Ben Yanbin Zhao
#145,933
Most Influential Person Now
Ben Yanbin Zhao's AcademicInfluence.com Rankings
Ben Yanbin Zhaocomputer-science Degrees
Computer Science
#7309
World Rank
#7698
Historical Rank
Database
#4372
World Rank
#4546
Historical Rank

Download Badge
Computer Science
Ben Yanbin Zhao's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is Ben Yanbin Zhao Influential?
(Suggest an Edit or Addition)Ben Yanbin Zhao's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- OceanStore: an architecture for global-scale persistent storage (2000) (2599)
- An Infrastructure for Fault-tolerant Wide-area Location and Routing (2001) (2462)
- Tapestry: a resilient global-scale overlay for service deployment (2004) (2007)
- User interactions in social networks and their implications (2009) (1001)
- Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination (2001) (881)
- An architecture for a secure service discovery service (1999) (763)
- Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks (2019) (750)
- Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and (2001) (730)
- Understanding user behavior in large-scale video-on-demand systems (2006) (722)
- Towards a Common API for Structured Peer-to-Peer Overlays (2003) (609)
- Utilization and fairness in spectrum assignment for opportunistic spectrum access (2006) (570)
- Pond: The OceanStore Prototype (2003) (538)
- Detecting and characterizing social spam campaigns (2010) (466)
- Uncovering social network Sybils in the wild (2011) (448)
- The Ninja architecture for robust Internet-scale systems and services (2001) (387)
- Distributed Object Location in a Dynamic Network (2002) (371)
- Understanding latent interactions in online social networks (2010) (309)
- A Markov-Based Channel Model Algorithm for Wireless Networks (2001) (308)
- You Are How You Click: Clickstream Analysis for Sybil Detection (2013) (303)
- Maintenance-Free Global Data Storage (2001) (288)
- Packet-Level Telemetry in Large Datacenter Networks (2015) (263)
- Brocade: Landmark Routing on Overlay Networks (2002) (260)
- Serf and turf: crowdturfing for fun and profit (2011) (239)
- Latent Backdoor Attacks on Deep Neural Networks (2019) (232)
- Sharing graphs using differentially private graph models (2011) (231)
- Mirror mirror on the ceiling: flexible wireless links for data centers (2012) (226)
- Unsupervised Clickstream Clustering for User Behavior Analysis (2016) (216)
- Wisdom in the social crowd: an analysis of quora (2013) (216)
- Do social networks improve e-commerce?: a study on social marketplaces (2008) (196)
- Social Turing Tests: Crowdsourcing Sybil Detection (2012) (190)
- Measurement-calibrated graph models for social network experiments (2010) (189)
- An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System (2007) (188)
- Parallelizing Skyline Queries for Scalable Distribution (2006) (181)
- Follow the green: growth and dynamics in twitter follower markets (2013) (177)
- ICEBERG: an Internet core network architecture for integrated communications (2000) (171)
- Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers (2014) (171)
- I am the antenna: accurate outdoor AP location using smartphones (2011) (167)
- Demystifying 60GHz outdoor picocells (2014) (166)
- Beyond Social Graphs: User Interactions in Online Social Networks and their Implications (2012) (166)
- Tapestry: a fault-tolerant wide-area application infrastructure (2002) (162)
- Automated Crowdturfing Attacks and Defenses in Online Review Systems (2017) (145)
- Detecting and characterizing social spam campaigns (2010) (142)
- Exploiting locality of interest in online social networks (2010) (141)
- Approximate Object Location and Spam Filtering on Peer-to-Peer Systems (2003) (131)
- Preserving privacy in location-based mobile social applications (2010) (130)
- Supporting Demanding Wireless Applications with Frequency-agile Radios (2010) (129)
- Fawkes: Protecting Privacy against Unauthorized Deep Learning Models (2020) (126)
