Ben Y. Zhao - Publications

Affiliations: 
Computer Science University of California, Santa Barbara, Santa Barbara, CA, United States 

30 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Wang G, Wang B, Wang T, Nika A, Zheng H, Zhao BY. Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services Ieee/Acm Transactions On Networking. 26: 1123-1136. DOI: 10.1109/Tnet.2018.2818073  0.461
2018 Metzger MJ, Wilson C, Zhao BY. Benefits of Browsing? The Prevalence, Nature, and Effects of Profile Consumption Behavior in Social Network Sites Journal of Computer-Mediated Communication. 23: 72-89. DOI: 10.1093/Jcmc/Zmx004  0.547
2017 Wang G, Zhang X, Tang S, Wilson C, Zheng H, Zhao BY. Clickstream User Behavior Models Acm Transactions On the Web. 11: 21. DOI: 10.1145/3068332  0.604
2017 Wang T, Wang G, Wang B, Sambasivan D, Zhang Z, Li X, Zheng H, Zhao BY. Value and Misinformation in Collaborative Investing Platforms Acm Transactions On the Web. 11: 8. DOI: 10.1145/3027487  0.343
2017 Nika A, Zhang Z, Zhao BY, Zheng H. Toward Practical Spectrum Permits Ieee Transactions On Cognitive Communications and Networking. 3: 112-122. DOI: 10.1109/Tccn.2017.2656127  0.48
2016 Liu Q, Zhao X, Willinger W, Wang X, Zhao BY, Zheng H. Self-Similarity in Social Network Dynamics Acm Transactions On Modeling and Performance Evaluation of Computing. 2: 5. DOI: 10.1145/2994142  0.611
2016 Wang T, Chen Y, Wang Y, Wang B, Wang G, Li X, Zheng H, Zhao BY. The power of comments: fostering social interactions in microblog networks Frontiers of Computer Science. 10: 889-907. DOI: 10.1007/S11704-016-5198-Y  0.467
2016 Nika A, Ismail A, Zhao BY, Gaito S, Rossi GP, Zheng H. Understanding and Predicting Data Hotspots in Cellular Networks Mobile Networks and Applications. 21: 402-413. DOI: 10.1007/S11036-015-0648-6  0.484
2015 Zhou X, Zhang Z, Wang G, Yu X, Zhao BY, Zheng H. Practical conflict graphs in the wild Ieee Acm Transactions On Networking. 23: 824-835. DOI: 10.1109/Tnet.2014.2306416  0.317
2014 Yang Z, Wilson C, Wang X, Gao T, Zhao BY, Dai Y. Uncovering social network Sybils in the wild Acm Transactions On Knowledge Discovery From Data. 8: 2. DOI: 10.1145/2556609  0.584
2014 Puttaswamy KPN, Wang S, Steinbauer T, Agrawal D, El Abbadi A, Kruegel C, Zhao BY. Preserving location privacy in geosocial applications Ieee Transactions On Mobile Computing. 13: 159-173. DOI: 10.1109/Tmc.2012.247  0.464
2013 Jiang J, Wilson C, Wang X, Sha W, Huang P, Dai Y, Zhao BY. Understanding latent interactions in online social networks Acm Transactions On the Web. 7. DOI: 10.1145/2517040  0.603
2013 Kone V, Zheng H, Rowstron A, O'Shea G, Zhao BY. Measurement-based design of roadside content delivery systems Ieee Transactions On Mobile Computing. 12: 1160-1173. DOI: 10.1109/Tmc.2012.90  0.712
2012 Wilson C, Sala A, Puttaswamy KPN, Zhao BY. Beyond Social Graphs: User Interactions in Online Social Networks and their Implications Acm Transactions On the Web. 6: 17. DOI: 10.1145/2382616.2382620  0.587
2012 Kone V, Yang L, Yang X, Zhao BY, Zheng H. The effectiveness of opportunistic spectrum access: a measurement study Ieee Acm Transactions On Networking. 20: 2005-2016. DOI: 10.1109/Tnet.2012.2191571  0.713
2011 Yang Z, Tian J, Zhao BY, Chen W, Dai Y. Protector: A Probabilistic Failure Detector for Cost-Effective Peer-to-Peer Storage Ieee Transactions On Parallel and Distributed Systems. 22: 1514-1527. DOI: 10.1109/Tpds.2010.205  0.37
2011 Kone V, Zheng H, Rowstron A, Zhao BY. The impact of infostation density on vehicular data dissemination Mobile Networks and Applications. 16: 807-819. DOI: 10.1007/S11036-010-0277-Z  0.717
2010 Swamynathan G, Almeroth KC, Zhao BY. The design of a reliable reputation system Electronic Commerce Research. 10: 239-270. DOI: 10.1007/S10660-010-9064-Y  0.427
2009 Puttaswamy KPN, Zheng H, Zhao BY. Securing Structured Overlays against Identity Attacks Ieee Transactions On Parallel and Distributed Systems. 20: 1487-1498. DOI: 10.1109/Tpds.2008.241  0.382
2009 Qiu T, Chan E, Ye M, Chen G, Zhao BY. Peer-exchange schemes to handle mismatch in peer-to-peer systems The Journal of Supercomputing. 48: 15-42. DOI: 10.1007/S11227-008-0203-3  0.43
2008 Swamynathan G, Zhao BY, Almeroth KC. Exploring the feasibility of proactive reputations Concurrency Computation Practice and Experience. 20: 155-166. DOI: 10.1002/Cpe.1186  0.396
2007 Kone V, Das S, Zhao BY, Zheng H. QUORUM-Quality of service in wireless mesh networks Mobile Networks and Applications. 12: 358-369. DOI: 10.1007/S11036-008-0050-8  0.719
2006 Konrad A, Zhao BY, Joseph AD. Determining model accuracy of network traces Journal of Computer and System Sciences. 72: 1156-1171. DOI: 10.1016/J.Jcss.2005.12.009  0.443
2006 Peng C, Zheng H, Zhao BY. Utilization and fairness in spectrum assignment for opportunistic spectrum access Mobile Networks and Applications. 11: 555-576. DOI: 10.1007/S11036-006-7322-Y  0.375
2004 Zhao BY, Huang L, Stribling J, Rhea SC, Joseph AD, Kubiatowicz JD. Tapestry: A resilient global-scale overlay for service deployment Ieee Journal On Selected Areas in Communications. 22: 41-53. DOI: 10.1109/Jsac.2003.818784  0.401
2004 Hildrum K, Kubiatowicz JD, Rao S, Zhao BY. Distributed object location in a dynamic network Theory of Computing Systems. 37: 405-440. DOI: 10.1007/S00224-004-1146-6  0.452
2003 Konrad A, Zhao BY, Joseph AD, Ludwig R. A Markov-based channel model algorithm for wireless networks Wireless Networks. 9: 189-199. DOI: 10.1023/A:1022869025953  0.399
2002 Hodes TD, Czerwinski SE, Zhao BY, Joseph AD, Katz RH. An architecture for secure wide-area service discovery Wireless Networks. 8: 213-230. DOI: 10.1023/A:1013772027164  0.405
2001 Rhea S, Wells G, Eaton P, Geels D, Zhao B, Weatherspoon H, Kubiatowicz J. Maintenance-free global data storage Ieee Internet Computing. 5: 40-49. DOI: 10.1109/4236.957894  0.45
2001 Gribble SD, Welsh M, Von Behren R, Brewer EA, Culler D, Borisov N, Czerwinski S, Gummadi R, Hill J, Joseph A, Katz RH, Mao ZM, Ross S, Zhao B. Ninja architecture for robust Internet-scale systems and services Computer Networks. 35: 473-497. DOI: 10.1016/S1389-1286(00)00179-1  0.342
Show low-probability matches.