Ben Y. Zhao
Ben Y. Zhao
Neubauer Professor of Computer Science, University of Chicago
Verified email at - Homepage
Cited by
Cited by
An infrastructure for fault-resilient wide-area location and routing
BY Zhao
Technical Report, UC Berkeley, 2001
Oceanstore: An architecture for global-scale persistent storage
J Kubiatowicz, D Bindel, Y Chen, S Czerwinski, P Eaton, D Geels, ...
ACM SIGOPS Operating Systems Review 34 (5), 190-201, 2000
Tapestry: A resilient global-scale overlay for service deployment
BY Zhao, L Huang, J Stribling, SC Rhea, AD Joseph, JD Kubiatowicz
IEEE Journal on selected areas in communications 22 (1), 41-53, 2004
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks
B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao
IEEE Symposium on Security and Privacy (Oakland), 513-529, 2019
User interactions in social networks and their implications
C Wilson, B Boe, A Sala, KPN Puttaswamy, BY Zhao
Proceedings of the 4th ACM European conference on Computer systems, 205-218, 2009
Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination
SQ Zhuang, BY Zhao, AD Joseph, RH Katz, JD Kubiatowicz
Proceedings of the 11th international workshop on Network and operating …, 2001
An architecture for a secure service discovery service
SE Czerwinski, BY Zhao, TD Hodes, AD Joseph, RH Katz
Proceedings of the 5th annual ACM/IEEE international conference on Mobile …, 1999
Understanding user behavior in large-scale video-on-demand systems
H Yu, D Zheng, BY Zhao, W Zheng
ACM SIGOPS Operating Systems Review 40 (4), 333-344, 2006
Towards a common API for structured peer-to-peer overlays
F Dabek, B Zhao, P Druschel, J Kubiatowicz, I Stoica
International Workshop on Peer-To-Peer Systems, 33-44, 2003
Utilization and fairness in spectrum assignment for opportunistic spectrum access
C Peng, H Zheng, BY Zhao
Mobile Networks and Applications 11, 555-576, 2006
Pond: The OceanStore Prototype
S Rhea, P Eaton, D Geels, H Weatherspoon, B Zhao, J Kubiatowicz
2Nd USENIX Conference on File and Storage Technologies (FAST 03), 2003
Detecting and characterizing social spam campaigns
H Gao, J Hu, C Wilson, Z Li, Y Chen, BY Zhao
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 35-47, 2010
Uncovering social network sybils in the wild
Z Yang, C Wilson, X Wang, T Gao, BY Zhao, Y Dai
ACM Transactions on Knowledge Discovery from Data (TKDD) 8 (1), 2, 2014
The Ninja architecture for robust Internet-scale systems and services
SD Gribble, M Welsh, R Von Behren, E Brewer, D Culler, N Borisov, ...
Computer Networks 35 (4), 473-497, 2000
Distributed data location in a dynamic network
K Hildrum, JD Kubiatowicz, S Rao, BY Zhao
Proceedings of ACM SPAA 2002, 2002
Tapestry: An Infrastructure for Fault-Resilient Wide-Area Location and Routing
BY Zhao
Technical Report UCB/CSD-01-1141, 2001
Latent Backdoor Attacks on Deep Neural Networks
Y Yao, H Li, H Zheng, BY Zhao
Proceedings of ACM Conference on Computer and Communication Security (CCS), 2019
Mirror Mirror on the Ceiling: Flexible Wireless Links for Data Centers
X Zhou, Z Zhang, Y Zhu, Y Li, S Kumar, A Vahdat, BY Zhao, H Zheng
Proceedings of ACM SIGCOMM, 2012, 2012
Packet-level telemetry in large datacenter networks
Y Zhu, N Kang, J Cao, A Greenberg, G Lu, R Mahajan, D Maltz, L Yuan, ...
Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015
A Markov-based channel model algorithm for wireless networks
A Konrad, BY Zhao, AD Joseph, R Ludwig
Proceedings of the 4th ACM international workshop on Modeling, analysis and …, 2001
The system can't perform the operation now. Try again later.
Articles 1–20