default search action
Bin B. Zhu
Person information
- affiliation: Microsoft Research Asia, Beijing, China
- affiliation (1997 - 2001): Cognicity, Inc., Edina, MN, USA
- affiliation (PhD 1998): University of Minnesota, Minneapolis, MN, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c54]Chaoxiang He, Yimiao Zeng, Xiaojing Ma, Bin Benjamin Zhu, Zewei Li, Shixin Li, Hai Jin:
MysticMask: Adversarial Mask for Impersonation Attack Against Face Recognition Systems. ICME 2024: 1-6 - [c53]Xiaofan Bai, Chaoxiang He, Xiaojing Ma, Bin Benjamin Zhu, Hai Jin:
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models. ICML 2024 - [c52]Wen Yin, Bin Benjamin Zhu, Yulai Xie, Pan Zhou, Dan Feng:
Backdoor Attacks on Bimodal Salient Object Detection with RGB-Thermal Data. ACM Multimedia 2024: 4110-4119 - [c51]Chaoxiang He, Xiaofan Bai, Xiaojing Ma, Bin B. Zhu, Pingyi Hu, Jiayun Fu, Hai Jin, Dongmei Zhang:
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models. ACM Multimedia 2024: 9875-9884 - [c50]Chaoxiang He, Xiaojing Ma, Bin B. Zhu, Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin, Dongmei Zhang:
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses. NDSS 2024 - 2023
- [c49]Li Huang, Weiwei Cui, Bin B. Zhu, Haidong Zhang:
Visually Analysing the Fairness of Clustered Federated Learning with Non-IID Data. IJCNN 2023: 1-10 - [c48]Jiayun Fu, Xiaojing Ma, Bin B. Zhu, Pingyi Hu, Ruixin Zhao, Yaru Jia, Peng Xu, Hai Jin, Dongmei Zhang:
Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes. NDSS 2023 - 2022
- [j8]Changming Liu, Xiaojing Ma, Sixing Cao, Jiayun Fu, Bin B. Zhu:
Privacy-preserving Motion Detection for HEVC-compressed Surveillance Video. ACM Trans. Multim. Comput. Commun. Appl. 18(1): 23:1-23:27 (2022) - [c47]Jiayun Fu, Bin B. Zhu, Haidong Zhang, Yayi Zou, Song Ge, Weiwei Cui, Yun Wang, Dongmei Zhang, Xiaojing Ma, Hai Jin:
ChartStamp: Robust Chart Embedding for Real-World Applications. ACM Multimedia 2022: 2786-2795 - 2021
- [c46]Chaoxiang He, Bin Benjamin Zhu, Xiaojing Ma, Hai Jin, Shengshan Hu:
Feature-Indistinguishable Attack to Circumvent Trapdoor-Enabled Defense. CCS 2021: 3159-3176
2010 – 2019
- 2018
- [c45]Changming Liu, Deqing Zou, Peng Luo, Bin B. Zhu, Hai Jin:
A Heuristic Framework to Detect Concurrency Vulnerabilities. ACSAC 2018: 529-541 - 2014
- [j7]Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, Ning Xu:
Captcha as Graphical Passwords - A New Security Primitive Based on Hard AI Problems. IEEE Trans. Inf. Forensics Secur. 9(6): 891-904 (2014) - [c44]Bin B. Zhu, Jeff Yan, Dongchen Wei, Maowei Yang:
Security Analyses of Click-based Graphical Passwords via Image Point Memorability. CCS 2014: 1217-1231 - 2013
- [c43]Weibo Chu, Bin B. Zhu, Feng Xue, Xiaohong Guan, Zhongmin Cai:
Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs. ICC 2013: 1990-1994 - [c42]Bin B. Zhu, Jeff Yan:
Towards New Security Primitives Based on Hard AI Problems. Security Protocols Workshop 2013: 3-10 - [c41]Bin B. Zhu, Dongchen Wei, Maowei Yang, Jeff Yan:
Security implications of password discretization for click-based graphical passwords. WWW 2013: 1581-1591 - 2011
- [c40]Hyunsang Choi, Bin B. Zhu, Heejo Lee:
Detecting Malicious Web Links and Identifying Their Attack Types. WebApps 2011 - 2010
- [c39]Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao, Peng Liu:
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key. ACISP 2010: 216-232 - [c38]Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Liu, Ning Xu, Meng Yi, Kaiwei Cai:
Attacks and design of image recognition CAPTCHAs. CCS 2010: 187-200 - [c37]Kaimin Zhang, Lu Wang, Aimin Pan, Bin Benjamin Zhu:
Smart caching for web browsers. WWW 2010: 491-500
2000 – 2009
- 2009
- [c36]Kaimin Zhang, Lu Wang, Xiaolin Guo, Aimin Pan, Bin B. Zhu:
WPBench: a benchmark for evaluating the client-side performance of web 2.0 applications. WWW 2009: 1111-1112 - 2008
- [c35]Min Feng, Bin B. Zhu:
A DRM System Protecting Consumer Privacy. CCNC 2008: 1075-1079 - [c34]Bin B. Zhu, Min Feng, Fen Liu, Lei Hu:
Analysis on AACS' Traitor Tracing Against Mix-and-Match Attacks. CCNC 2008: 1097-1101 - [c33]Yang Yang, Bin B. Zhu, Rui Guo, Linjun Yang, Shipeng Li, Nenghai Yu:
A comprehensive human computation framework: with application to image labeling. ACM Multimedia 2008: 479-488 - [c32]Rui Guo, Bin B. Zhu, Min Feng, Aimin Pan, Bosheng Zhou:
Compoweb: a component-oriented web architecture. WWW 2008: 545-554 - 2007
- [j6]Yang Yang, Bin B. Zhu, Shipeng Li, Neng H. Yu:
Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability. EURASIP J. Inf. Secur. 2007 (2007) - [c31]Min Feng, Bin B. Zhu:
When DRM Meets Restricted Multicast: A Content Encryption Key Scheme for Multicast Encryption and DRM. CCNC 2007: 1048-1052 - [c30]Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao:
An Efficient Certified Email Protocol. ISC 2007: 145-157 - [i2]Andrew Chi-Chih Yao, Frances F. Yao, Yunlei Zhao, Bin B. Zhu:
Deniable Internet Key-Exchange. IACR Cryptol. ePrint Arch. 2007: 191 (2007) - 2006
- [c29]Bin B. Zhu, Yang Yang, Shipeng Li:
An efficient key scheme for multiple access of JPEG 2000 and motion JPEG 2000 enabling truncations. CCNC 2006: 1124-1128 - [c28]Min Feng, Bin B. Zhu, Cunlai Zhao, Shipeng Li:
Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication. ISPEC 2006: 13-24 - 2005
- [j5]Bin B. Zhu, Chun Yuan, Yidong Wang, Shipeng Li:
Scalable protection for MPEG-4 fine granularity scalability. IEEE Trans. Multim. 7(2): 222-233 (2005) - [c27]Xiaoming Wang, Bin B. Zhu, Shipeng Li:
A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network. DRMTICS 2005: 298-310 - [c26]Bin B. Zhu, Yang Yang, Tierui Chen:
A DRM System Supporting What You See Is What You Pay. DRMTICS 2005: 341-355 - [c25]Tierui Chen, Bin B. Zhu, Shipeng Li, Xueqi Cheng:
ThresPassport - A Distributed Single Sign-On Service. ICIC (2) 2005: 771-780 - [c24]Bin B. Zhu, Yang Yang, Chang Wen Chen, Shipeng Li:
Optimal packetization of fine granularity scalability codestreams for error-prone channels. ICIP (2) 2005: 185-188 - [c23]Bin B. Zhu, Yang Yang, Shipeng Li:
JPEG 2000 syntax-compliant encryption preserving full scalability. ICIP (3) 2005: 636-639 - [c22]Bin B. Zhu, Shipeng Li, Min Feng:
A framework of scalable layered access control for multimedia. ISCAS (3) 2005: 2703-2706 - [c21]Bin B. Zhu, Shipeng Li, Yang Yang:
JPEG 2000 encryption enabling fine granularity scalability without decryption. ISCAS (6) 2005: 6304-6307 - [c20]Bin B. Zhu, Min Feng, Shipeng Li:
Secure Key Management for Flexible Digital Rights Management of Scalable Codestreams. MMSP 2005: 1-4 - [c19]Bin B. Zhu, Yang Yang, Chang Wen Chen, Shipeng Li:
Fine Granularity Scalability Encryption of MPEG-4 FGS Bitstreams. MMSP 2005: 1-4 - [c18]Yunlei Zhao, Shirley H. C. Cheung, Binyu Zang, Bin B. Zhu:
A Note on the Cramer-Damgård Identification Scheme. WINE 2005: 385-390 - [i1]Min Feng, Bin B. Zhu, MaoZhi Xu, Shipeng Li:
Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis. IACR Cryptol. ePrint Arch. 2005: 222 (2005) - 2004
- [j4]Bin B. Zhu, Mitchell D. Swanson, Ahmed H. Tewfik:
When seeing isn't believing [multimedia authentication technologies]. IEEE Signal Process. Mag. 21(2): 40-49 (2004) - [c17]Jinhai Wu, Bin B. Zhu, Shipeng Li, Fuzong Lin:
A secure image authentication algorithm with pixel-level tamper localization. ICIP 2004: 1573-1576 - [c16]Bin B. Zhu, Min Feng, Shipeng Li:
An efficient key scheme for layered access control of MPEG-4 FGS video. ICME 2004: 443-446 - [c15]Jinhai Wu, Bin B. Zhu, Shipeng Li, Fuzong Lin:
Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. ICME 2004: 931-934 - [c14]Jinhai Wu, Bin B. Zhu, Shipeng Li, Fuzong Lin:
New attacks on SARI image authentication system. Security, Steganography, and Watermarking of Multimedia Contents 2004: 602-609 - 2003
- [c13]Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang:
PLI: A New Framework to Protect Digital Content for P2P Networks. ACNS 2003: 206-216 - [c12]Chun Yuan, Bin B. Zhu, Ming Su, Xiaoming Wang, Shipeng Li, Yuzhuo Zhong:
Layered access control for MPEG-4 FGS video. ICIP (1) 2003: 517-520 - [c11]Chun Yuan, Bin B. Zhu, Yidong Wang, Shipeng Li, Yuzhuo Zhong:
Efficient and fully scalable encryption for MPEG-4 FGS. ISCAS (2) 2003: 620-623
1990 – 1999
- 1999
- [j3]Bin B. Zhu, En-Hui Yang, Ahmed H. Tewfik:
Arithmetic coding with dual symbol sets and its performance analysis. IEEE Trans. Image Process. 8(12): 1667-1676 (1999) - [c10]Ahmed H. Tewfik, Mitchell D. Swanson, Bin B. Zhu:
Data embedding in audio: where do we stand. ICASSP 1999: 2075 - [c9]Mitchell D. Swanson, Bin B. Zhu, Ahmed H. Tewfik:
Current State of the Art - Challenges and Future Directions for Audio Watermarking. ICMCS, Vol. 1 1999: 19-24 - 1998
- [j2]Mitchell D. Swanson, Bin B. Zhu, Ahmed H. Tewfik:
Multiresolution scene-based video watermarking using perceptual models. IEEE J. Sel. Areas Commun. 16(4): 540-550 (1998) - [j1]Mitchell D. Swanson, Bin B. Zhu, Ahmed H. Tewfik, Laurence Boney:
Robust audio watermarking using perceptual masking. Signal Process. 66(3): 337-355 (1998) - 1997
- [c8]Mitchell D. Swanson, Bin B. Zhu, Ahmed H. Tewfik:
Multiresolution Video Watermarking Using Perceptual Models and Scene Segmentation. ICIP (2) 1997: 558-561 - [c7]Bin B. Zhu, Mitchell D. Swanson, Ahmed H. Tewfik:
Image Coding by Folding. ICIP (2) 1997: 665-668 - [c6]Mitchell D. Swanson, Bin B. Zhu, Ahmed H. Tewfik:
Data Hiding for Video-in-Video. ICIP (2) 1997: 676-679 - [c5]Mitchell D. Swanson, Bin B. Zhu, Benson Chau, Ahmed H. Tewfik:
Object-based transparent video watermarking. MMSP 1997: 369-374 - 1996
- [c4]Bin B. Zhu, En-Hui Yang, Ahmed H. Tewfik:
Dual set arithmetic coding and its applications to image coding. EUSIPCO 1996: 1-4 - [c3]Mitchell D. Swanson, Bin B. Zhu, Ahmed H. Tewfik:
Transparent robust image watermarking. ICIP (3) 1996: 211-214 - 1995
- [c2]Bin B. Zhu, Ahmed H. Tewfik, Ömer Nezih Gerek:
Image coding with mixed representations and visual masking. ICASSP 1995: 2327-2330 - [c1]Bin B. Zhu, Ahmed H. Tewfik, M. A. Colestock, Ömer Nezih Gerek, A. Enis Çetin:
Image coding with wavelet representations, edge information and visual masking. ICIP 1995: 582-585
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint