript (148 KB)] |
MobiShare 2006 |
Location Independent Compact Routing for Wireless
Networks Robert Gilbert, Kerby Johnson, Shaomei Wu, Ben Y. Zhao and Haitao Zheng Proceedings of ACM MobiShare Los Angeles, CA, September 2006. [Abstract, Paper: PDF (115 KB), Compressed Postscript (335 KB)] |
EuroSys 2006 |
Understanding User Behavior in Large Scale
Video-on-Demand Systems Hongliang Yu, Dongdong Zheng, Ben Y. Zhao and Weimin Zheng Proceedings of the first ACM European Conference on Computer Systems (EuroSys) Leuven, Belgium, April 2006. [Abstract, Paper: PDF (1.8 MB), Compressed Postscript (2.1 MB)] |
IPTPS 2006 |
Exploring the Feasibility of Proactive Reputations Gayatri Swamynathan, Ben Y. Zhao and Kevin C. Almeroth Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS) Santa Barbara, CA, February 2006. [Abstract, Paper: PDF (76 KB), Compressed Postscript (53 KB)] |
EDBT 2006 |
Parallelizing Skyline Queries for Scalable Distribution
Ping Wu, Caijie Zhang, Ying Feng, Ben Y. Zhao, Divyakant Agrawal and Amr El Abbadi Proceedings of the 10th International Conference on Extending Database Technology (EDBT) Munich, Germany, March 2006. [Abstract, Paper: PDF (433 KB), Compressed Postscript (350 KB)] |
JCSS 2006 |
Determining Model Accuracy of Network Traces Almudena Konrad, Ben Y. Zhao, and Anthony D. Joseph Elsevier Journal of Computer and System Sciences, Vol. 72, No. 7, Pgs. 1156-1171, November 2006. [Abstract, Paper: PDF (502 KB), Compressed Postscript (335 KB)] |
MONET 2006 |
Utilization and Fairness in Spectrum Assignment for
Opportunistic Spectrum Access Chunyi Peng, Haitao Zheng, and Ben Y. Zhao ACM Mobile Networks and Applications (MONET) May 2006, Vol. 11, Pgs. 555 - 576. [Abstract, Paper: PDF (591 KB), Compressed Postscript (308 KB)] |
2005 |
|
ICNP 2005 |
Z-Ring: Fast Prefix Routing via a Low Maintenance
Membership Protocol Qiao Lian, Wei Chen, Zheng Zhang, Shaomei Wu, and Ben Y. Zhao Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP) Boston, MA, November 2005. [Abstract, Paper: PDF (581 KB)] |
NPSec 2005 |
Identity Theft Protection in Structured Overlays Lakshmi Ganesh and Ben Y. Zhao Proceedings of the 1st Workshop on Secure Network Protocols (NPSec) Boston, MA, November 2005. [Abstract, Paper: PDF (73 KB), Compressed Postscript (62 KB)] |
AEPP 2005 |
Decoupling Service and Feedback Trust in a Peer-to-Peer
Reputation System Gayatri Swamynathan, Ben Y. Zhao and Kevin Almeroth Proceedings of the 1st International Workshop on Applications and Economics of Peer-to-Peer Systems (AEPP) Nanjing, China, November 2005. [Abstract, Paper: PDF (61 KB), Compressed Postscript (49 KB)] |
PMWWMC 2005 |
Choosing an Accurate Network Model using Domain Analysis
Almudena Konrad, Ben Y. Zhao and Anthony D. Joseph Proceedings of the 1st International Workshop on Performance Modelling in Wired, Wireless, Mobile Networking and Computing Fukuoka, Japan, July, 2005. [Abstract, Paper: PDF (116 KB), Compressed Postscript (119 KB)] |
NSDI 2005 |
Cashmere: Resilient Anonymous Routing Li Zhuang, Feng Zhou, Ben Y. Zhao and Antony Rowstron Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI) Boston, MA, May, 2005. [Abstract, Paper: PDF (191 KB), Compressed Postscript (158 KB)] |
IPTPS 2005 |
Hybrid Overlay Structure Based on Random Walk Ruixiong Tian, Yongqiang Xiong, Qian Zhang, Bo Li, Ben Y. Zhao and Xing Li Proceedings of the 4th International Workshop on Peer-To-Peer Systems (IPTPS) Ithaca, NY, February, 2005. [Abstract, Paper: PDF (410 KB), Compressed Postscript (316 KB)] |
IPTPS 2005 |
Impact of Neighbor Selection on Performance and
Resilience of Structured P2P Networks Byung-Gon Chun, Ben Y. Zhao and John Kubiatowicz Proceedings of the 4th International Workshop on Peer-To-Peer Systems (IPTPS) Ithaca, NY, February, 2005. [Abstract, Paper: PDF (118 KB), Compressed Postscript (70 KB)] |
