Benjamin Zi Hao Zhao
Benjamin Zi Hao Zhao
UNSW, Data61 CSIRO
Verified email at data61.csiro.au
Title
Cited by
Cited by
Year
Invisible backdoor attacks against deep neural networks
S Li, BZH Zhao, J Yu, M Xue, D Kaafar, H Zhu
arXiv preprint arXiv:1909.02742, 2019
252019
Invisible backdoor attacks on deep neural networks via steganography and regularization
S Li, M Xue, B Zhao, H Zhu, X Zhang
IEEE Transactions on Dependable and Secure Computing, 2020
132020
Touch and you’re trapp (ck) ed: Quantifying the uniqueness of touch gestures for tracking
R Masood, BZH Zhao, HJ Asghar, MA Kaafar
Proceedings on Privacy Enhancing Technologies 2018 (2), 122-142, 2018
112018
A decade of mal-activity reporting: A retrospective analysis of internet malicious activity blacklists
BZH Zhao, M Ikram, HJ Asghar, MA Kaafar, A Chaabane, K Thilakarathna
Proceedings of the 2019 ACM Asia Conference on Computer and Communications†…, 2019
82019
Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning
BZH Zhao, MA Kaafar, N Kourtellis
Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security†…, 2020
42020
Deep Learning Backdoors
S Li, S Ma, M Xue, BZH Zhao
arXiv preprint arXiv:2007.08273, 2020
42020
On inferring training data attributes in machine learning models
BZH Zhao, HJ Asghar, R Bhaskar, MA Kaafar
arXiv preprint arXiv:1908.10558, 2019
42019
The audio auditor: Participant-level membership inference in voice-based IoT
Y Miao, BZH Zhao, M Xue, C Chen, L Pan, J Zhang, D Kaafar, Y Xiang
CCS Workshop of Privacy Preserving Machine Learning, 2019
42019
BehavioCog: An observation resistant authentication scheme
J Chauhan, BZH Zhao, HJ Asghar, J Chan, MA Kaafar
International Conference on Financial Cryptography and Data Security, 39-58, 2017
42017
On the Resilience of Biometric Authentication Systems against Random Inputs
BZH Zhao, HJ Asghar, MA Kaafar
Network and Distributed System Security Symposium 2020, 2020
32020
POSTER: TouchTrack: How Unique are your Touch Gestures?
R Masood, BZH Zhao, HJ Asghar, MA K‚afar
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications†…, 2017
22017
Hidden Backdoors in Human-Centric Language Models
S Li, H Liu, T Dong, BZH Zhao, M Xue, H Zhu, J Lu
arXiv preprint arXiv:2105.00164, 2021
2021
On the (In) Feasibility of Attribute Inference Attacks on Machine Learning Models
BZH Zhao, A Agrawal, C Coburn, HJ Asghar, R Bhaskar, MA Kaafar, ...
arXiv preprint arXiv:2103.07101, 2021
2021
Oriole: Thwarting Privacy against Trustworthy Deep Learning Models
L Chen, H Wang, BZH Zhao, M Xue, H Qian
arXiv preprint arXiv:2102.11502, 2021
2021
The audio auditor: user-level membership inference in Internet of Things voice services
Y Miao, X Minhui, C Chen, L Pan, J Zhang, BZH Zhao, D Kaafar, Y Xiang
Proceedings on Privacy Enhancing Technologies 2021, 209-228, 2021
2021
PALOR: Poisoning Attacks Against Logistic Regression
J Wen, BZH Zhao, M Xue, H Qian
Australasian Conference on Information Security and Privacy, 447-460, 2020
2020
Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes
BZH Zhao, HJ Asghar, MA Kaafar, F Trevisan, H Yuan
ACM Transactions on Privacy and Security (TOPS) 24 (1), 1-33, 2020
2020
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Online Regression Models
J Wen, BZH Zhao, M Xue, H Qian
arXiv preprint arXiv:2006.11928, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–18