Seminar

Spring 2019 Seminars:

Speaker

Title

Conference

April 19 Zhiyun Wang Ghostbuster: Detecting the Presence of Hidden Eavesdroppers MobiCom 2018
Jiayu Zhang Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information NDSS 2019
Kai Wang New Issues
April 26 Guoming Zhang Fire in Your Hands: Understanding Thermal Behavior of Smartphones MobiCom 2019
Long Yan Keep Others from Peeking at Your Mobile Device Screen! mobicom 2019
Xingdong Cao New Issues
May 10 Yushi Cheng EchoPrint: Two-factor Authentication using Vision and Acoustics on Smartphones MobiCom 2018
Yanjie Li Towards Deep Learning Models Resistant to Adversarial Attacks NDSS2018
Yuepeng Zhang New Issues
May 17 Juchuan Zhang Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding NDSS 2019
Ruochen Zhou Towards Environment Independent Device Free Human Activity Recognition MobiCom 2018
Yan Long New Issues
May 24 Yanmiao Zhang Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs NDSS 2019
Tianchen Zhang LEMNA: Explaining Deep Learning based Security Applications CCS2018
Qinhong Jiang New Issues
May 31 Chaohao Li The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection NDSS 2019
Yanjie Li Enabling Covert Body Area Network using Electro-Quasistatic Human Body Communication NDSS2018
Yuepeng Zhang New Issues
June 14 Tao Zhao RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid NDSS2019
Jiangyi Deng Countering Malicious Processes with Process-DNS Association NDSS 2019
Huaiyu Liu New Issues
June 21 Ruiwen He DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems NDSS 2019
Jiayu Zhang Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data NDSS 2019
Chenyang Qi New Issues
June 28 Zhiyun Wang Life after Speech Recognition:Fuzzing Semantic Misinterpretation for Voice Assistant Applications NDSS 2019
Xinfeng Li Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems USENIX 2018
Yuehan Chi New Issues
July 5 Kai Wang Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems NDSS 2019
Ruochen Zhou NIC: Detecting Adversarial Samples with Neural Network Invariant Checking NDSS 2019
Lixu Wang New Issues
July 12 Bingjing Yan DroidCap: OS Support for Capability-based Permissions in Android NDSS 2019
Xingdong Cao Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks S&P 2018
Qi Pang New Issues
July 19 Chen Yan Tap'n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens S&P 2019
Jiangyi Deng Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring USENIX 2018
Qinhong Jiang New Issues
July 26 Tao Zhao RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid NDSS 2019
Yushi Cheng CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition USENIX 2018
Chen Shen New Issues
August 2 Juchuan Zhang Statistical Privacy for Streaming Traffic NDSS 2019
Ruiwen He Simultaneous Localization and Mapping with Power Network Electromagnetic Field MobiCom 2018
Xinfeng Li New Issues
August 9 Tianchen Zhang TextBugger: Generating Adversarial Text Against Real-world Applications NDSS2019
Yanmiao Zhang Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints NDSS 2019
Yan Long New Issues

Autumn 2018 Seminars:

Speaker

Title

Conference

September 29 Zhiyun Wang Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach CCS 2018
JiaYu Zhang Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices USENIX 2018
Ruiwen He BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid USENIX 2018
October 11 Guoming Zhang PrinTracker: Fingerprinting 3D Printers using Commodity Scanners CCS 2018
Chen Yan Fear the Reaper: Characterization and Fast Detection of Card Skimmers USENIX 2018
Bingjing Yan New issues
October 15 Yushi Cheng Fear the Reaper: Characterization and Fast Detection of Card Skimmers USENIX 2018
Taiming Zhang Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning USENIX 2018
Kai Wang New issues
October 22 Juchuan Zhang Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach CCS 2018
Zhou Zhuang
Ruochen Zhou New issues
October 29 Yanmiao Zhang Meltdown: Reading Kernel Memory from User Space USENIX 2018
Tianchen Zhang QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing USENIX 2018
Xinfeng Li New issues
November 19 Ruochen Zhou If This Then What? Controlling Flows in IoT Apps CCS 2018
Yanjie Li DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN IEEE 2018
Jiangyi Deng Clock Around the Clock: Time-Based Device Fingerprinting CCS 2018
Tao Zhao DScreaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers CCS 2018
Zhiyun Wang New issues
November 29 Chaohao Li SoK: Security Evaluation of Home-Based IoT Deployments S&P 2019
Bingjing Yan Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies USENIX 2018
Ruiwen He New issues
December 6 Ruiwen He Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power Attacks CCS 2018
Jiayu Zhang HoMonit: Monitoring Smart Home Apps from Encrypted Traffic CCS 2018
Yanjie Li New issues
December 13 Zhiyun Wang PatternListener: Cracking Android Pattern Lock Using Acoustic Signals CCS 2018
Xuan Ouyang
Tao Zhao New issues
December 20 Chen Yan Rebooting Ultrasonic Positioning Systems for Ultrasound-incapable Smart Devices MobiCom2019
Guoming Zhang No Training Hurdles: Fast Training-Agnostic Atacks to Infer Your Typing CCS 2018
Bingjing Yan New issues
December 27 Yushi Cheng DeepMasterPrints: Generating Master Prints for Dictionary Attacks via Latent Variable Evolution CCS 2018
Taiming Zhang
Kai Wang RainbowLight: Towards Low Cost Ambient Light Positioning with Mobile Phones MobiCom 2018
January 3 Juchuan Zhang ChromaCode: A Fully Imperceptible Screen-Camera Communication System CCS 2018
Zhou Zhuang
Xinfeng Li Resolving Policy Conflicts in Multi-Carrier Cellular Access MobiCom 2018
January 10 Yanmiao Zhang FUZE:Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities USENIX 2018
Tianchen Zhang Inception: System-Wide Security Testing of Real-World Embedded Systems Software USENIX 2018
Ruochen Zhou New issues
January 17 Jiangyi Deng Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring USENIX 2018
Yanjie Li Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks NDSS 2017
Zhiyun Wang New issues