WORLDS 2005 |
Deployment of a Large-scale Peer-to-Peer Social Network
Mao Yang, Hua Chen, Ben Y. Zhao, Yafei Dai and Zheng Zhang Proceedings of the 1st Workshop on Real Large Distributed Systems (WORLDS) San Francisco, CA, December, 2004. [Abstract, Paper: PDF (462 KB), Compressed Postscript (57 KB)] |
2004
and Pre-faculty |
|
IPTPS 2004 |
Rapid Mobility via Type Indirection Ben Y. Zhao, Ling Huang, Anthony D. Joseph and John D. Kubiatowicz Proceedings of the 3rd International Workshop on Peer-to-Peer Systems (IPTPS'04) San Diego, CA. February, 2004. Also appears in Lecture Notes in Computer Science, Vol. 3279, p. 64-74, 2004. (PDF) [Abstract, Paper: PDF(120KB), Compressed Postscript(70KB)] |
ICNP 2003 |
Exploiting Routing Redundancy via Structured Peer-to-Peer
Overlays Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph and John D. Kubiatowicz Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP'03) Atlanta, GA, November 2003. [Abstract, Paper: PDF(163KB), Compressed Postscript(120KB)] |
IEEE JSAC 2004 |
Tapestry: A Resilient Global-scale Overlay for Service
Deployment Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, and John Kubiatowicz IEEE Journal on Selected Areas in Communications, January 2004, Vol. 22, No. 1, Pgs. 41-53. [Abstract, Paper: PDF(432KB), Compressed Postscript(101KB)] |
Middleware 2003 |
Approximate Object Location and Spam Filtering on
Peer-to-Peer Systems Feng Zhou, Li Zhuang, Ben Zhao, Ling Huang, Anthony Joseph and John Kubiatowicz Proceedings of ACM/IFIP/USENIX International Middleware Conference (Middleware 2003) Rio de Janeiro, Brazil, June 2003. Published in LNCS, Vol. 2672, June 2003, pgs 1-20. [Abstract, Paper: PDF(263KB), Compressed Postscript(131KB)] |
IPTPS 2003 |
Towards a Common API for Structured P2P Overlays Frank Dabek, Ben Zhao, Peter Druschel, John Kubiatowicz, and Ion Stoica Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS'03) Also as Lecture Notes in Computer Science, Vol. 2735, p. 33-44, 2003 Berkeley, CA. February 2003. [Abstract, Paper: PDF(95KB), Compressed Postscript(39KB)] |
ToCS 2004 |
Distributed Object Location in a Dynamic Network Kirsten Hildrum, John Kubiatowicz, Satish Rao and Ben Y. Zhao Theory of Computing Systems, March 2004, No. 37, Pgs. 405-440, Springer-Verlag Expanded journal version of SPAA 2002 paper. (PDF: TOCS version) [Abstract, Paper: PDF(217KB), Compressed Postscript(107KB)] |
FAST 2003 |
Pond: The OceanStore Prototype Sean Rhea, Patrick Eaton, Dennis Geels, Hakim Weatherspoon, Ben Zhao, and John Kubiatowicz Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST'03) Best Student Paper Award San Francisco, CA. March 2003 [Abstract, Paper: PDF(82KB), Compressed Postscript(116KB)] |
SPAA 2002 |
Distributed Object Location in a Dynamic Network Kirsten Hildrum, John Kubiatowicz, Satish Rao and Ben Y. Zhao Proceedings of the 14th ACM Symposium on Parallel Algorithms and Architectures (SPAA'02) Winnipeg, Canada. August 2002. [Abstract, Paper: PDF(181KB), Compressed Postscript(91KB)] |
FuDiCo 2002 |
Locality-aware Mechanisms for Large-scale Networks Ben Y. Zhao, Anthony Joseph and John Kubiatowicz Workshop on Future Directions in Distributed Computing (FuDiCo) Bertinoro, Italy. June 2002. [Abstract, Paper: PDF(31KB), Compressed Postscript(21KB)] |
IPTPS 2002 |
Brocade: Landmark Routing on Overlay Networks Ben Y. Zhao, Yitao Duan, Ling Huang, Anthony D. Joseph, and John Kubiatowicz Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02) Cambridge, MA. March 2002. Also as Lecture Notes in Computer Science, Vol. 2429, p. 34-44, 2002. (PDF) [Abstract, Paper: PDF (91KB), Compressed Postscript (62KB)] |
ACM
WiNET 2003 |
