Neural cleanse: Identifying and mitigating backdoor attacks in neural networks B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao 2019 IEEE symposium on security and privacy (SP), 707-723, 2019 | 1632 | 2019 |
Utilization and fairness in spectrum assignment for opportunistic spectrum access C Peng, H Zheng, BY Zhao Mobile Networks and Applications 11, 555-576, 2006 | 810 | 2006 |
Distributed coordination in dynamic spectrum allocation networks J Zhao, H Zheng, GH Yang First IEEE International Symposium on New Frontiers in Dynamic Spectrum …, 2005 | 643 | 2005 |
Distributed spectrum allocation via local bargaining L Cao, H Zheng 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad …, 2005 | 595 | 2005 |
Collaboration and fairness in opportunistic spectrum access H Zheng, C Peng IEEE International Conference on Communications 5, 3132-3136, 2005 | 582 | 2005 |
Trust: A general framework for truthful double spectrum auctions X Zhou, H Zheng INFOCOM 2009, IEEE, 999-1007, 2009 | 560 | 2009 |
eBay in the sky: Strategy-proof wireless spectrum auctions X Zhou, S Gandhi, S Suri, H Zheng Proceedings of the 14th ACM international conference on Mobile computing and …, 2008 | 486 | 2008 |
Latent backdoor attacks on deep neural networks Y Yao, H Li, H Zheng, BY Zhao Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 473 | 2019 |
Packet-level telemetry in large datacenter networks Y Zhu, N Kang, J Cao, A Greenberg, G Lu, R Mahajan, D Maltz, L Yuan, ... Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015 | 420 | 2015 |
Mirror mirror on the ceiling: Flexible wireless links for data centers X Zhou, Z Zhang, Y Zhu, Y Li, S Kumar, A Vahdat, BY Zhao, H Zheng ACM SIGCOMM Computer Communication Review 42 (4), 443-454, 2012 | 403 | 2012 |
You are how you click: Clickstream analysis for sybil detection G Wang, T Konolige, C Wilson, X Wang, H Zheng, BY Zhao 22nd USENIX security symposium (USENIX Security 13), 241-256, 2013 | 397 | 2013 |
A general framework for wireless spectrum auctions S Gandhi, C Buragohain, L Cao, H Zheng, S Suri 2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum …, 2007 | 377 | 2007 |
Sharing graphs using differentially private graph models A Sala, X Zhao, C Wilson, H Zheng, BY Zhao Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011 | 330 | 2011 |
Proactive channel access in dynamic spectrum networks L Yang, L Cao, H Zheng Physical communication 1 (2), 103-111, 2008 | 325 | 2008 |
Fawkes: Protecting privacy against unauthorized deep learning models S Shan, E Wenger, J Zhang, H Li, H Zheng, BY Zhao 29th USENIX security symposium (USENIX Security 20), 1589-1604, 2020 | 317 | 2020 |
Serf and turf: crowdturfing for fun and profit G Wang, C Wilson, X Zhao, Y Zhu, M Mohanlal, H Zheng, BY Zhao Proceedings of the 21st international conference on World Wide Web, 679-688, 2012 | 315 | 2012 |
Wisdom in the social crowd: an analysis of quora G Wang, K Gill, M Mohanlal, H Zheng, BY Zhao Proceedings of the 22nd international conference on World Wide Web, 1341-1352, 2013 | 306 | 2013 |
Unsupervised clickstream clustering for user behavior analysis G Wang, X Zhang, S Tang, H Zheng, BY Zhao Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016 | 305 | 2016 |
Device-centric spectrum management H Zheng, L Cao First IEEE International Symposium on New Frontiers in Dynamic Spectrum …, 2005 | 288 | 2005 |
Social turing tests: Crowdsourcing sybil detection G Wang, M Mohanlal, C Wilson, X Wang, M Metzger, H Zheng, BY Zhao arXiv preprint arXiv:1205.3856, 2012 | 282 | 2012 |