Seminar

Spring 2019 Seminars:

Speaker

Title

Conference

March 28 Zhiyun Wang
Jiayu Zhang
Kai Wang New Issues
April 4 Guoming Zhang
Chen Yan
Xingdong Cao New Issues
April 11 Yushi Cheng
Taiming Zhang
Yan Long New Issues
April 18 Juchuan Zhang Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding NDSS 2019
Ruochen Zhou
Tao Zhao New Issues
April 25 Yanmiao Zhang
Tianchen Zhang
Qinhong Jiang New Issues
May 7 Chaohao Li The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection NDSS 2019
Yanjie Li
Yuepeng Zhang New Issues
May 16 Tao Zhao RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid NDSS2019
Jiangyi Deng
Huaiyu Liu New Issues
May 23 Ruiwen He
Jiayu Zhang
Chenyang Qi New Issues
May 30 Zhiyun Wang
Xinfeng Li
Yuehan Chi New Issues
June 6 Kai Wang
Ruochen Zhou
Lixu Wang New Issues
June 13 Bingjing Yan
Xingdong Cao
Qi Pang New Issues
June 20 Chen Yan
Guoming Zhang
Qinhong Jiang New Issues
June 27 Taimin Zhang
Yushi Cheng
Chen Shen New Issues
July 4 Juchuan Zhang Statistical Privacy for Streaming Traffic NDSS 2019
Ruiwen He
Xinfeng Li New Issues
July 11 Tianchen Zhang
Yanmiao Zhang
Yan Long New Issues

Autumn 2018 Seminars:

Speaker

Title

Conference

September 29 Zhiyun Wang Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach CCS 2018
JiaYu Zhang Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices USENIX 2018
Ruiwen He BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid USENIX 2018
October 11 Guoming Zhang PrinTracker: Fingerprinting 3D Printers using Commodity Scanners CCS 2018
Chen Yan Fear the Reaper: Characterization and Fast Detection of Card Skimmers USENIX 2018
Bingjing Yan New issues
October 15 Yushi Cheng Fear the Reaper: Characterization and Fast Detection of Card Skimmers USENIX 2018
Taiming Zhang Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning USENIX 2018
Kai Wang New issues
October 22 Juchuan Zhang Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach CCS 2018
Zhou Zhuang
Ruochen Zhou New issues
October 29 Yanmiao Zhang Meltdown: Reading Kernel Memory from User Space USENIX 2018
Tianchen Zhang QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing USENIX 2018
Xinfeng Li New issues
November 19 Ruochen Zhou If This Then What? Controlling Flows in IoT Apps CCS 2018
Yanjie Li DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN IEEE 2018
Jiangyi Deng Clock Around the Clock: Time-Based Device Fingerprinting CCS 2018
Tao Zhao DScreaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers CCS 2018
Zhiyun Wang New issues
November 29 Chaohao Li SoK: Security Evaluation of Home-Based IoT Deployments S&P 2019
Bingjing Yan Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies USENIX 2018
Ruiwen He New issues
December 6 Ruiwen He Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power Attacks CCS 2018
Jiayu Zhang HoMonit: Monitoring Smart Home Apps from Encrypted Traffic CCS 2018
Yanjie Li New issues
December 13 Zhiyun Wang PatternListener: Cracking Android Pattern Lock Using Acoustic Signals CCS 2018
Xuan Ouyang
Tao Zhao New issues
December 20 Chen Yan Rebooting Ultrasonic Positioning Systems for Ultrasound-incapable Smart Devices MobiCom2019
Guoming Zhang No Training Hurdles: Fast Training-Agnostic Atacks to Infer Your Typing CCS 2018
Bingjing Yan New issues
December 27 Yushi Cheng DeepMasterPrints: Generating Master Prints for Dictionary Attacks via Latent Variable Evolution CCS 2018
Taiming Zhang
Kai Wang RainbowLight: Towards Low Cost Ambient Light Positioning with Mobile Phones MobiCom 2018
January 3 Juchuan Zhang ChromaCode: A Fully Imperceptible Screen-Camera Communication System CCS 2018
Zhou Zhuang
Xinfeng Li Resolving Policy Conflicts in Multi-Carrier Cellular Access MobiCom 2018
January 10 Yanmiao Zhang FUZE:Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities USENIX 2018
Tianchen Zhang Inception: System-Wide Security Testing of Real-World Embedded Systems Software USENIX 2018
Ruochen Zhou New issues
January 17 Jiangyi Deng Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring USENIX 2018
Yanjie Li Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks NDSS 2017
Zhiyun Wang New issues