- Cashmere: resilient anonymous routing (2005) (124)
- Preserving Location Privacy in Geosocial Applications (2014) (121)
- An Architecture for Secure Wide-Area Service Discovery (2002) (119)
- Silverline: toward data confidentiality in storage-intensive cloud applications (2011) (117)
- Mirror mirror on the ceiling: flexible wireless links for data centers (2012) (117)
- Efficient Batched Synchronization in Dropbox-Like Cloud Storage Services (2013) (110)
- Reusing 60GHz Radios for Mobile Radar Imaging (2015) (110)
- HPTP: Relieving the Tension between ISPs and P2P (2007) (101)
- Whispers in the dark: analysis of an anonymous social network (2014) (100)
- Awarded Best Student Paper! - Pond: The OceanStore Prototype (2003) (95)
- High Throughput Spectrum-aware Routing for Cognitive Radio Networks (2007) (94)
- Multi-channel Jamming Attacks using Cognitive Radios (2007) (88)
- With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning (2018) (88)
- The design of a reliable reputation system (2010) (86)
- Cutting the cord: a robust wireless facilities network for data centers (2014) (75)
- Towards commoditized real-time spectrum monitoring (2014) (75)
- Backdoor Attacks Against Deep Learning Systems in the Physical World (2020) (74)
- Anatomy of a Personalized Livestreaming System (2016) (73)
- Practical conflict graphs for dynamic spectrum distribution (2013) (67)
- Multi-scale dynamics in a massive online social network (2012) (67)
- Exploiting routing redundancy via structured peer-to-peer overlays (2003) (66)
- Future Directions in Distributed Computing (2003) (66)
- 3D beamforming for wireless data centers (2011) (65)
- Efficient shortest paths on massive social graphs (2011) (65)
- Complexity vs. performance: empirical analysis of machine learning as a service (2017) (64)
- Hybrid Overlay Structure Based on Random Walks (2005) (63)
- Energy consumption and conservation in mobile peer-to-peer systems (2006) (61)
- Deployment of a Large-scale Peer-to-Peer Social Network (2004) (61)
- Energy and Performance of Smartphone Radio Bundling in Outdoor Environments (2015) (60)
- Safely and automatically updating in-network ACL configurations with intent language (2019) (60)
- OceanStore: An Extremely Wide-Area Storage System (2002) (58)
- QUORUM—Quality of Service in Wireless Mesh Networks (2007) (56)
- On the validity of geosocial mobility traces (2013) (55)
- Locality Aware Mechanisms for Large-scale Networks (2002) (53)
- Poster: Defending against Sybil Devices in Crowdsourced Mapping Services (2015) (53)
- AmazingStore: available, low-cost online storage service using cloudlets (2010) (51)
- Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms (2015) (51)
- Enforcing dynamic spectrum access with spectrum permits (2012) (49)
- StarClique: guaranteeing user privacy in social networks against intersection attacks (2009) (49)
- On the feasibility of effective opportunistic spectrum access (2010) (48)
- Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks (2019) (46)
- Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks (2005) (46)
- Deploying Video-on-Demand Services on Cable Networks (2007) (43)
- Wearable Microphone Jamming (2020) (43)
- The spaces between us: setting and maintaining boundaries in wireless spectrum access (2010) (40)
- Papyrus: a software platform for distributed dynamic spectrum sharing using SDRs (2011) (40)
- Brief announcement: revisiting the power-law degree distribution for social graph analysis (2010) (38)
- Searching for Rare Objects Using Index Replication (2008) (37)
- QUORUM: quality of service routing in wireless mesh networks (2007) (37)
- Object Recognition and Navigation using a Single Networking Device (2017) (36)
- On the bursty evolution of online social networks (2012) (36)
- Link and Triadic Closure Delay: Temporal Metrics for Social Network Dynamics (2014) (36)
- Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System (2005) (35)
- "Will Check-in for Badges": Understanding Bias and Misbehavior on Location-Based Social Networks (2021) (34)
- Empirical Validation of Commodity Spectrum Monitoring (2016) (34)
- Uncovering social network sybils in the wild (2011) (32)
- Distributed Data Location in a Dynamic Network (2002) (32)
- Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services (2018) (31)
- Identifying Value in Crowdsourced Wireless Signal Measurements (2017) (31)
- The Effectiveness of Opportunistic Spectrum Access: A Measurement Study (2012) (30)
- Scaling Microblogging Services with Divergent Traffic Demands (2011) (29)
- Clickstream User Behavior Models (2017) (29)
- Towards Location-aware Topology in both Unstructured and Structured P2P Systems (2007) (28)
- Silverback: A Global-Scale Archival System (2001) (28)
- Exploring the feasibility of proactive reputations (2008) (27)
- Deep Graph Convolutional Networks for Incident-Driven Traffic Speed Prediction (2020) (27)
- 60GHz Mobile Imaging Radar (2015) (27)
- Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard (2016) (27)
- Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors (2018) (26)
- Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System (2017) (26)
- On the Embeddability of Random Walk Distances (2013) (25)
- Piracy Resistant Watermarks for Deep Neural Networks. (2019) (25)
- Determining model accuracy of network traces (2006) (25)
- Gender Bias in the Job Market (2017) (25)
- Detecting Gender Stereotypes: Lexicon vs. Supervised Learning Methods (2020) (24)
- Securing Structured Overlays against Identity Attacks (2009) (23)
- Characterizing and detecting malicious crowdsourcing (2013) (22)
- Scaling Deep Learning Models for Spectrum Anomaly Detection (2019) (22)
- Privacy, availability and economics in the Polaris mobile social network (2011) (21)
- Persistent and Unforgeable Watermarks for Deep Neural Networks (2019) (21)
- Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models (2020) (20)
- Rapid Mobility via Type Indirection (2004) (19)
- Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks (2020) (19)
- Benefits of Browsing? The Prevalence, Nature, and Effects of Profile Consumption Behavior in Social Network Sites (2018) (17)
- Backdoor Attacks on Facial Recognition in the Physical World (2020) (17)
- Probabilistic Failure Detection for Efficient Distributed Storage Maintenance (2008) (17)
- Adversarial Localization against Wireless Cameras (2018) (17)
- Predictive Analysis in Network Function Virtualization (2018) (15)
- Practical Conflict Graphs in the Wild (2015) (15)
- Supporting Rapid Mobility via Locality in an Overlay Network (2002) (15)
- Fast and Scalable Analysis of Massive Social Graphs (2011) (15)
- Crowds on Wall Street: Extracting Value from Social Investing Platforms (2014) (14)
- Location independent compact routing for wireless networks (2006) (14)
- Towards Graph Watermarks (2015) (14)
- User Authentication via Electrical Muscle Stimulation (2021) (14)
- Understanding and Predicting Data Hotspots in Cellular Networks (2016) (13)
- On the performance of cloud storage applications with global measurement (2016) (13)
- On infostation density of vehicular networks (2010) (13)
- Gotta Catch 'Em All: Using Concealed Trapdoors to Detect Adversarial Attacks on Neural Networks (2019) (13)
- Exploiting Routing Redundancy Using a Wide-area Overlay (2002) (13)
- The power of comments: fostering social interactions in microblog networks (2016) (13)
- Future Directions in Distributed Computing: Research and Position Papers (2003) (13)
- Protecting anonymity in dynamic peer-to-peer networks (2008) (13)
- Z-ring: fast prefix routing via a low maintenance membership protocol (2005) (13)
- Value and Misinformation in Collaborative Investing Platforms (2017) (12)
- The XSet XML Search Engine and XBench XML Query Benchmark (2000) (12)
- Shortest paths in less than a millisecond (2012) (12)
- Revisiting Degree Distribution Models for Social Graph Analysis (2011) (12)
