An infrastructure for fault-resilient wide-area location and routing BY Zhao Technical Report, UC Berkeley, 2001 | 3885* | 2001 |
Oceanstore: An architecture for global-scale persistent storage J Kubiatowicz, D Bindel, Y Chen, S Czerwinski, P Eaton, D Geels, ... ACM SIGOPS Operating Systems Review 34 (5), 190-201, 2000 | 3632 | 2000 |
Tapestry: A resilient global-scale overlay for service deployment BY Zhao, L Huang, J Stribling, SC Rhea, AD Joseph, JD Kubiatowicz IEEE Journal on selected areas in communications 22 (1), 41-53, 2004 | 2854 | 2004 |
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao IEEE Symposium on Security and Privacy (Oakland), 513-529, 2019 | 1444 | 2019 |
User interactions in social networks and their implications C Wilson, B Boe, A Sala, KPN Puttaswamy, BY Zhao Proceedings of the 4th ACM European conference on Computer systems, 205-218, 2009 | 1260 | 2009 |
Bayeux: An architecture for scalable and fault-tolerant wide-area data dissemination SQ Zhuang, BY Zhao, AD Joseph, RH Katz, JD Kubiatowicz Proceedings of the 11th international workshop on Network and operating …, 2001 | 1215 | 2001 |
An architecture for a secure service discovery service SE Czerwinski, BY Zhao, TD Hodes, AD Joseph, RH Katz Proceedings of the 5th annual ACM/IEEE international conference on Mobile …, 1999 | 967 | 1999 |
Understanding user behavior in large-scale video-on-demand systems H Yu, D Zheng, BY Zhao, W Zheng ACM SIGOPS Operating Systems Review 40 (4), 333-344, 2006 | 871 | 2006 |
Towards a common API for structured peer-to-peer overlays F Dabek, B Zhao, P Druschel, J Kubiatowicz, I Stoica International Workshop on Peer-To-Peer Systems, 33-44, 2003 | 841 | 2003 |
Utilization and fairness in spectrum assignment for opportunistic spectrum access C Peng, H Zheng, BY Zhao Mobile Networks and Applications 11, 555-576, 2006 | 806 | 2006 |
Pond: The OceanStore Prototype S Rhea, P Eaton, D Geels, H Weatherspoon, B Zhao, J Kubiatowicz 2Nd USENIX Conference on File and Storage Technologies (FAST 03), 2003 | 760 | 2003 |
Detecting and characterizing social spam campaigns H Gao, J Hu, C Wilson, Z Li, Y Chen, BY Zhao Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 35-47, 2010 | 745 | 2010 |
Uncovering social network sybils in the wild Z Yang, C Wilson, X Wang, T Gao, BY Zhao, Y Dai ACM Transactions on Knowledge Discovery from Data (TKDD) 8 (1), 2, 2014 | 568 | 2014 |
The Ninja architecture for robust Internet-scale systems and services SD Gribble, M Welsh, R Von Behren, E Brewer, D Culler, N Borisov, ... Computer Networks 35 (4), 473-497, 2000 | 528 | 2000 |
Distributed data location in a dynamic network K Hildrum, JD Kubiatowicz, S Rao, BY Zhao Proceedings of ACM SPAA 2002, 2002 | 526* | 2002 |
Tapestry: An Infrastructure for Fault-Resilient Wide-Area Location and Routing BY Zhao Technical Report UCB/CSD-01-1141, 2001 | 458 | 2001 |
Latent Backdoor Attacks on Deep Neural Networks Y Yao, H Li, H Zheng, BY Zhao Proceedings of ACM Conference on Computer and Communication Security (CCS), 2019 | 418 | 2019 |
Mirror Mirror on the Ceiling: Flexible Wireless Links for Data Centers X Zhou, Z Zhang, Y Zhu, Y Li, S Kumar, A Vahdat, BY Zhao, H Zheng Proceedings of ACM SIGCOMM, 2012, 2012 | 400 | 2012 |
Packet-level telemetry in large datacenter networks Y Zhu, N Kang, J Cao, A Greenberg, G Lu, R Mahajan, D Maltz, L Yuan, ... Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015 | 396 | 2015 |
A Markov-based channel model algorithm for wireless networks A Konrad, BY Zhao, AD Joseph, R Ludwig Proceedings of the 4th ACM international workshop on Modeling, analysis and …, 2001 | 394 | 2001 |