Automated crowdturfing attacks and defenses in online review systems Y Yao, B Viswanath, J Cryan, H Zheng, BY Zhao Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 214 | 2017 |
Glaze: Protecting Artists from Style Mimicry by {Text-to-Image} Models S Shan, J Cryan, E Wenger, H Zheng, R Hanocka, BY Zhao 32nd USENIX Security Symposium (USENIX Security 23), 2187-2204, 2023 | 91 | 2023 |
Gender bias in the job market: A longitudinal analysis S Tang, X Zhang, J Cryan, MJ Metzger, H Zheng, BY Zhao Proceedings of the ACM on Human-Computer Interaction 1 (CSCW), 1-19, 2017 | 61 | 2017 |
Detecting Gender Stereotypes: Lexicon vs. Supervised Learning Methods J Cryan, S Tang, X Zhang, M Metzger, H Zheng, BY Zhao Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020 | 50 | 2020 |
" Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World E Wenger, M Bronckers, C Cianfarani, J Cryan, A Sha, H Zheng, BY Zhao Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 39 | 2021 |
Wireless side-lobe eavesdropping attacks Y Zhu, Y Ju, B Wang, J Cryan, BY Zhao, H Zheng arXiv preprint arXiv:1810.10157, 2018 | 8 | 2018 |
“My face, my rules”: Enabling Personalized Protection against Unacceptable Face Editing Z Xiao, J Cryan, Y Yao, YHG Cheo, Y Shu, S Saroiu, BY Zhao, H Zheng | 1 | 2023 |