- Proceedings of the 25th International Conference on World Wide Web (2016) (11)
- Xset: A lightweight database for internet applications (2000) (11)
- Don't Tread on Me: Moderating Access to OSN Data with SpikeStrip (2010) (11)
- Measurement-Based Design of Roadside Content Delivery Systems (2013) (10)
- The Impact of Infostation Density on Vehicular Data Dissemination (2011) (10)
- Globally Decoupled Reputations for Large Distributed Networks (2007) (10)
- Self-Similarity in Social Network Dynamics (2016) (9)
- Towards Performance Clarity of Edge Video Analytics (2021) (9)
- "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World (2021) (9)
- Understanding the Effectiveness of Ultrasonic Microphone Jammer (2019) (9)
- Network Growth and Link Prediction Through an Empirical Lens (2016) (9)
- A Real-time Defense against Website Fingerprinting Attacks (2021) (9)
- Protector: A Probabilistic Failure Detector for Cost-Effective Peer-to-Peer Storage (2011) (9)
- Understanding Motivations behind Inaccurate Check-ins (2018) (8)
- Regula Sub-rosa: Latent Backdoor Attacks on Deep Neural Networks (2019) (8)
- Uncovering User Interaction Dynamics in Online Social Networks (2015) (8)
- Traceback of Data Poisoning Attacks in Neural Networks (2021) (8)
- Toward Practical Spectrum Permits (2017) (8)
- Fairness Attacks in the Explicit Control Protocol (2007) (7)
- Silverline : Toward Data Confidentiality in Third-Party Clouds (2010) (7)
- Patch-based Defenses against Web Fingerprinting Attacks (2021) (7)
- Adversarial WiFi Sensing (2018) (7)
- Invisible Interactions: What Latent Social Interaction Tells Us About Social Relationships in Social Networking Sites (2012) (7)
- Understanding data hotspots in cellular networks (2014) (7)
- Echo Chambers in Investment Discussion Boards (2017) (6)
- Atlas: Approximating Shortest Paths in Social Graphs (2010) (6)
- Probabilistic Data Aggregation In Distributed Networks (2004) (6)
- Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks (2020) (6)
- Exploring the feasibility of proactive reputations: Research Articles (2008) (6)
- Towards Understanding the Adoption and Social Experience of Digital Wallet Systems (2019) (5)
- Unfolding dynamics in a social network: co-evolution oflink formation and user interaction (2013) (5)
- DeepCredit: Exploiting User Cickstream for Loan Risk Prediction in P2P Lending (2018) (5)
- Rome: Performance and Anonymity using Route Meshes (2009) (5)
- Jello: Dynamic Spectrum Sharing in Digital Homes (2010) (5)
- Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions (2019) (5)
- Towards Reliable Reputations for Dynamic Networked Systems (2008) (4)
- Integrated Data Location in Multihop Wireless Networks (2007) (4)
- Peer-exchange schemes to handle mismatch in peer-to-peer systems (2009) (4)
- Towards reliable reputations for distributed applications (2008) (4)
- On Migratory Behavior in Video Consumption (2017) (4)
- Choosing an Accurate Network Model using Domain Analysis (2005) (4)
- Wireless Side-Lobe Eavesdropping Attacks (2018) (3)
- Graph Watermarks (2015) (3)
- A Coordination Framework for Opportunistic Spectrum Access in Ad Hoc Networks (2005) (3)
- Attacks and Defenses in Crowdsourced Mapping Services (2015) (3)
- Proceedings of the 25th International Conference Companion on World Wide Web (2016) (3)
- A First Look at User Switching Behaviors Over Multiple Video Content Providers (2017) (3)
- Assessing Privacy Risks from Feature Vector Reconstruction Attacks (2022) (3)
- "How do urban incidents affect traffic speed?" A Deep Graph Convolutional Network for Incident-driven Traffic Speed Prediction (2019) (3)
- Coexistence-Aware Scheduling for Wireless System-on-a-Chip Devices (2010) (3)
- Addressing Training Bias via Automated Image Annotation (2018) (3)
- Adversarial WiFi Sensing using a Single Smartphone (2018) (2)
- SoK: Anti-Facial Recognition Technology (2021) (2)
- Demonstrating User Authentication via Electrical Muscle Stimulation (2021) (2)