A Markov-Based Channel Model Algorithm for Wireless
Networks Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph and Reiner Ludwig ACM Baltzer Wireless Networks, Selected papers from MSWiM 2001. May 2003, Vol. 9, No. 3, Pgs. 189-199. [Abstract, Paper: PDF (321K)] |
IEEE IC 2001 |
Maintenance-Free Global Storage in OceanStore Sean Rhea, Chris Wells, Patrick Eaton, Dennis Geels, Ben Zhao, Hakim Weatherspoon, and John Kubiatowicz IEEE Internet Computing, Sept/Oct 2001, Vol 5, No. 5, pgs 40-49. [Abstract, Paper: PDF(250KB), Compressed Postscript(540KB)] |
MSWiM 2001 |
A Markov-Based Channel Model Algorithm for Wireless
Networks Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph and Reiner Ludwig Proceedings of the 4th ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2001) Best Paper Award Rome, Italy, July 2001. [Abstract, Paper: PDF(268KB), Compressed Postscript(262KB)] |
ACM
WINET 2002 |
An Architecture for Secure Wide-Area Service Discovery
Todd D. Hodes, Steven E. Czerwinski, Ben Y. Zhao, Anthony D. Joseph and Randy H. Katz. ACM Baltzer Wireless Networks: Selected papers from MobiCom 1999. March 2002, Vol. 8, No. 2-3, Pgs. 213-230. [Abstract, Paper: PDF(332KB), Compressed Postscript(132KB)] |
NOSSDAV 2001 |
Bayeux: An Architecture for Scalable and Fault-tolerant
Wide-Area Data Dissemination Shelley Q. Zhuang, Ben Y. Zhao, Anthony D. Joseph, Randy H. Katz, John Kubiatowicz Proceedings of the 11th International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV 2001) [Abstract, Paper: PDF(110KB), Compressed Postscript(102KB)] |
IEEE Computer Networks 2001 |
The Ninja Architecture for Robust Internet-Scale Systems
and Services Steven D. Gribble, Matt Welsh, Rob von Behren, Eric A. Brewer, David Culler, N. Borisov, S. Czerwinski, R. Gummadi, J. Hill, A. Joseph, R. H. Katz, Z. M. Mao, S. Ross, and B. Zhao IEEE Computer Networks: Special Issue on Pervasive Computing, March 2001, Vol 35, No. 4 Best paper award [Abstract, Paper: PDF(560KB), Compressed Postscript(595KB)]. |
ASPLOS 2000 |
OceanStore: An Architecture for Global-scale Persistent
Storage John Kubiatowicz, David Bindel, Yan Chen, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Westly Weimer, Christopher Wells, and Ben Zhao. Proceedings of the 9th International Conference on Architecture Support for Programming Languages and Operating Systems (ASPLOS 2000), November, 2000. [Abstract, Paper: PDF(130KB), Compressed Postscript(309KB)] |
IEEE Personal Comm 2000 |
ICEBERG: An Internet-core Network Architecture for
Integrated Communications Helen J. Wang, Bhaskaran Raman, Chen-nee Chuah, Rahul Biswas, Ramakrishna Gummadi, Barbara Hohlt, Xia Hong, Emre Kiciman, Zhuoqing Mao, Jimmy S. Shih, Lakshminarayanan Subramanian, Ben Y. Zhao, Anthony D. Joseph, and Randy H. Katz. IEEE Personal Communications 2000, Special Issue on IP-based Mobile Telecommunication Networks [Abstract, Paper: PDF(2.2MB), Compressed Postscript(517KB)] |
IECON 1999 |
Flexible Internetworking of Devices and Controls Michelle Munson, Todd Hodes, Thomas Fischer, Keung-hae Lee, Toby Lehman and Ben Y. Zhao. Proceedings of IECON, San Jose, CA, December 1999. |
Mobicom 1999 |
An Architecture for a Secure Service Discovery Service
Steven Czerwinski, Ben Y. Zhao, Todd Hodes, Anthony Joseph and Randy Katz. Proceedings of The 5th ACM/IEEE International Conference on MobileComputing and Networks (MobiCom '99), Seattle, WA, August 1999. [Abstract, Paper: PDF(285KB), Compressed Postscript(89KB)] |
Books:
Future Directions in Distributed Computing
Research and Position Papers
Andre Schiper, Alex A. Shvartsman, Hakim Weatherspoon, Ben Y. Zhao
(Eds.)
Series: Lecture Notes in Computer Science. Volume. 2584
Heidelberg, Germany: Springer-Verlag Heidelberg, 2003.
Thesis Work and Technical Reports:
Improving Anonymity using Social Links
Krishna P. N. Puttaswamy, Alessandra Sala and Ben Y. Zhao
UC Santa Barbara Technical Report: 2008-13, September 2008
[PDF (140KB)]
Protecting Anonymity in Dynamic Peer-to-Peer Networks
Krishna P. N. Puttaswamy, Alessandra Sala, Christo Wilson, and Ben
Y. Zhao
UC Santa Barbara Technical Report: 2008-12, September 2008
[PDF (236KB)]
Rome: Performance and Anonymity using Route Meshes
Krishna P. N. Puttaswamy, Alessandra Sala, Omer Egecioglu, and Ben
Y. Zhao
UC Santa Barbara Technical Report: 2008-11, September 2008
[PDF (305KB)]
Securing Structured Overlays Against Identity Attacks
Krishna P. N. Puttaswamy, Ben Y. Zhao and Haitao Zheng
UC Santa Barbara Technical Report: 2008-1, January 2008.
[PDF
(1.4MB)]
Searching for Rare Objects Using Index Replication
Krishna P. N. Puttaswamy, Alessandra Sala, and Ben Y. Zhao
UC Santa Barbara Technical Report: 2007-12, December 2007
[PDF
(348KB)]
An Empirical Study of Collusion Behavior in the Maze P2P
File-Sharing System
Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yafei Dai, and
Xiaoming Li
Microsoft Research Technical Report: MSR-TR-2006-14, February 2006
[Abstract, PDF
(294KB)]
Decentralized Object Location and Routing: A New Networking
Paradigm
Ben Y. Zhao, Ph.D. Thesis, U. C. Berkeley, August 2004
[Abstract, PDF
(1.7MB), Compressed
Postscript (937KB), Postscript
(3.5MB)]
Exploiting Routing Redundancy Using a Wide-area Overlay
Ben Y. Zhao, Ling Huang, Anthony D. Joseph and John D. Kubiatowicz
U. C. Berkeley Technical Report UCB/CSD-02-1215, November
2002
[Compressed Postscript (176KB), PDF
(155KB)]
Supporting Rapid Mobility via Locality in an Overlay Network
Ben Y. Zhao, Anthony D. Joseph and John D. Kubiatowicz
U. C. Berkeley Technical Report UCB/CSD-02-1216, November
2002
[Compressed Postscript (228KB), PDF
(257KB)]
Distributed Data Location in a Dynamic Network
Kirsten Hildrum, John D. Kubiatowicz, Satish Rao and Ben Y. Zhao
U. C. Berkeley Technical Report UCB/CSD-02-1178, April, 2002.
[Compressed Postscript (204KB), PDF
(91KB)]
A Decentralized Location and Routing Infrastructure for
Fault-tolerant Wide-area Applications
Ben Y. Zhao, Ph.D. Qualifying Examination, April 18, 2001.
[Abstract, Talk: PDF
(74KB), PPT Slideshow
(278KB), Paper: PDF
(148KB)]
A Markov-Based Channel Model Algorithm for Wireless Networks
Almudena Konrad, Anthony D. Joseph, Reiner Ludwig, and Ben Y. Zhao.
U. C. Berkeley Technical Report UCB/CSD-01-1142, May, 2001.
[Compressed Postscript (264KB), PDF
(339KB)]
Tapestry: An Infrastructure for Fault-tolerant Wide-area
Location and Routing
Ben Y. Zhao, John D. Kubiatowicz, and Anthony D. Joseph.
U. C. Berkeley Technical Report UCB/CSD-01-1141, April, 2001.
[Compressed Postscript (206KB), PDF
(194KB)]
Silverback: A Global-Scale Archival System
Hakim Weatherspoon, Chris Wells, Patrick R. Eaton, Ben Y. Zhao, and
John D. Kubiatowicz.
U. C. Berkeley Technical Report UCB/CSD-01-1139, March 2001.
[Compressed Postscript (135KB), PDF
(261KB)]
OceanStore: An Extremely Wide-Area Storage System
David Bindel, Yan Chen, Patrick Eaton, Dennis Geels, Ramakrishna
Gummadi, Sean Rhea, Hakim Weatherspoon, Westly Weimer, Christopher
Wells, Ben Zhao and John Kubiatowicz.
U.C. Berkeley Technical Report UCB/CSD-00-1102, May 2000.
[Compressed Postscript (76KB)].
XSet: A Lightweight Database for Internet Applications
Ben Y. Zhao and Anthony Joseph
Submitted for publication (updated version of MS thesis), May 2000.
[Compressed Postscript (124KB), PDF
(320KB)].
The XSet XML Search Engine and XBench XML Query Benchmark
Ben Y. Zhao
Thesis filed as partial requirement for Masters of Science, May 2000
[Compressed Postscript(123KB), PDF
(384KB)].
U.C. Berkeley Technical Report UCB/CSD-00-1112, September
2000.
[Compressed Postscript (137KB), PDF
(404KB)].
Talks:
Z-Ring: Fast Prefix Routing via a Low Maintenance Membership
Protocol
Proceedings of the 13th IEEE International Conference on Network
Protocols (ICNP)
Slides: [PDF (251KB), PPT
(793KB)]
Identity Theft Protection in Structured Overlays
Proceedings of the 1st Workshop on Secure Network Protocols
(NPSec)
Slides: [PDF (218KB), PPT
(467KB)]
Decoupling Service and Feedback Trust in a Peer-to-Peer
Reputation System
1st International Workshop on Applications and Economics of
Peer-to-Peer Systems (AEPP)
Slides: [PDF (273KB), PPT
(240KB)]
Cashmere: Resilient Anonymous Routing
2nd Symposium on Networked Systems Design and Implementation
(NSDI)
Slides: [PDF (575KB), PPT
(2.7MB)]
Rapid mobility via type indirection
3rd International Workshop on Peer to Peer Systems (IPTPS) 2004
Slides: [PDF (580KB), PowerpointShow
(405KB)]
Infrastructure-based Resilient Routing
ICSI Lunch Seminar, Jan. 21, 2004
Slides: [PPT (257KB)]
Exploiting Route Redundancy via Structured Peer to Peer
Overlays
IEEE 11th International Conference of Networking Protocols (ICNP)
2003
Slides: [PDF (603KB), PowerPointShow
(151KB)]
Approximate Object Location and Spam Filtering on Peer-to-Peer
Systems
ACM International Conference on Middleware 2003
Slides: [PDF, PPT]
Towards a Common API for Structured P2P Overlays
2nd International Workshop on Peer to Peer Systems (IPTPS) 2003
Slides: [PDF, Powerpoint
Show]
A Common API for Structured Peer to Peer Overlays
Talk at OceanStore/ROC/Sahara Winter Retreat, 1/14/2002
[PDF (163KB)]
Implementation and Deployment of a Wide-area Network
Infrastructure
Talk at HP Labs, November 2002
[PowerPoint PPS (377KB), PDF
(486KB)]
Mobile Tapestry
Talk given at Sahara/ROC retreat
[PDF, PowerPoint
Show]
Panel slides on "Challenges of Computing on a Massive Scale"
International Workshop on Future Directions in Distributed
Computing
Slides: [pdf, Powerpoint
Show]
Locality Aware Mechanisms for Large-scale Networks
International Workshop on Future Directions in Distributed
Computing
Talk slides: [pdf, Powerpoint
Show]
Brocade: Landmark Routing on Overlay Networks.
International Workshop on Peer to Peer Systems (IPTPS) 2002
Talk: pdf (349K), powerpoint
show (137K)
Tapestry: Architecture and Status
UCB ROC and Sahara Retreats joint session, January 17, 2002
pdf, PowerpointShow.
Tapestry: Scalable and Fault-tolerant Routing and Location
Networking Seminar, Fall 2001, Stanford University, October
18, 2001, Stanford, CA.
[PDF, PowerpointShow]
Tapestry: Decentralized Routing and Location
System Seminar (SPAM), Summer 2001, Yale University, June 22,
2001, New Haven, CT.
[PDF, PowerpointShow]
Tapestry: Decentralized Routing and Location
System Seminar 590S, Spring 2001, University of Washington,
May 2001, Seattle WA.
[PDF(554KB)]
WiPs / Posters:
DISSENT: Defeating Sinkholes in Sensor NeTworks
2nd Symposium on Networked Systems Design and Implementation
(NSDI), May 2005.
Holmes: Probabilistic Object Location in MANETs
2nd Symposium on Networked Systems Design and Implementation
(NSDI), May 2005.
Tapestry Poster Abstract
Abstract of poster presented at SIGCOMM 2001, to be included in a
forthcoming issue of Computer Communication Review. [pdf,
Abstract]
Tapestry: Wide-area Location and Routing
4th Conference on Operating System Design and Implementation
(OSDI), October 2000.
Work in Progress abstract (text),
talk
slides (PDF)
Tapestry: Fault-resilient Wide-area Location and Routing
4th Conference on Operating System Design and Implementation
(OSDI), October 2000.
Poster (PDF)