Bin B. Zhu
Orcid: 0000-0002-3571-7808Affiliations:
- Microsoft Research Asia, Beijing, China
- Cognicity, Inc., Edina, MN, USA (1997 - 2001)
- University of Minnesota, Minneapolis, MN, USA (PhD 1998)
According to our database1,
Bin B. Zhu
authored at least 105 papers
between 1995 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
CoRR, August, 2025
Benchmarking and Defending against Indirect Prompt Injection Attacks on Large Language Models.
Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining, V.1, 2025
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025
SDBF: Steep-Decision-Boundary Fingerprinting for Hard-Label Tampering Detection of DNN Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025
ESF: Efficient Sensitive Fingerprinting for Black-Box Tamper Detection of Large Language Models.
Proceedings of the Findings of the Association for Computational Linguistics, 2025
2024
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
X-Transfer: A Transfer Learning-Based Framework for GAN-Generated Fake Image Detection.
Proceedings of the International Joint Conference on Neural Networks, 2024
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
MysticMask: Adversarial Mask for Impersonation Attack Against Face Recognition Systems.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
Benchmarking and Defending Against Indirect Prompt Injection Attacks on Large Language Models.
CoRR, 2023
X-Transfer: A Transfer Learning-Based Framework for Robust GAN-Generated Fake Image Detection.
CoRR, 2023
CoRR, 2023
Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
IROS, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Harnessing the Power of Text-image Contrastive Models for Automatic Detection of Online Misinformation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023
2022
ACM Trans. Multim. Comput. Commun. Appl., 2022
Pattern Recognit., 2022
Pattern Recognit., 2022
J. Syst. Softw., 2022
Comput. Vis. Image Underst., 2022
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
2021
IEEE Trans. Vis. Comput. Graph., 2021
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2019
WearAuth: Wristwear-Assisted User Authentication for Smartphones Using Wavelet-Based Multi-Resolution Analysis.
IEICE Trans. Inf. Syst., 2019
Proceedings of the IEEE International Conference on Acoustics, 2019
2018
Detectability and reproducibility of the olfactory fMRI signal under the influence of magnetic susceptibility artifacts in the primary olfactory cortex.
NeuroImage, 2018
Comput. Math. Methods Medicine, 2018
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018
Efficient privacy-preserving motion detection for HEVC compressed video in cloud video surveillance.
Proceedings of the IEEE INFOCOM 2018, 2018
Privacy-Preserving Cloud-Based Video Surveillance with Adjustable Granularity of Privacy Protection.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2015
CipherCard: A Token-Based Approach Against Camera-Based Shoulder Surfing Attacks on Common Touchscreen Devices.
Proceedings of the Human-Computer Interaction - INTERACT 2015, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
PC Worm Detection System Based on the Correlation between User Interactions and Comprehensive Network Behaviors.
IEICE Trans. Inf. Syst., 2013
Security implications of password discretization for click-based graphical passwords.
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the Security Protocols XXI, 2013
Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs.
Proceedings of IEEE International Conference on Communications, 2013
2011
Proceedings of the 2nd USENIX Conference on Web Application Development, 2011
2010
Proceedings of the 19th International Conference on World Wide Web, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
WPBench: a benchmark for evaluating the client-side performance of web 2.0 applications.
Proceedings of the 18th International Conference on World Wide Web, 2009
2008
Proceedings of the 17th International Conference on World Wide Web, 2008
Proceedings of the 16th International Conference on Multimedia 2008, 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
2007
Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability.
EURASIP J. Inf. Secur., 2007
Proceedings of the Information Security, 10th International Conference, 2007
When DRM Meets Restricted Multicast: A Content Encryption Key Scheme for Multicast Encryption and DRM.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007
2006
Proceedings of the Information Security Practice and Experience, 2006
An efficient key scheme for multiple access of JPEG 2000 and motion JPEG 2000 enabling truncations.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006
2005
IEEE Trans. Multim., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Internet and Network Economics, First International Workshop, 2005
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005
Secure Key Management for Flexible Digital Rights Management of Scalable Codestreams.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005
Proceedings of the 2005 International Conference on Image Processing, 2005
Optimal packetization of fine granularity scalability codestreams for error-prone channels.
Proceedings of the 2005 International Conference on Image Processing, 2005
Proceedings of the Advances in Intelligent Computing, 2005
Proceedings of the Digital Rights Management: Technologies, 2005
Proceedings of the Digital Rights Management: Technologies, 2005
2004
IEEE Signal Process. Mag., 2004
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004
A secure image authentication algorithm with pixel-level tamper localization.
Proceedings of the 2004 International Conference on Image Processing, 2004
2003
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
Proceedings of the 2003 International Conference on Image Processing, 2003
Proceedings of the Applied Cryptography and Network Security, 2003
1999
IEEE Trans. Image Process., 1999
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999
Proceedings of the 1999 IEEE International Conference on Acoustics, 1999
1998
IEEE J. Sel. Areas Commun., 1998
1997
Proceedings of the First IEEE Workshop on Multimedia Signal Processing, 1997
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997
1996
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996
Proceedings of the 8th European Signal Processing Conference, 1996
1995
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995
Proceedings of the 1995 International Conference on Acoustics, 1995