- Process-driven Analysis of Dynamics in Online Social Interactions (2015) (2)
- AirLab: consistency, fidelity and privacy in wireless measurements (2011) (2)
- Shortest Paths in Microseconds (2013) (2)
- Can Backdoor Attacks Survive Time-Varying Models? (2022) (1)
- Improving P2P in Cloud Computing based on Performance (2011) (1)
- BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients (2011) (1)
- Special Issue: Recent Advances in Peer‐to‐Peer Systems and Security (2008) (1)
- A double-edged sword: Implications of crowdsourcing for the future of web security (2012) (1)
- Running head : LATENT SOCIAL INTERACTION IN SNS 1 Invisible Interactions : What Latent Social Interaction Can Tell Us about Social Relationships in Social Networking Sites (2011) (1)
- Probabilistic Data Aggregation (1)
- XSet: A High Performance XML Search Engine (1999) (1)
- Penny Auctions are Predictable: Predicting and Profiling User Behavior on DealDash (2018) (1)
- Trimming the Smartphone Network Stack (2016) (1)
- Insecure Machine Learning Systems and Their Impact on the Web (2018) (1)
- Toward the Next-Generation Peer-to-Peer Services (2007) (1)
- Cuckoo : Decentralized and Socio-Aware Online Microblogging Services . Univ . of Goettingen Technical Report No . IFI-TB-2011-01 (2011) (1)
- Cuckoo : Scaling Microblogging Services with Divergent Traffic (2011) (1)
- Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models (2022) (1)
- SecurePost: Verified Group-Anonymity on Social Media (2017) (1)
- Part II: Exploring next-generation communication infrastructures and applications (2003) (0)
- Towards Real-time Spectrum Monitoring (0)
- Understanding and Predicting Data Hotspots in Cellular Networks (2015) (0)
- Seeding Deep Learning using Wireless Localization (2018) (0)
- Measurement-driven design of emerging wireless systems (2011) (0)
- Measurement-calibrated conflict graphs for dynamic spectrum distribution (2012) (0)
- Clean Teacher model Future target and associated clean data Transfer Learning Student data including Infected Student Model Latent Backdoor trigger Teacher Training Student Training Latent Backdoor Injected Live Backdoor Activated Backdoor Injection Progress Infected Teacher Model (2019) (0)
- The power of comments: fostering social interactions in microblog networks (2016) (0)
- Holmes : Probabilistic Object Location in MANET (2005) (0)
- Towards practical privacy in existing distributed systems (2010) (0)
- Battling spam and sybils on the social web (2012) (0)
- Poster : Risks of Transferring Knowledge from Deep Models (2018) (0)
- 60 GHz Mobile Imaging (2015) (0)
- Chambers in Investment Discussion Boards (2017) (0)
- Demonstrating Wearable Microphone Jamming (2020) (0)
- ResearchArticle Globally Decoupled Reputations for Large Distributed Networks (2007) (0)
- Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, WOSN 2012, Helsinki, Finland, August 17, 2012 (2012) (0)
- Silverback : A Global-ScaleAr chival System (2001) (0)
- A Decentralized Location and Routing Infrastructure for Fault-tolerant Wide-area Network Applications (2001) (0)
- Session details: Session 24 (2016) (0)
- Supporting High Bandwidth Applications with 60GHz Outdoor Picocells (2012) (0)
- ResearchArticle A Hybrid Query Scheme to Speed Up Queries in Unstructured Peer-to-Peer Networks (2007) (0)
- AirLab: Distributed Infrastructure for Wireless Measurements (2010) (0)
- Hybrid Structure under P2P (2005) (0)
- Efficient Shortest Paths on Massive Social Graphs ( Invited Paper ) (2011) (0)
- Managing Risk in an Academic Career: a Personal Perspective (2016) (0)
- Special Issue: Recent Advances in Peer-to-Peer Systems and Security: Editorials (2008) (0)
- PlanetLab Deployment , Comparison and Analysis of Network Coordinate Systems (2006) (0)
- The T-CloudDisk (ThuCloudDisk) System Design and Implementaion Related Work (2013) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Ben Yanbin Zhao?
Ben Yanbin Zhao is affiliated with the following schools: