D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 70 Citations 32,495 202 World Ranking 849 National Ranking 517

Research.com Recognitions

Awards & Achievements

2015 - ACM Distinguished Member

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Operating system

Ben Y. Zhao mainly focuses on Distributed computing, Computer network, World Wide Web, The Internet and Scalability. Ben Y. Zhao interconnects Key-based routing and Service in the investigation of issues within Distributed computing. His Computer network study combines topics in areas such as Overlay network and Service assurance.

His work deals with themes such as Service provider, Service discovery and Internet privacy, which intersect with World Wide Web. His Internet privacy study deals with Interpersonal ties intersecting with Computer security. Ben Y. Zhao has included themes like Popularity, Social graph, Data science and Graph in his The Internet study.

His most cited work include:

  • OceanStore: an architecture for global-scale persistent storage (3026 citations)
  • Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing (2190 citations)
  • Tapestry: a resilient global-scale overlay for service deployment (1666 citations)

What are the main themes of his work throughout his whole career to date?

Ben Y. Zhao spends much of his time researching Computer network, Computer security, Distributed computing, Artificial intelligence and Wireless. His study in Computer network is interdisciplinary in nature, drawing from both Scalability and The Internet. His research investigates the link between Computer security and topics such as Internet privacy that cross with problems in Social network.

As part of one scientific family, Ben Y. Zhao deals mainly with the area of Distributed computing, narrowing it down to issues related to the Dynamic Source Routing, and often Link-state routing protocol. His Artificial intelligence research is multidisciplinary, incorporating perspectives in Machine learning and Human–computer interaction. He combines subjects such as Testbed and Real-time computing with his study of Wireless.

He most often published in these fields:

  • Computer network (27.94%)
  • Computer security (20.24%)
  • Distributed computing (19.03%)

What were the highlights of his more recent work (between 2016-2021)?

  • Artificial intelligence (12.55%)
  • Deep learning (6.07%)
  • Computer security (20.24%)

In recent papers he was focusing on the following fields of study:

The scientist’s investigation covers issues in Artificial intelligence, Deep learning, Computer security, Machine learning and Variety. Ben Y. Zhao has included themes like Backdoor and Analytics in his Artificial intelligence study. His research integrates issues of Watermark, Data mining, Personalization, Ticket and Human–computer interaction in his study of Deep learning.

Ben Y. Zhao studied Human–computer interaction and The Internet that intersect with Node and Dissemination. His Computer security research includes elements of Wireless, Overhead and Vulnerability. His study on Wireless network is mostly dedicated to connecting different topics, such as Computer network.

Between 2016 and 2021, his most popular works were:

  • Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks (242 citations)
  • Latent Backdoor Attacks on Deep Neural Networks (75 citations)
  • Automated Crowdturfing Attacks and Defenses in Online Review Systems (58 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Computer network
  • Operating system

His main research concerns Artificial intelligence, Computer security, Variety, Machine learning and Deep learning. His Artificial intelligence research incorporates themes from Eavesdropping, Null and Microphone. When carried out as part of a general Computer security research project, his work on Home security is frequently linked to work in Training, therefore connecting diverse disciplines of study.

His Variety research focuses on Facial recognition system and how it relates to Human–computer interaction, False positive paradox, Key and Task. His Machine learning research focuses on subjects like Backdoor, which are linked to Iris recognition and Context. His Deep learning research also works with subjects such as

  • Burstiness that connect with fields like Recurrent neural network,
  • Service provider which is related to area like Social network, Clickstream, Binary classification, Node and World Wide Web.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing

Ben Y. Zhao;John Kubiatowicz;Anthony D. Joseph.
(2001)

3555 Citations

OceanStore: an architecture for global-scale persistent storage

John Kubiatowicz;David Bindel;Yan Chen;Steven Czerwinski.
architectural support for programming languages and operating systems (2000)

3548 Citations

Tapestry: a resilient global-scale overlay for service deployment

B.Y. Zhao;Ling Huang;J. Stribling;S.C. Rhea.
IEEE Journal on Selected Areas in Communications (2004)

2741 Citations

User interactions in social networks and their implications

Christo Wilson;Bryce Boe;Alessandra Sala;Krishna P.N. Puttaswamy.
european conference on computer systems (2009)

1190 Citations

Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination

Shelley Q. Zhuang;Ben Y. Zhao;Anthony D. Joseph;Randy H. Katz.
network and operating system support for digital audio and video (2001)

1145 Citations

Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and

Ben Y. Zhao;John D. Kubiatowicz;Anthony D. Joseph.
(2001)

1005 Citations

An architecture for a secure service discovery service

Steven E. Czerwinski;Ben Y. Zhao;Todd D. Hodes;Anthony D. Joseph.
acm/ieee international conference on mobile computing and networking (1999)

930 Citations

Understanding user behavior in large-scale video-on-demand systems

Hongliang Yu;Dongdong Zheng;Ben Y. Zhao;Weimin Zheng.
european conference on computer systems (2006)

831 Citations

Towards a Common API for Structured Peer-to-Peer Overlays

Frank Dabek;Ben Y. Zhao;Peter Druschel;John Kubiatowicz.
international workshop on peer-to-peer systems (2003)

802 Citations

Utilization and fairness in spectrum assignment for opportunistic spectrum access

Chunyi Peng;Haitao Zheng;Ben Y. Zhao.
Mobile Networks and Applications (2006)

770 Citations

Best Scientists Citing Ben Y. Zhao

Timothy W. Markison

Timothy W. Markison

IBM (United States)

Publications: 110

Haiying Shen

Haiying Shen

University of Virginia

Publications: 68

Hai Jin

Hai Jin

Huazhong University of Science and Technology

Publications: 54

Yunhao Liu

Yunhao Liu

Tsinghua University

Publications: 51

Gary W. Grube

Gary W. Grube

Motorola (United States)

Publications: 45

John Kubiatowicz

John Kubiatowicz

University of California, Berkeley

Publications: 38

Adriana Iamnitchi

Adriana Iamnitchi

University of South Florida

Publications: 38

Jiangchuan Liu

Jiangchuan Liu

Simon Fraser University

Publications: 37

Peter Druschel

Peter Druschel

Max Planck Institute for Software Systems

Publications: 37

Anwitaman Datta

Anwitaman Datta

Nanyang Technological University

Publications: 36

Ion Stoica

Ion Stoica

University of California, Berkeley

Publications: 35

Anne-Marie Kermarrec

Anne-Marie Kermarrec

École Polytechnique Fédérale de Lausanne

Publications: 35

Scott Shenker

Scott Shenker

University of California, Berkeley

Publications: 33

Karl Aberer

Karl Aberer

École Polytechnique Fédérale de Lausanne

Publications: 32

Antony Rowstron

Antony Rowstron

Microsoft (United States)

Publications: 32

Xiaoming Fu

Xiaoming Fu

University of Göttingen

Publications: 31

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.