2015 - ACM Distinguished Member
Ben Y. Zhao mainly focuses on Distributed computing, Computer network, World Wide Web, The Internet and Scalability. Ben Y. Zhao interconnects Key-based routing and Service in the investigation of issues within Distributed computing. His Computer network study combines topics in areas such as Overlay network and Service assurance.
His work deals with themes such as Service provider, Service discovery and Internet privacy, which intersect with World Wide Web. His Internet privacy study deals with Interpersonal ties intersecting with Computer security. Ben Y. Zhao has included themes like Popularity, Social graph, Data science and Graph in his The Internet study.
Ben Y. Zhao spends much of his time researching Computer network, Computer security, Distributed computing, Artificial intelligence and Wireless. His study in Computer network is interdisciplinary in nature, drawing from both Scalability and The Internet. His research investigates the link between Computer security and topics such as Internet privacy that cross with problems in Social network.
As part of one scientific family, Ben Y. Zhao deals mainly with the area of Distributed computing, narrowing it down to issues related to the Dynamic Source Routing, and often Link-state routing protocol. His Artificial intelligence research is multidisciplinary, incorporating perspectives in Machine learning and Human–computer interaction. He combines subjects such as Testbed and Real-time computing with his study of Wireless.
The scientist’s investigation covers issues in Artificial intelligence, Deep learning, Computer security, Machine learning and Variety. Ben Y. Zhao has included themes like Backdoor and Analytics in his Artificial intelligence study. His research integrates issues of Watermark, Data mining, Personalization, Ticket and Human–computer interaction in his study of Deep learning.
Ben Y. Zhao studied Human–computer interaction and The Internet that intersect with Node and Dissemination. His Computer security research includes elements of Wireless, Overhead and Vulnerability. His study on Wireless network is mostly dedicated to connecting different topics, such as Computer network.
His main research concerns Artificial intelligence, Computer security, Variety, Machine learning and Deep learning. His Artificial intelligence research incorporates themes from Eavesdropping, Null and Microphone. When carried out as part of a general Computer security research project, his work on Home security is frequently linked to work in Training, therefore connecting diverse disciplines of study.
His Variety research focuses on Facial recognition system and how it relates to Human–computer interaction, False positive paradox, Key and Task. His Machine learning research focuses on subjects like Backdoor, which are linked to Iris recognition and Context. His Deep learning research also works with subjects such as
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing
Ben Y. Zhao;John Kubiatowicz;Anthony D. Joseph.
OceanStore: an architecture for global-scale persistent storage
John Kubiatowicz;David Bindel;Yan Chen;Steven Czerwinski.
architectural support for programming languages and operating systems (2000)
Tapestry: a resilient global-scale overlay for service deployment
B.Y. Zhao;Ling Huang;J. Stribling;S.C. Rhea.
IEEE Journal on Selected Areas in Communications (2004)
User interactions in social networks and their implications
Christo Wilson;Bryce Boe;Alessandra Sala;Krishna P.N. Puttaswamy.
european conference on computer systems (2009)
Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination
Shelley Q. Zhuang;Ben Y. Zhao;Anthony D. Joseph;Randy H. Katz.
network and operating system support for digital audio and video (2001)
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
Ben Y. Zhao;John D. Kubiatowicz;Anthony D. Joseph.
An architecture for a secure service discovery service
Steven E. Czerwinski;Ben Y. Zhao;Todd D. Hodes;Anthony D. Joseph.
acm/ieee international conference on mobile computing and networking (1999)
Detecting and characterizing social spam campaigns
Hongyu Gao;Jun Hu;Christo Wilson;Zhichun Li.
internet measurement conference (2010)
Understanding user behavior in large-scale video-on-demand systems
Hongliang Yu;Dongdong Zheng;Ben Y. Zhao;Weimin Zheng.
european conference on computer systems (2006)
Towards a Common API for Structured Peer-to-Peer Overlays
Frank Dabek;Ben Y. Zhao;Peter Druschel;John Kubiatowicz.
international workshop on peer-to-peer systems (2003)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: