


default search action
Bin B. Zhu
Person information
- affiliation: Microsoft Research Asia, Beijing, China
- affiliation (1997 - 2001): Cognicity, Inc., Edina, MN, USA
- affiliation (PhD 1998): University of Minnesota, Minneapolis, MN, USA
Other persons with the same name
- Bin Zhu — disambiguation page
- Bin Zhu 0001 — Boston University, School of Management, MA, USA (and 1 more)
- Bin Zhu 0002
— Chongqing University, College of Communication Engineering, China
- Bin Zhu 0003
— Electronic Engineering Institute, Hefei, China
- Bin Zhu 0004
— Tsinghua University, Department of Mathematical Sciences, Beijing, China
- Bin Zhu 0005 — Saarland University, Saarbrücken, Germany
- Bin Zhu 0006
— Singapore Management University, School of Computing and Information Systems, Singapore (and 2 more)
- Bin Zhu 0007 — Oregon State University, Corvallis, OR, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c74]Jingwei Yi, Rui Ye, Qisi Chen, Bin Zhu, Siheng Chen, Defu Lian, Guangzhong Sun, Xing Xie, Fangzhao Wu:
On the Vulnerability of Safety Alignment in Open-Access LLMs. ACL (Findings) 2024: 9236-9260 - [c73]Yurong Wu, Yan Gao, Bin Zhu, Zineng Zhou, Xiaodi Sun, Sheng Yang, Jian-Guang Lou, Zhiming Ding, Linjun Yang:
StraGo: Harnessing Strategic Guidance for Prompt Optimization. EMNLP (Findings) 2024: 10043-10061 - [c72]Sheng Yang, Yurong Wu, Yan Gao, Zineng Zhou, Bin Zhu, Xiaodi Sun, Jian-Guang Lou, Zhiming Ding, Anbang Hu, Yuan Fang, Yunsong Li, Junyan Chen, Linjun Yang:
AMPO: Automatic Multi-Branched Prompt Optimization. EMNLP 2024: 20267-20279 - [c71]Chaoxiang He, Yimiao Zeng, Xiaojing Ma, Bin Benjamin Zhu, Zewei Li, Shixin Li, Hai Jin:
MysticMask: Adversarial Mask for Impersonation Attack Against Face Recognition Systems. ICME 2024: 1-6 - [c70]Xiaofan Bai, Chaoxiang He, Xiaojing Ma, Bin Benjamin Zhu, Hai Jin:
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models. ICML 2024 - [c69]Lei Zhang, Hao Chen, Shu Hu, Bin Zhu, Chingsheng Lin, Xi Wu, Jinrong Hu, Xin Wang:
X-Transfer: A Transfer Learning-Based Framework for GAN-Generated Fake Image Detection. IJCNN 2024: 1-8 - [c68]Wen Yin
, Bin Benjamin Zhu
, Yulai Xie
, Pan Zhou
, Dan Feng
:
Backdoor Attacks on Bimodal Salient Object Detection with RGB-Thermal Data. ACM Multimedia 2024: 4110-4119 - [c67]Chaoxiang He
, Xiaofan Bai
, Xiaojing Ma
, Bin B. Zhu
, Pingyi Hu
, Jiayun Fu
, Hai Jin
, Dongmei Zhang
:
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models. ACM Multimedia 2024: 9875-9884 - [c66]Chaoxiang He, Xiaojing Ma, Bin B. Zhu, Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin, Dongmei Zhang:
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses. NDSS 2024 - [i20]Yurong Wu, Yan Gao, Bin Benjamin Zhu, Zineng Zhou, Xiaodi Sun, Sheng Yang, Jian-Guang Lou, Zhiming Ding, Linjun Yang:
StraGo: Harnessing Strategic Guidance for Prompt Optimization. CoRR abs/2410.08601 (2024) - [i19]Sheng Yang, Yurong Wu, Yan Gao, Zineng Zhou, Bin Benjamin Zhu, Xiaodi Sun, Jian-Guang Lou, Zhiming Ding, Anbang Hu, Yuan Fang, Yunsong Li, Junyan Chen, Linjun Yang:
AMPO: Automatic Multi-Branched Prompt Optimization. CoRR abs/2410.08696 (2024) - 2023
- [c65]Wenjun Peng, Jingwei Yi, Fangzhao Wu, Shangxi Wu, Bin Zhu, Lingjuan Lyu, Binxing Jiao, Tong Xu, Guangzhong Sun, Xing Xie:
Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark. ACL (1) 2023: 7653-7668 - [c64]Hao Chen, Peng Zheng, Xin Wang, Shu Hu, Bin Zhu, Jinrong Hu, Xi Wu, Siwei Lyu:
Harnessing the Power of Text-image Contrastive Models for Automatic Detection of Online Misinformation. CVPR Workshops 2023: 923-932 - [c63]Sungwon Han, Sungwon Park, Fangzhao Wu, Sundong Kim
, Bin Zhu, Xing Xie, Meeyoung Cha
:
Towards Attack-tolerant Federated Learning via Critical Parameter Analysis. ICCV 2023: 4976-4985 - [c62]Chengming Feng, Jing Hu, Xin Wang, Shu Hu
, Bin Zhu, Xi Wu, Hongtu Zhu, Siwei Lyu:
Controlling Neural Style Transfer with Deep Reinforcement Learning. IJCAI 2023: 100-108 - [c61]Li Huang, Weiwei Cui, Bin B. Zhu, Haidong Zhang:
Visually Analysing the Fairness of Clustered Federated Learning with Non-IID Data. IJCNN 2023: 1-10 - [c60]Yanfei Xiang, Xin Wang, Shu Hu, Bin Zhu, Xiaomeng Huang, Xi Wu, Siwei Lyu:
RMBench: Benchmarking Deep Reinforcement Learning for Robotic Manipulator Control. IROS 2023: 1207-1214 - [c59]Sungwon Park
, Sungwon Han
, Fangzhao Wu
, Sundong Kim
, Bin Zhu
, Xing Xie
, Meeyoung Cha
:
FedDefender: Client-Side Attack-Tolerant Federated Learning. KDD 2023: 1850-1861 - [c58]Jingwei Yi
, Fangzhao Wu
, Bin Zhu
, Jing Yao
, Zhulin Tao
, Guangzhong Sun
, Xing Xie
:
UA-FedRec: Untargeted Attack on Federated News Recommendation. KDD 2023: 5428-5438 - [c57]Jiayun Fu, Xiaojing Ma, Bin B. Zhu, Pingyi Hu, Ruixin Zhao, Yaru Jia, Peng Xu, Hai Jin, Dongmei Zhang:
Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes. NDSS 2023 - [i18]Yunxu Xie, Shu Hu, Xin Wang, Quanyu Liao, Bin Zhu, Xi Wu, Siwei Lyu:
Attacking Important Pixels for Anchor-free Detectors. CoRR abs/2301.11457 (2023) - [i17]Hao Chen, Peng Zheng, Xin Wang, Shu Hu, Bin Zhu, Jinrong Hu, Xi Wu, Siwei Lyu:
Harnessing the Power of Text-image Contrastive Models for Automatic Detection of Online Misinformation. CoRR abs/2304.10249 (2023) - [i16]Wenjun Peng, Jingwei Yi, Fangzhao Wu, Shangxi Wu, Bin Zhu, Lingjuan Lyu, Binxing Jiao, Tong Xu, Guangzhong Sun, Xing Xie:
Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark. CoRR abs/2305.10036 (2023) - [i15]Sungwon Park, Sungwon Han, Fangzhao Wu, Sundong Kim, Bin Zhu, Xing Xie, Meeyoung Cha:
FedDefender: Client-Side Attack-Tolerant Federated Learning. CoRR abs/2307.09048 (2023) - [i14]Sungwon Han, Sungwon Park, Fangzhao Wu, Sundong Kim, Bin Zhu, Xing Xie, Meeyoung Cha
:
Towards Attack-tolerant Federated Learning via Critical Parameter Analysis. CoRR abs/2308.09318 (2023) - [i13]Xin Wang, Ziwei Luo, Jing Hu, Chengming Feng, Shu Hu, Bin Zhu, Xi Wu, Siwei Lyu:
Deep Reinforcement Learning for Image-to-Image Translation. CoRR abs/2309.13672 (2023) - [i12]Shanmin Yang, Shu Hu, Bin Zhu, Ying Fu, Siwei Lyu, Xi Wu, Xin Wang:
Improving Cross-dataset Deepfake Detection with Deep Information Decomposition. CoRR abs/2310.00359 (2023) - [i11]Chengming Feng, Jing Hu, Xin Wang, Shu Hu, Bin Zhu, Xi Wu, Hongtu Zhu, Siwei Lyu:
Controlling Neural Style Transfer with Deep Reinforcement Learning. CoRR abs/2310.00405 (2023) - [i10]Lei Zhang, Hao Chen, Shu Hu, Bin Zhu, Xi Wu, Jinrong Hu, Xin Wang:
X-Transfer: A Transfer Learning-Based Framework for Robust GAN-Generated Fake Image Detection. CoRR abs/2310.04639 (2023) - [i9]Jingwei Yi, Yueqi Xie, Bin Zhu, Keegan Hines, Emre Kiciman, Guangzhong Sun, Xing Xie, Fangzhao Wu:
Benchmarking and Defending Against Indirect Prompt Injection Attacks on Large Language Models. CoRR abs/2312.14197 (2023) - 2022
- [j17]Sangwoo Ji
, Namgyu Park
, Dongbin Na, Bin Zhu, Jong Kim
:
Defending against attacks tailored to transfer learning via feature distancing. Comput. Vis. Image Underst. 223: 103533 (2022) - [j16]Youngjoo Ko
, Bin Zhu, Jong Kim
:
Fuzzing with automatically controlled interleavings to detect concurrency bugs. J. Syst. Softw. 191: 111379 (2022) - [j15]Xian Zhang, Xin Wang, Canghong Shi, Zhe Yan, Xiaojie Li, Bin Kong, Siwei Lyu, Bin Zhu, Jiancheng Lv, Youbing Yin, Qi Song, Xi Wu, Imran Mumtaz:
DE-GAN: Domain Embedded GAN for High Quality Face Image Inpainting. Pattern Recognit. 124: 108415 (2022) - [j14]Wenbo Pu
, Jing Hu
, Xin Wang, Yuezun Li
, Shu Hu
, Bin Zhu, Rui Song
, Qi Song, Xi Wu, Siwei Lyu:
Learning a deep dual-level network for robust DeepFake detection. Pattern Recognit. 130: 108832 (2022) - [j13]Changming Liu
, Xiaojing Ma, Sixing Cao, Jiayun Fu, Bin B. Zhu:
Privacy-preserving Motion Detection for HEVC-compressed Surveillance Video. ACM Trans. Multim. Comput. Commun. Appl. 18(1): 23:1-23:27 (2022) - [c56]Yu Zhang
, Yun Wang, Haidong Zhang, Bin Zhu, Siming Chen, Dongmei Zhang:
OneLabeler: A Flexible System for Building Data Labeling Tools. CHI 2022: 93:1-93:22 - [c55]Dizhong Lin, Ying Fu, Xin Wang, Shu Hu
, Bin Zhu, Qi Song, Xi Wu, Siwei Lyu:
Contrastive Class-Specific Encoding for Few-Shot Object Detection. ICME 2022: 1-6 - [c54]Jiayun Fu, Bin B. Zhu, Haidong Zhang, Yayi Zou, Song Ge, Weiwei Cui, Yun Wang, Dongmei Zhang, Xiaojing Ma, Hai Jin:
ChartStamp: Robust Chart Embedding for Real-World Applications. ACM Multimedia 2022: 2786-2795 - [i8]Jingwei Yi, Fangzhao Wu, Bin Zhu, Yang Yu, Chao Zhang, Guangzhong Sun, Xing Xie:
UA-FedRec: Untargeted Attack on Federated News Recommendation. CoRR abs/2202.06701 (2022) - [i7]Yu Zhang, Yun Wang, Haidong Zhang, Bin Zhu, Siming Chen, Dongmei Zhang:
OneLabeler: A Flexible System for Building Data Labeling Tools. CoRR abs/2203.14227 (2022) - [i6]Jingwei Yi, Fangzhao Wu, Huishuai Zhang, Bin Zhu, Tao Qi, Guangzhong Sun, Xing Xie:
Robust Quantity-Aware Aggregation for Federated Learning. CoRR abs/2205.10848 (2022) - [i5]Yanfei Xiang, Xin Wang, Shu Hu, Bin Zhu, Xiaomeng Huang, Xi Wu, Siwei Lyu:
RMBench: Benchmarking Deep Reinforcement Learning for Robotic Manipulator Control. CoRR abs/2210.11262 (2022) - 2021
- [j12]Jiayun Fu, Bin Zhu, Weiwei Cui, Song Ge, Yun Wang, Haidong Zhang, He Huang, Yuanyuan Tang, Dongmei Zhang, Xiaojing Ma:
Chartem: Reviving Chart Images with Data Embedding. IEEE Trans. Vis. Comput. Graph. 27(2): 337-346 (2021) - [c53]Chaoxiang He, Bin Benjamin Zhu, Xiaojing Ma, Hai Jin, Shengshan Hu:
Feature-Indistinguishable Attack to Circumvent Trapdoor-Enabled Defense. CCS 2021: 3159-3176 - [c52]Quanyu Liao, Yuezun Li, Xin Wang, Bin Kong, Bin Zhu, Siwei Lyu, Youbing Yin, Qi Song, Xi Wu:
Imperceptible Adversarial Examples For Fake Image Detection. ICIP 2021: 3912-3916 - [c51]Quanyu Liao, Xin Wang, Bin Kong, Siwei Lyu, Bin Zhu, Youbing Yin, Qi Song, Xi Wu:
Transferable Adversarial Examples for Anchor Free Object Detection. ICME 2021: 1-6 - [i4]Quanyu Liao, Yuezun Li, Xin Wang, Bin Kong, Bin Zhu, Siwei Lyu, Youbing Yin, Qi Song, Xi Wu:
Imperceptible Adversarial Examples for Fake Image Detection. CoRR abs/2106.01615 (2021) - [i3]Quanyu Liao, Xin Wang, Bin Kong, Siwei Lyu, Bin Zhu, Youbing Yin, Qi Song, Xi Wu:
Transferable Adversarial Examples for Anchor Free Object Detection. CoRR abs/2106.01618 (2021)
2010 – 2019
- 2019
- [j11]Taeho Kang, Sangwoo Ji, Hayoung Jeong, Bin Zhu, Jong Kim:
WearAuth: Wristwear-Assisted User Authentication for Smartphones Using Wavelet-Based Multi-Resolution Analysis. IEICE Trans. Inf. Syst. 102-D(10): 1976-1992 (2019) - [c50]Yuanyuan Tang, Bin Zhu, Xiaojing Ma, P. Takis Mathiopoulos
, Xia Xie, Hong Huang:
Decoding Homomorphically Encrypted Flac Audio without Decryption. ICASSP 2019: 675-679 - 2018
- [j10]Shuo Huang
, Le Cheng, Bin Zhu, Ping Zhou, Yu Sun
, Bing Zhang
, Suiren Wan:
The Time-Domain Integration Method of Digital Subtraction Angiography Images. Comput. Math. Methods Medicine 2018: 5284969:1-5284969:5 (2018) - [j9]Jiaming Lu, Xin Wang, Zhao Qing
, Zhu Li, Wen Zhang
, Ying Liu
, Lihua Yuan, Le Cheng, Ming Li, Bin Zhu, Xin Zhang, Qing X. Yang, Bing Zhang:
Detectability and reproducibility of the olfactory fMRI signal under the influence of magnetic susceptibility artifacts in the primary olfactory cortex. NeuroImage 178: 613-621 (2018) - [c49]Changming Liu
, Deqing Zou, Peng Luo, Bin B. Zhu, Hai Jin:
A Heuristic Framework to Detect Concurrency Vulnerabilities. ACSAC 2018: 529-541 - [c48]Xiaojing Ma, Huan Peng, Hai Jin, Bin Zhu:
Privacy-Preserving Cloud-Based Video Surveillance with Adjustable Granularity of Privacy Protection. ICIP 2018: 4133-4137 - [c47]Xiaojing Ma, Bin Zhu, Tao Zhang, Sixing Cao, Hai Jin, Deqing Zou:
Efficient privacy-preserving motion detection for HEVC compressed video in cloud video surveillance. INFOCOM Workshops 2018: 813-818 - [c46]Xiaojing Ma, Changming Liu
, Sixing Cao, Bin Zhu:
JPEG Decompression in the Homomorphic Encryption Domain. ACM Multimedia 2018: 905-913 - 2015
- [c45]Teddy Seyed, Xing-Dong Yang, Anthony Tang
, Saul Greenberg, Jiawei Gu, Bin Zhu, Xiang Cao:
CipherCard: A Token-Based Approach Against Camera-Based Shoulder Surfing Attacks on Common Touchscreen Devices. INTERACT (2) 2015: 436-454 - 2014
- [j8]Bin B. Zhu, Jeff Yan, Guanbo Bao, Maowei Yang, Ning Xu:
Captcha as Graphical Passwords - A New Security Primitive Based on Hard AI Problems. IEEE Trans. Inf. Forensics Secur. 9(6): 891-904 (2014) - [c44]Bin B. Zhu, Jeff Yan, Dongchen Wei, Maowei Yang:
Security Analyses of Click-based Graphical Passwords via Image Point Memorability. CCS 2014: 1217-1231 - 2013
- [j7]Jeongseok Seo, Sung Deok Cha, Bin Zhu, Doo-Hwan Bae:
PC Worm Detection System Based on the Correlation between User Interactions and Comprehensive Network Behaviors. IEICE Trans. Inf. Syst. 96-D(8): 1716-1726 (2013) - [c43]Weibo Chu, Bin B. Zhu, Feng Xue, Xiaohong Guan, Zhongmin Cai:
Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs. ICC 2013: 1990-1994 - [c42]Bin B. Zhu, Jeff Yan:
Towards New Security Primitives Based on Hard AI Problems. Security Protocols Workshop 2013: 3-10 - [c41]Bin B. Zhu, Dongchen Wei, Maowei Yang, Jeff Yan:
Security implications of password discretization for click-based graphical passwords. WWW 2013: 1581-1591 - 2011
- [c40]Hyunsang Choi, Bin B. Zhu, Heejo Lee:
Detecting Malicious Web Links and Identifying Their Attack Types. WebApps 2011 - 2010
- [c39]Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao
, Peng Liu:
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key. ACISP 2010: 216-232 - [c38]Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Liu, Ning Xu, Meng Yi, Kaiwei Cai:
Attacks and design of image recognition CAPTCHAs. CCS 2010: 187-200 - [c37]Kaimin Zhang, Lu Wang
, Aimin Pan, Bin Benjamin Zhu:
Smart caching for web browsers. WWW 2010: 491-500
2000 – 2009
- 2009
- [c36]Kaimin Zhang, Lu Wang, Xiaolin Guo, Aimin Pan, Bin B. Zhu:
WPBench: a benchmark for evaluating the client-side performance of web 2.0 applications. WWW 2009: 1111-1112 - 2008
- [c35]Min Feng, Bin B. Zhu:
A DRM System Protecting Consumer Privacy. CCNC 2008: 1075-1079 - [c34]Bin B. Zhu, Min Feng, Fen Liu, Lei Hu:
Analysis on AACS' Traitor Tracing Against Mix-and-Match Attacks. CCNC 2008: 1097-1101 - [c33]Yang Yang, Bin B. Zhu, Rui Guo, Linjun Yang, Shipeng Li
, Nenghai Yu:
A comprehensive human computation framework: with application to image labeling. ACM Multimedia 2008: 479-488 - [c32]Rui Guo, Bin B. Zhu, Min Feng, Aimin Pan, Bosheng Zhou:
Compoweb: a component-oriented web architecture. WWW 2008: 545-554 - 2007
- [j6]Yang Yang, Bin B. Zhu, Shipeng Li
, Neng H. Yu:
Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability. EURASIP J. Inf. Secur. 2007 (2007) - [c31]Min Feng, Bin B. Zhu:
When DRM Meets Restricted Multicast: A Content Encryption Key Scheme for Multicast Encryption and DRM. CCNC 2007: 1048-1052 - [c30]Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao
:
An Efficient Certified Email Protocol. ISC 2007: 145-157 - [i2]Andrew Chi-Chih Yao, Frances F. Yao, Yunlei Zhao, Bin B. Zhu:
Deniable Internet Key-Exchange. IACR Cryptol. ePrint Arch. 2007: 191 (2007) - 2006
- [c29]Bin B. Zhu, Yang Yang, Shipeng Li
:
An efficient key scheme for multiple access of JPEG 2000 and motion JPEG 2000 enabling truncations. CCNC 2006: 1124-1128 - [c28]Min Feng, Bin B. Zhu, Cunlai Zhao, Shipeng Li:
Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication. ISPEC 2006: 13-24 - 2005
- [j5]Bin B. Zhu, Chun Yuan, Yidong Wang, Shipeng Li
:
Scalable protection for MPEG-4 fine granularity scalability. IEEE Trans. Multim. 7(2): 222-233 (2005) - [c27]Xiaoming Wang, Bin B. Zhu, Shipeng Li:
A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network. DRMTICS 2005: 298-310 - [c26]Bin B. Zhu, Yang Yang, Tierui Chen:
A DRM System Supporting What You See Is What You Pay. DRMTICS 2005: 341-355 - [c25]Tierui Chen, Bin B. Zhu, Shipeng Li, Xueqi Cheng:
ThresPassport - A Distributed Single Sign-On Service. ICIC (2) 2005: 771-780 - [c24]Bin B. Zhu, Yang Yang, Chang Wen Chen, Shipeng Li
:
Optimal packetization of fine granularity scalability codestreams for error-prone channels. ICIP (2) 2005: 185-188 - [c23]Bin B. Zhu, Yang Yang, Shipeng Li
:
JPEG 2000 syntax-compliant encryption preserving full scalability. ICIP (3) 2005: 636-639 - [c22]Bin B. Zhu, Shipeng Li
, Min Feng:
A framework of scalable layered access control for multimedia. ISCAS (3) 2005: 2703-2706 - [c21]Bin B. Zhu, Shipeng Li
, Yang Yang:
JPEG 2000 encryption enabling fine granularity scalability without decryption. ISCAS (6) 2005: 6304-6307 - [c20]Bin B. Zhu, Min Feng, Shipeng Li
:
Secure Key Management for Flexible Digital Rights Management of Scalable Codestreams. MMSP 2005: 1-4 - [c19]Bin B. Zhu, Yang Yang, Chang Wen Chen, Shipeng Li
:
Fine Granularity Scalability Encryption of MPEG-4 FGS Bitstreams. MMSP 2005: 1-4 - [c18]Yunlei Zhao, Shirley H. C. Cheung, Binyu Zang, Bin B. Zhu:
A Note on the Cramer-Damgård Identification Scheme. WINE 2005: 385-390 - [i1]Min Feng, Bin B. Zhu, MaoZhi Xu, Shipeng Li:
Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis. IACR Cryptol. ePrint Arch. 2005: 222 (2005) - 2004
- [j4]Bin B. Zhu, Mitchell D. Swanson, Ahmed H. Tewfik:
When seeing isn't believing [multimedia authentication technologies]. IEEE Signal Process. Mag. 21(2): 40-49 (2004) - [c17]Jinhai Wu, Bin B. Zhu, Shipeng Li, Fuzong Lin:
A secure image authentication algorithm with pixel-level tamper localization. ICIP 2004: 1573-1576 - [c16]Bin B. Zhu, Min Feng, Shipeng Li
:
An efficient key scheme for layered access control of MPEG-4 FGS video. ICME 2004: 443-446 - [c15]Jinhai Wu, Bin B. Zhu, Shipeng Li
, Fuzong Lin:
Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. ICME 2004: 931-934 - [c14]Jinhai Wu, Bin B. Zhu, Shipeng Li
, Fuzong Lin:
New attacks on SARI image authentication system. Security, Steganography, and Watermarking of Multimedia Contents 2004: 602-609 - 2003
- [c13]Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang:
PLI: A New Framework to Protect Digital Content for P2P Networks. ACNS 2003: 206-216 - [c12]Chun Yuan, Bin B. Zhu, Ming Su, Xiaoming Wang, Shipeng Li
, Yuzhuo Zhong:
Layered access control for MPEG-4 FGS video. ICIP (1) 2003: 517-520 - [c11]Chun Yuan, Bin B. Zhu, Yidong Wang, Shipeng Li
, Yuzhuo Zhong:
Efficient and fully scalable encryption for MPEG-4 FGS. ISCAS (2) 2003: 620-623
1990 – 1999
- 1999
- [j3]Bin B. Zhu, En-Hui Yang, Ahmed H. Tewfik:
Arithmetic coding with dual symbol sets and its performance analysis. IEEE Trans. Image Process. 8(12): 1667-1676 (1999) - [c10]Ahmed H. Tewfik, Mitchell D. Swanson, Bin B. Zhu:
Data embedding in audio: where do we stand. ICASSP 1999: 2075 - [c9]Mitchell D. Swanson, Bin B. Zhu, Ahmed H. Tewfik:
Current State of the Art - Challenges and Future Directions for Audio Watermarking. ICMCS, Vol. 1 1999: 19-24 - 1998
- [j2]Mitchell D. Swanson, Bin B. Zhu, Ahmed H. Tewfik:
Multiresolution scene-based video watermarking using perceptual models. IEEE J. Sel. Areas Commun. 16(4): 540-550 (1998) - [j1]Mitchell D. Swanson, Bin B. Zhu, Ahmed H. Tewfik, Laurence Boney:
Robust audio watermarking using perceptual masking. Signal Process. 66(3): 337-355 (1998) - 1997
- [c8]Mitchell D. Swanson, Bin B. Zhu, Ahmed H. Tewfik:
Multiresolution Video Watermarking Using Perceptual Models and Scene Segmentation. ICIP (2) 1997: 558-561 - [c7]Bin B. Zhu, Mitchell D. Swanson, Ahmed H. Tewfik:
Image Coding by Folding. ICIP (2) 1997: 665-668 - [c6]Mitchell D. Swanson, Bin B. Zhu, Ahmed H. Tewfik:
Data Hiding for Video-in-Video. ICIP (2) 1997: 676-679 - [c5]Mitchell D. Swanson, Bin B. Zhu, Benson Chau, Ahmed H. Tewfik:
Object-based transparent video watermarking. MMSP 1997: 369-374 - 1996
- [c4]Bin B. Zhu, En-Hui Yang, Ahmed H. Tewfik:
Dual set arithmetic coding and its applications to image coding. EUSIPCO 1996: 1-4 - [c3]Mitchell D. Swanson, Bin B. Zhu, Ahmed H. Tewfik:
Transparent robust image watermarking. ICIP (3) 1996: 211-214 - 1995
- [c2]Bin B. Zhu, Ahmed H. Tewfik, Ömer Nezih Gerek:
Image coding with mixed representations and visual masking. ICASSP 1995: 2327-2330 - [c1]Bin B. Zhu, Ahmed H. Tewfik, M. A. Colestock, Ömer Nezih Gerek, A. Enis Çetin:
Image coding with wavelet representations, edge information and visual masking. ICIP 1995: 582-585
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-20 00:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint