Speaker |
Title |
Conference |
|
Aug 21 | Jiahui Yang | Simulating Unknown Target Models for Query-Efficient Black-box Attacks | CVPR2021 |
Yizhuo Gao | Tales of FAVICONS and Caches: Persistent Tracking in Modern Browsers | NDSS2021 | |
Boyang Zhou | New Issues: PCIE | ||
Sep 17 | Juchuan Zhang | Talk: Vulnerabilities and Attacks of Device Unintended Physical Signals | |
Wenjun Zhu | Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack | USENIX 2021 | |
Zhihao Wu | New Issues: Under Display Camera | ||
Sep 24 | Meng Xue | Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED | CCS 2021 |
Shibo Zhang | New Issues: 多目标跟踪和攻击多目标跟踪 | ||
Sep 30 | Ruochen Zhou | Body-coupled power transmission and energy harvesting | Nature Electronics |
Qinhong Jiang | Signal Injection Attacks against CCD Image Sensors | arixv | |
Runmin Ou | "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World | CCS 21 | |
Oct 08 | Kaibo Wang | Adversarial Robustness under Long-Tailed Distribution | CVPR2021 |
Yuepeng Zhang | Wireless Charging Power Side-Channel Attacks | CCS 2021 | |
Jiachang Wen | New Issues: 小米智能眼镜探索版 | ||
Zhiyi Zhou | New Issues | ||
Oct 15 | Jiangyi Deng | Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information | CCS 21 |
Yuehan Chi | Hardware Support to Improve Fuzzing Performance and Precision | CCS2021 | |
Zhouhao Ji | New Issues | ||
Oct 22 | Xinfeng Li | Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding | S&P 2021 |
Ruiwen He | A Nationwide Study on Cellular Reliability: Measurement, Analysis, and Enhancements | SIGCOMM 2021 | |
Junning Zhai | New Issues:多方安全计算 | ||
Oct 29 | Fei Teng | When Machine Unlearning Jeopardizes Privacy | CCS 2021 |
Yan Jiang | Gesture recognition using a bioinspired learning architecture that integrates visual data with somatosensory data from stretchable sensors | Nature Electronics 2020 | |
Zhuoyang Shi | Understanding and Detecting International Revenue Share Fraud | NDSS 2021 | |
Nov 05 | Xiaotian Zhu | Unleashing the Tiger: Inference Attacks on Split Learning | |
Kai Wang | Talk: Voltage Glitching Attacks against CPU | ||
Zihao Dan | New Issues: Code Integrity Attestation for PLCs using Black Box Neural Network Predictions | ||
Nov 12 | Zizhi Jin | Multimodal sensing and intuitive steering assistance improve navigation and mobility for people with impaired vision. | Science Robotics, 2021 |
Haoxiang Zhang | RoS: Passive Smart Surface for Roadside-to-Vehicle Communication | sigcomm2021 | |
Bo Yang | New Issues: Natural Adversarial Examples | ||
Nov 19 | Haijun Gui | A paradigm shift fully self-powered long-distance wireless sensing solution enabled by discharge-induced displacement current | science advances |
Shan Zou | Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks | ndss2021 | |
Huaiyu Liu | 碳排放计量和监测:Measurement and Monitoring of Carbon Emissions | ||
Nov 26 | Yizhuo Gao | Sign-to-speech translation using machine-learning-assisted stretchable sensor arrays | Nature Electronics 2020 |
Zhiyun Wang | A cerebellar-based solution to the nondeterministic time delay problem in robotic control | science robotics | |
Zhixin Xie | New Issues: Inaudible attack | ||
Dec 03 | Juchuan Zhang | Radio ranging with ultrahigh resolution using a harmonic radio-frequency identification system | Nature Electronics |
Wenjun Zhu | LIMU-BERT: Unleashing the Potential of Unlabeled Data for IMU Sensing Applications | Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems. 2021. | |
Yijie Bai | New Issues: interpretable machine learning for blackbox | ||
Dec 10 | Jiahui Yang | Adversarial Examples Are Not Bugs, They Are Features | NeurIPS2019 |
Zhihao Wu | Concept whitening for interpretable image recognition | nature machine intelligence | |
Boyang Zhou | New Issues: 医学成像技术简介(DR,CT,MRI) | ||
Dec 17 | Runmin Ou | When makes you unique - Temporality of the human brain fingerprint | Science advance 21 |
Shibo Zhang | BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding | NAACL2019 | |
Shengyuan Pang | Accumulative Poisoning Attacks on Real-time Data | ||
Dec 24 | Ruochen Zhou | Talk: Device Detection Technology | |
Meng Xue | Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers | usenix 2022 | |
Jiachang Wen | New Issues:智能穿戴设备 | ||
Dec 31 | Zhiyi Zhou | PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking | usenix 2021 |
Qinhong Jiang | Talk: Sound Recovery Attack | ||
Namin Hou | New Issues:摩尔纹的原理与应用简介 | ||
Jan 07 | Jiangyi Deng | Enabling Fast and Universal Audio Adversarial Attack Using Generative Model | AAAI 2021 |
Kaibo Wang | Adversarial Neuron Pruning Purifies Backdoored Deep Models | NeurIPS 2021 | |
Shilin Xiao | New Issues:USB设备识别及安全问题 | ||
Jan 14 | Ruiwen He | Speech synthesis from neural decoding of spoken sentences | Nature |
Xinfeng Li | Inharmonic speech reveals the role of harmonicity in the cocktail party problem | Nature Communication | |
Zhouhao Ji | New Issues: Horus Scenario | ||
Jan 21 | Fei Teng | 联邦学习场景下的数据投毒攻击与防御 | |
Yan Jiang | A wireless radiofrequency-powered insect-scale flapping-wing aerial vehicle | Nature electronics 2021 | |
Feb 18 | Zhuoyang Shi | Robust Detection of Machine-induced Audio Attacks in Intelligent Audio Systems with Microphone Array | CCS 2021 |
Xiaotian Zhu | |||
Junning Zhai | On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices | ||
Feb 25 | Kai Wang | Dynamic tactility by position-encoded spike spectrum | Science Robotics |
Zizhi Jin | LiDAR Sensor Fusion | ||
Zihao Dan | New Issues | ||
Mar 04 | Haoxiang Zhang | Watching the Watchers: Practical Video Identification Attack in LTE Networks | usenix 2022 |
Bo Yang | Talk : Adversarial Attack on LiDAR-only or Camera-LiDAR models in Autonomous Driving | ||
Shan Zou | New Issues | ||
Mar 11 | Haijun Gui | Flexible computational photodetectors for self-powered activity sensing | nature |
Yizhuo Gao | WEBGRAPH: Capturing Advertising and Tracking Information. | usenix 2022 | |
Huaiyu Liu | The Virtualized Cyber-Physical Testbed for Machine Learning Anomaly Detection A Wind Powered Grid Case Study | IEEE 2021 | |
Mar 18 | Shibo Zhang | Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks | NDSS 2022 |
Zhixin Xie | Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints | ||
Wenjun Zhu | New Issues: CUDA | ||
Mar 25 | Juchuan Zhang | Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems | Oakland 2022 |
Boyang Zhou | Class-Disentanglement and Applications in Adversarial Detection and Defense | NeurIPS 2021 | |
Yijie Bai | New Issues: Privacy in Vertical Federated Learning | ||
April 1 | Jiahui Yang | Simulated Adversarial Testing of Face Recognition Models | CVPR2022 |
Zhihao Wu | Deep physical neural networks trained with backpropagation | Nature | |
Shengyuan Pang | New Issues: GNN | ||
April 8 | Runmin Ou | Four dimensions characterize attributions from faces using a representative set of English trait words | NatureCommunication21 |
Zhiyun Wang | Hiding in Plain Sight On the Efficacy of Power Side Channel-Based Control Flow Monitoring | usenix 2022 | |
Ruochen Zhou | Noise-SDR: Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software and Its Impact on Emission Security | SP 2022 | |
April 22 | Qinhong Jiang | Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors | SP2022 |
Jiachang Wen | Attacks on Deidentification's Defenses | ||
Namin Hou | |||
April 29 | Yan Jiang | WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens | SP 2022 |
Ruiwen He | PCR-Auth Solving Authentication Puzzle Challenge with Encoded Palm Contact Response | S&P 2022 | |
Shilin Xiao | mmSpy: Spying Phone Calls using mmWave Radars | ||
May 6 | Xinfeng Li | FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing | NDSS 2022 |
Zhouhao Ji | Co-Estimation of State and FDI Attacks and Attack Compensation Control for Multi-Area Load Frequency Control Systems Under FDI and DoS Attacks | ||
Kaibo Wang | Adversarial Visual Robustness by Causal Intervention | ||
May 13 | Jiangyi Deng | Attacks on Deidentification's Defenses | USENIX 2022 |
Huaiyu Liu | Real-world embodied AI through a morphologically adaptive quadruped robot | Nature Machine Intelligence | |
Bo Yang | RISC-V | ||
