Bin B. Zhu

Orcid: 0000-0002-3571-7808

Affiliations:
  • Microsoft Research Asia, Beijing, China
  • Cognicity, Inc., Edina, MN, USA (1997 - 2001)
  • University of Minnesota, Minneapolis, MN, USA (PhD 1998)


According to our database1, Bin B. Zhu authored at least 105 papers between 1995 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Fact2Fiction: Targeted Poisoning Attack to Agentic Fact-checking System.
CoRR, August, 2025

Benchmarking and Defending against Indirect Prompt Injection Attacks on Large Language Models.
Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining, V.1, 2025

Enhancing Adversarial Transferability with Checkpoints of a Single Model's Training.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

SDBF: Steep-Decision-Boundary Fingerprinting for Hard-Label Tampering Detection of DNN Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

ESF: Efficient Sensitive Fingerprinting for Black-Box Tamper Detection of Large Language Models.
Proceedings of the Findings of the Association for Computational Linguistics, 2025

2024
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Backdoor Attacks on Bimodal Salient Object Detection with RGB-Thermal Data.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Towards Stricter Black-box Integrity Verification of Deep Neural Network Models.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

X-Transfer: A Transfer Learning-Based Framework for GAN-Generated Fake Image Detection.
Proceedings of the International Joint Conference on Neural Networks, 2024

Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

MysticMask: Adversarial Mask for Impersonation Attack Against Face Recognition Systems.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

AMPO: Automatic Multi-Branched Prompt Optimization.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

StraGo: Harnessing Strategic Guidance for Prompt Optimization.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024

On the Vulnerability of Safety Alignment in Open-Access LLMs.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

2023
Benchmarking and Defending Against Indirect Prompt Injection Attacks on Large Language Models.
CoRR, 2023

X-Transfer: A Transfer Learning-Based Framework for Robust GAN-Generated Fake Image Detection.
CoRR, 2023

Improving Cross-dataset Deepfake Detection with Deep Information Decomposition.
CoRR, 2023

Deep Reinforcement Learning for Image-to-Image Translation.
CoRR, 2023

Attacking Important Pixels for Anchor-free Detectors.
CoRR, 2023

Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

UA-FedRec: Untargeted Attack on Federated News Recommendation.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

FedDefender: Client-Side Attack-Tolerant Federated Learning.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

RMBench: Benchmarking Deep Reinforcement Learning for Robotic Manipulator Control.
IROS, 2023

Visually Analysing the Fairness of Clustered Federated Learning with Non-IID Data.
Proceedings of the International Joint Conference on Neural Networks, 2023

Controlling Neural Style Transfer with Deep Reinforcement Learning.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Towards Attack-tolerant Federated Learning via Critical Parameter Analysis.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Harnessing the Power of Text-image Contrastive Models for Automatic Detection of Online Misinformation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Privacy-preserving Motion Detection for HEVC-compressed Surveillance Video.
ACM Trans. Multim. Comput. Commun. Appl., 2022

DE-GAN: Domain Embedded GAN for High Quality Face Image Inpainting.
Pattern Recognit., 2022

Learning a deep dual-level network for robust DeepFake detection.
Pattern Recognit., 2022

Fuzzing with automatically controlled interleavings to detect concurrency bugs.
J. Syst. Softw., 2022

Defending against attacks tailored to transfer learning via feature distancing.
Comput. Vis. Image Underst., 2022

Robust Quantity-Aware Aggregation for Federated Learning.
CoRR, 2022

UA-FedRec: Untargeted Attack on Federated News Recommendation.
CoRR, 2022

ChartStamp: Robust Chart Embedding for Real-World Applications.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Contrastive Class-Specific Encoding for Few-Shot Object Detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

OneLabeler: A Flexible System for Building Data Labeling Tools.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
Chartem: Reviving Chart Images with Data Embedding.
IEEE Trans. Vis. Comput. Graph., 2021

Transferable Adversarial Examples for Anchor Free Object Detection.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Imperceptible Adversarial Examples For Fake Image Detection.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Feature-Indistinguishable Attack to Circumvent Trapdoor-Enabled Defense.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2019
WearAuth: Wristwear-Assisted User Authentication for Smartphones Using Wavelet-Based Multi-Resolution Analysis.
IEICE Trans. Inf. Syst., 2019

Decoding Homomorphically Encrypted Flac Audio without Decryption.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
Detectability and reproducibility of the olfactory fMRI signal under the influence of magnetic susceptibility artifacts in the primary olfactory cortex.
NeuroImage, 2018

The Time-Domain Integration Method of Digital Subtraction Angiography Images.
Comput. Math. Methods Medicine, 2018

JPEG Decompression in the Homomorphic Encryption Domain.
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018

Efficient privacy-preserving motion detection for HEVC compressed video in cloud video surveillance.
Proceedings of the IEEE INFOCOM 2018, 2018

Privacy-Preserving Cloud-Based Video Surveillance with Adjustable Granularity of Privacy Protection.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

A Heuristic Framework to Detect Concurrency Vulnerabilities.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2015
CipherCard: A Token-Based Approach Against Camera-Based Shoulder Surfing Attacks on Common Touchscreen Devices.
Proceedings of the Human-Computer Interaction - INTERACT 2015, 2015

2014
Captcha as Graphical Passwords - A New Security Primitive Based on Hard AI Problems.
IEEE Trans. Inf. Forensics Secur., 2014

Security Analyses of Click-based Graphical Passwords via Image Point Memorability.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
PC Worm Detection System Based on the Correlation between User Interactions and Comprehensive Network Behaviors.
IEICE Trans. Inf. Syst., 2013

Security implications of password discretization for click-based graphical passwords.
Proceedings of the 22nd International World Wide Web Conference, 2013

Towards New Security Primitives Based on Hard AI Problems.
Proceedings of the Security Protocols XXI, 2013

Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs.
Proceedings of IEEE International Conference on Communications, 2013

2011
Detecting Malicious Web Links and Identifying Their Attack Types.
Proceedings of the 2nd USENIX Conference on Web Application Development, 2011

2010
Smart caching for web browsers.
Proceedings of the 19th International Conference on World Wide Web, 2010

Attacks and design of image recognition CAPTCHAs.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
WPBench: a benchmark for evaluating the client-side performance of web 2.0 applications.
Proceedings of the 18th International Conference on World Wide Web, 2009

2008
Compoweb: a component-oriented web architecture.
Proceedings of the 17th International Conference on World Wide Web, 2008

A comprehensive human computation framework: with application to image labeling.
Proceedings of the 16th International Conference on Multimedia 2008, 2008

Analysis on AACS' Traitor Tracing Against Mix-and-Match Attacks.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

A DRM System Protecting Consumer Privacy.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Deniable Internet Key-Exchange.
IACR Cryptol. ePrint Arch., 2007

Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability.
EURASIP J. Inf. Secur., 2007

An Efficient Certified Email Protocol.
Proceedings of the Information Security, 10th International Conference, 2007

When DRM Meets Restricted Multicast: A Content Encryption Key Scheme for Multicast Encryption and DRM.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication.
Proceedings of the Information Security Practice and Experience, 2006

An efficient key scheme for multiple access of JPEG 2000 and motion JPEG 2000 enabling truncations.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2005
Scalable protection for MPEG-4 fine granularity scalability.
IEEE Trans. Multim., 2005

Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis.
IACR Cryptol. ePrint Arch., 2005

A Note on the Cramer-Damgård Identification Scheme.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

Fine Granularity Scalability Encryption of MPEG-4 FGS Bitstreams.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Secure Key Management for Flexible Digital Rights Management of Scalable Codestreams.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

JPEG 2000 encryption enabling fine granularity scalability without decryption.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

A framework of scalable layered access control for multimedia.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

JPEG 2000 syntax-compliant encryption preserving full scalability.
Proceedings of the 2005 International Conference on Image Processing, 2005

Optimal packetization of fine granularity scalability codestreams for error-prone channels.
Proceedings of the 2005 International Conference on Image Processing, 2005

ThresPassport - A Distributed Single Sign-On Service.
Proceedings of the Advances in Intelligent Computing, 2005

A DRM System Supporting What You See Is What You Pay.
Proceedings of the Digital Rights Management: Technologies, 2005

A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network.
Proceedings of the Digital Rights Management: Technologies, 2005

2004
When seeing isn't believing [multimedia authentication technologies].
IEEE Signal Process. Mag., 2004

New attacks on SARI image authentication system.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

An efficient key scheme for layered access control of MPEG-4 FGS video.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

A secure image authentication algorithm with pixel-level tamper localization.
Proceedings of the 2004 International Conference on Image Processing, 2004

2003
Efficient and fully scalable encryption for MPEG-4 FGS.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Layered access control for MPEG-4 FGS video.
Proceedings of the 2003 International Conference on Image Processing, 2003

PLI: A New Framework to Protect Digital Content for P2P Networks.
Proceedings of the Applied Cryptography and Network Security, 2003

1999
Arithmetic coding with dual symbol sets and its performance analysis.
IEEE Trans. Image Process., 1999

Current State of the Art - Challenges and Future Directions for Audio Watermarking.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Data embedding in audio: where do we stand.
Proceedings of the 1999 IEEE International Conference on Acoustics, 1999

1998
Robust audio watermarking using perceptual masking.
Signal Process., 1998

Multiresolution scene-based video watermarking using perceptual models.
IEEE J. Sel. Areas Commun., 1998

1997
Object-based transparent video watermarking.
Proceedings of the First IEEE Workshop on Multimedia Signal Processing, 1997

Image Coding by Folding.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

Data Hiding for Video-in-Video.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

Multiresolution Video Watermarking Using Perceptual Models and Scene Segmentation.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

1996
Transparent robust image watermarking.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

Dual set arithmetic coding and its applications to image coding.
Proceedings of the 8th European Signal Processing Conference, 1996

1995
Image coding with wavelet representations, edge information and visual masking.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995

Image coding with mixed representations and visual masking.
Proceedings of the 1995 International Conference on Acoustics, 1995


  Loading...