Spring 2019 Seminars:




April 19 Zhiyun Wang Ghostbuster: Detecting the Presence of Hidden Eavesdroppers MobiCom 2018
Jiayu Zhang Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information NDSS 2019
Kai Wang New Issues
April 26 Guoming Zhang Fire in Your Hands: Understanding Thermal Behavior of Smartphones MobiCom 2019
Long Yan Keep Others from Peeking at Your Mobile Device Screen! mobicom 2019
Xingdong Cao New Issues
May 10 Yushi Cheng EchoPrint: Two-factor Authentication using Vision and Acoustics on Smartphones MobiCom 2018
Yanjie Li Towards Deep Learning Models Resistant to Adversarial Attacks NDSS2018
Yuepeng Zhang New Issues
May 17 Juchuan Zhang Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding NDSS 2019
Ruochen Zhou Towards Environment Independent Device Free Human Activity Recognition MobiCom 2018
Yan Long New Issues
May 24 Yanmiao Zhang Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs NDSS 2019
Tianchen Zhang LEMNA: Explaining Deep Learning based Security Applications CCS2018
Qinhong Jiang New Issues
May 31 Chaohao Li The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection NDSS 2019
Yanjie Li Enabling Covert Body Area Network using Electro-Quasistatic Human Body Communication NDSS2018
Yuepeng Zhang New Issues
June 14 Tao Zhao RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid NDSS2019
Jiangyi Deng Countering Malicious Processes with Process-DNS Association NDSS 2019
Huaiyu Liu New Issues
June 21 Ruiwen He DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems NDSS 2019
Jiayu Zhang Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data NDSS 2019
Chenyang Qi New Issues
June 28 Zhiyun Wang Life after Speech Recognition:Fuzzing Semantic Misinterpretation for Voice Assistant Applications NDSS 2019
Xinfeng Li Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems USENIX 2018
Yuehan Chi New Issues
July 5 Kai Wang Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems NDSS 2019
Ruochen Zhou NIC: Detecting Adversarial Samples with Neural Network Invariant Checking NDSS 2019
Lixu Wang New Issues
July 12 Bingjing Yan DroidCap: OS Support for Capability-based Permissions in Android NDSS 2019
Xingdong Cao Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks S&P 2018
Qi Pang New Issues
July 19 Chen Yan Tap'n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens S&P 2019
Jiangyi Deng Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring USENIX 2018
Qinhong Jiang New Issues
July 26 Tao Zhao RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid NDSS 2019
Yushi Cheng CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition USENIX 2018
Chen Shen New Issues
August 2 Juchuan Zhang Statistical Privacy for Streaming Traffic NDSS 2019
Ruiwen He Simultaneous Localization and Mapping with Power Network Electromagnetic Field MobiCom 2018
Xinfeng Li New Issues
August 9 Tianchen Zhang TextBugger: Generating Adversarial Text Against Real-world Applications NDSS2019
Yanmiao Zhang Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints NDSS 2019
Yan Long New Issues