May 20 | Junning Zhai | Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference | usenix2022 |
Kai Wang | IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing | S&P 2022 | |
Zizhi Jin | How human drive | ||
May 27 | Zihao Dan | Data-Driven Cyber-Attack Detection for PV Farms via Time-Frequency Domain Features | IEEE Transactions on Smart Grid |
Fei Teng | Privid: Practical, Privacy-Preserving Video Analytics Queries | NSDI 2022 | |
Fengchen Yang | Biometrics-protected optical communication enabled by deep learning–enhanced triboelectric/photonic synergistic interface | Science advances 2022 | |
June 03 | Haoxiang Zhang | Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems | NDSS 2022 |
Shan Zou | PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP | NDSS 2022 | |
Yanze Ren | Method Confusion Attack on Bluetooth Pairing | S&P 2021 | |
June 10 | Haijun Gui | 语音主动降噪技术 | |
Shibo Zhang | Transfer Attacks Revisited: A Large-Scale Emprical Study in Real Computer Vision Settings | S&P 2022 | |
Han Chen | 数据加密传输一对多传输协议 | ||
June 17 | Zhuoyang Shi | Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction | USENIX 2022 |
Zhixin Xie | Wireless Manipulation of Serial Communication | AsiaCCS 2022 | |
Yizhuo Gao | 聚类算法概述 | ||
June 24 | Wenjun Zhu | Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA | S&P 2022 |
Boyang Zhou | Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning | S&P 2022 | |
Qidi Zhong | RVPLAYER: Robotic Vehicle Forensics by Replay with What-if Reasoning | NDSS 2022 | |
July 1 | Boyang Zhou | Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning | S&P 2022 |
Yijie Bai | On adaptive attacks to adversarial example defense | Talk | |
Lingshuo Meng | FL Backdoor Defenses FLAME & DeepSight | USENIX + NDSS 2022 | |
July 8 | Jiahui Yang | Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era | USENIX 2022 |
Zhihao Wu | Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks | S&P 2022 | |
Shengyuan Pang | LINKTELLER: Recovering Private Edges from Graph Neural Networks via Influence Analysis | S&P 2022 | |
July 15 | Runmin Ou | SketchLib: Enabling Efficient Sketch-based Monitoring on Programmable Switches | NDSS 2022 |
Zhiyun Wang | Cyber-attack Detection for Photovoltaic Farms based on Power-Electronics-Enabled Harmonic State Space Modeling | IEEE Transactions on Smart Grid | |
Ruochen Zhou | Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices | S&P 2022 | |
July 22 | Qinhong Jiang | Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 | USENIX 2022 |
Namin Hou | CamShield: Securing Smart Cameras through Physical Replication and Isolation | USENIX 2022 | |
Jiachang Weng | New Issues: 平衡车 | ||
July 29 | Yan Jiang | LTRACK: Stealthy Tracking of Mobile Phones in LTE | USENIX 2022 |
Ruiwen He | PCR-Auth Solving Authentication Puzzle Challenge with Encoded Palm Contact Response | S&P 2022 | |
Shilin Xiao | CrossTalk: Speculative Data Leaks Across Cores Are Real | S&P 2021 | |
Aug 5 | Xinfeng Li | Study of Pre-Processing Defenses Against Adversarial Attacks on State-of-the-Art Speaker Recognition Systems | TIFS 2021 |
Zhouhao Ji | The effect ofrenewable energy incorporation on power grid stability and resilience | Science Advance | |
Kaibo Wang | New Issues: Certified robustness of adversarial attacks | ||
Aug 12 | Jiangyi Deng | Sphinx: Enabling Privacy-Preserving Online Learning over the Cloud | S&P 2022 |
Huaiyu Liu | Swarm of micro flying robots in the wild | Science Robotics | |
Bo Yang | Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles | USENIX 2022 | |
Aug 19 | Zhicong Zheng | AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary | S&P 2022 |
Fei Teng | Privacy for Free: How does Dataset Condensation Help Privacy? | ICML 2022 | |
Zizhi Jin | Seeing is Not Always Believing”: Detecting Perception Error Attacks Against Autonomous Vehicles | IEEE TDSC | |
Aug 26 | Junning Zhai | Detecting Audio Adversarial Examples with Logit Noising | ACSAC 2021 |
Kai Wang | MeshUp: Stateless Cache Side-channel Attack on CPU Mesh | S&P 2022 | |
Fengchen Yang | Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators | USENIX 2022 |