Follow
Haitao Zheng
Haitao Zheng
Neubauer Professor of Computer Science, University of Chicago
Verified email at cs.uchicago.edu - Homepage
Title
Cited by
Cited by
Year
Neural cleanse: Identifying and mitigating backdoor attacks in neural networks
B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao
2019 IEEE symposium on security and privacy (SP), 707-723, 2019
16222019
Utilization and fairness in spectrum assignment for opportunistic spectrum access
C Peng, H Zheng, BY Zhao
Mobile Networks and Applications 11, 555-576, 2006
8092006
Distributed coordination in dynamic spectrum allocation networks
J Zhao, H Zheng, GH Yang
First IEEE International Symposium on New Frontiers in Dynamic Spectrum …, 2005
6412005
Distributed spectrum allocation via local bargaining
L Cao, H Zheng
2005 Second Annual IEEE Communications Society Conference on Sensor and Ad …, 2005
5952005
Collaboration and fairness in opportunistic spectrum access
H Zheng, C Peng
IEEE International Conference on Communications 5, 3132-3136, 2005
5832005
Trust: A general framework for truthful double spectrum auctions
X Zhou, H Zheng
INFOCOM 2009, IEEE, 999-1007, 2009
5592009
eBay in the sky: Strategy-proof wireless spectrum auctions
X Zhou, S Gandhi, S Suri, H Zheng
Proceedings of the 14th ACM international conference on Mobile computing and …, 2008
4852008
Latent backdoor attacks on deep neural networks
Y Yao, H Li, H Zheng, BY Zhao
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
4712019
Packet-level telemetry in large datacenter networks
Y Zhu, N Kang, J Cao, A Greenberg, G Lu, R Mahajan, D Maltz, L Yuan, ...
Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015
4192015
Mirror mirror on the ceiling: Flexible wireless links for data centers
X Zhou, Z Zhang, Y Zhu, Y Li, S Kumar, A Vahdat, BY Zhao, H Zheng
ACM SIGCOMM Computer Communication Review 42 (4), 443-454, 2012
4032012
You are how you click: Clickstream analysis for sybil detection
G Wang, T Konolige, C Wilson, X Wang, H Zheng, BY Zhao
22nd USENIX security symposium (USENIX Security 13), 241-256, 2013
3972013
A general framework for wireless spectrum auctions
S Gandhi, C Buragohain, L Cao, H Zheng, S Suri
2007 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum …, 2007
3772007
Sharing graphs using differentially private graph models
A Sala, X Zhao, C Wilson, H Zheng, BY Zhao
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
3302011
Proactive channel access in dynamic spectrum networks
L Yang, L Cao, H Zheng
Physical communication 1 (2), 103-111, 2008
3252008
Fawkes: Protecting privacy against unauthorized deep learning models
S Shan, E Wenger, J Zhang, H Li, H Zheng, BY Zhao
29th USENIX security symposium (USENIX Security 20), 1589-1604, 2020
3172020
Serf and turf: crowdturfing for fun and profit
G Wang, C Wilson, X Zhao, Y Zhu, M Mohanlal, H Zheng, BY Zhao
Proceedings of the 21st international conference on World Wide Web, 679-688, 2012
3162012
Wisdom in the social crowd: an analysis of quora
G Wang, K Gill, M Mohanlal, H Zheng, BY Zhao
Proceedings of the 22nd international conference on World Wide Web, 1341-1352, 2013
3062013
Unsupervised clickstream clustering for user behavior analysis
G Wang, X Zhang, S Tang, H Zheng, BY Zhao
Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016
3052016
Device-centric spectrum management
H Zheng, L Cao
First IEEE International Symposium on New Frontiers in Dynamic Spectrum …, 2005
2872005
Social turing tests: Crowdsourcing sybil detection
G Wang, M Mohanlal, C Wilson, X Wang, M Metzger, H Zheng, BY Zhao
arXiv preprint arXiv:1205.3856, 2012
2822012
The system can't perform the operation now. Try again later.
Articles 1–20