Bin B. Zhu

According to our database1, Bin B. Zhu authored at least 54 papers between 1995 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A Heuristic Framework to Detect Concurrency Vulnerabilities.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2014
Captcha as Graphical Passwords - A New Security Primitive Based on Hard AI Problems.
IEEE Trans. Inf. Forensics Secur., 2014

Security Analyses of Click-based Graphical Passwords via Image Point Memorability.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Security implications of password discretization for click-based graphical passwords.
Proceedings of the 22nd International World Wide Web Conference, 2013

Towards New Security Primitives Based on Hard AI Problems.
Proceedings of the Security Protocols XXI, 2013

Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs.
Proceedings of IEEE International Conference on Communications, 2013

2011
Detecting Malicious Web Links and Identifying Their Attack Types.
Proceedings of the 2nd USENIX Conference on Web Application Development, 2011

2010
Smart caching for web browsers.
Proceedings of the 19th International Conference on World Wide Web, 2010

Attacks and design of image recognition CAPTCHAs.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
WPBench: a benchmark for evaluating the client-side performance of web 2.0 applications.
Proceedings of the 18th International Conference on World Wide Web, 2009

2008
Compoweb: a component-oriented web architecture.
Proceedings of the 17th International Conference on World Wide Web, 2008

A comprehensive human computation framework: with application to image labeling.
Proceedings of the 16th International Conference on Multimedia 2008, 2008

Analysis on AACS' Traitor Tracing Against Mix-and-Match Attacks.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

A DRM System Protecting Consumer Privacy.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Deniable Internet Key-Exchange.
IACR Cryptol. ePrint Arch., 2007

Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability.
EURASIP J. Inf. Secur., 2007

An Efficient Certified Email Protocol.
Proceedings of the Information Security, 10th International Conference, 2007

When DRM Meets Restricted Multicast: A Content Encryption Key Scheme for Multicast Encryption and DRM.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication.
Proceedings of the Information Security Practice and Experience, 2006

An efficient key scheme for multiple access of JPEG 2000 and motion JPEG 2000 enabling truncations.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2005
Scalable protection for MPEG-4 fine granularity scalability.
IEEE Trans. Multim., 2005

Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis.
IACR Cryptol. ePrint Arch., 2005

A Note on the Cramer-Damgård Identification Scheme.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

Fine Granularity Scalability Encryption of MPEG-4 FGS Bitstreams.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Secure Key Management for Flexible Digital Rights Management of Scalable Codestreams.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

JPEG 2000 encryption enabling fine granularity scalability without decryption.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

A framework of scalable layered access control for multimedia.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

JPEG 2000 syntax-compliant encryption preserving full scalability.
Proceedings of the 2005 International Conference on Image Processing, 2005

Optimal packetization of fine granularity scalability codestreams for error-prone channels.
Proceedings of the 2005 International Conference on Image Processing, 2005

ThresPassport - A Distributed Single Sign-On Service.
Proceedings of the Advances in Intelligent Computing, 2005

A DRM System Supporting What You See Is What You Pay.
Proceedings of the Digital Rights Management: Technologies, 2005

A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network.
Proceedings of the Digital Rights Management: Technologies, 2005

2004
When seeing isn't believing [multimedia authentication technologies].
IEEE Signal Process. Mag., 2004

New attacks on SARI image authentication system.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

An efficient key scheme for layered access control of MPEG-4 FGS video.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

A secure image authentication algorithm with pixel-level tamper localization.
Proceedings of the 2004 International Conference on Image Processing, 2004

2003
Efficient and fully scalable encryption for MPEG-4 FGS.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Layered access control for MPEG-4 FGS video.
Proceedings of the 2003 International Conference on Image Processing, 2003

PLI: A New Framework to Protect Digital Content for P2P Networks.
Proceedings of the Applied Cryptography and Network Security, 2003

1999
Arithmetic coding with dual symbol sets and its performance analysis.
IEEE Trans. Image Process., 1999

Current State of the Art - Challenges and Future Directions for Audio Watermarking.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Data embedding in audio: where do we stand.
Proceedings of the 1999 IEEE International Conference on Acoustics, 1999

1998
Robust audio watermarking using perceptual masking.
Signal Process., 1998

Multiresolution scene-based video watermarking using perceptual models.
IEEE J. Sel. Areas Commun., 1998

1997
Object-based transparent video watermarking.
Proceedings of the First IEEE Workshop on Multimedia Signal Processing, 1997

Image Coding by Folding.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

Data Hiding for Video-in-Video.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

Multiresolution Video Watermarking Using Perceptual Models and Scene Segmentation.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

1996
Transparent robust image watermarking.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

Dual set arithmetic coding and its applications to image coding.
Proceedings of the 8th European Signal Processing Conference, 1996

1995
Image coding with wavelet representations, edge information and visual masking.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995

Image coding with mixed representations and visual masking.
Proceedings of the 1995 International Conference on Acoustics, 1995


  Loading...