Speaker |
Title |
Conference |
|
May 15 | Yijie Bai | Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks | S&P 2019 |
Yan Jiang | A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems | NDSS 2020 | |
Zhuoyang Shi | FLUID: Flexible User Interface Distribution for Ubiquitous Multi-device Interaction | Mobicom 2019 | |
May 22 | Zizhi Jin | Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks | Usenix 2020 |
Binjing Yan | Understanding, Detecting and Localizing Partial Failures in Large System Software | NSDI 2020 | |
Ruochen Zhou | MilliBack: Real-Time Plug-n-Play Millimeter Level Tracking Using Wireless Backscattering | Ubicomp 2019 | |
Yuehan Chi | New Issues about Sensors | ||
May 29 | Kai Wang | Users Really Do Answer Telephone Scams | USENIX 2019 |
Chen Yan | Detecting and Characterizing Lateral Phishing at Scale | ||
Jiahui Yang | 50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System | USENIX 2019 | |
Yuepeng Zhang | New Issues about Sensors | ||
June 5 | Tao Zhao | PenSight: Enhanced Interaction with a Pen-Top Camera | CHI 2020 |
Juchuan Zhang | Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs | NDSS 2019 | |
Jiangyi Deng | Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information | NDSS 2019 | |
Qinhong Jiang | New Issues about Sensors | ||
June 12 | Yanjie Li | Modeling Users' Behavior Sequences with Hierarchical Explainable Network for Cross-domain Fraud Detection | WWW 2020 |
Yushi Cheng | AmphiLight: Direct Air-Water Communication with Laser Light | NSDI 2020 | |
Ruiwen He | AIM: Acoustic Imaging on a Mobile | Mobisys 2018 | |
Kaibo Wang | New Issues about Sensors | ||
June 19 | Xinfeng Li | Learning in situ: a randomized experiment in video streaming | NSDI 2020 |
Chaohao Li | Authoring and Verifying Human-Robot Interactions | UIST 2018 | |
Yuepeng Zhang | |||
Zizhi Jin | New Issues about Sensors | ||
June 28 | Yan Jiang | ShoesHacker: Indoor Corridor Map and User Location Leakage through Force Sensors in Smart Shoes | |
July 3 | Zhiyun Wang | Privacy Leakage via De-Anonymization | TDSC 2020 |
Fei Teng | data Recovery from “Scrubbed” NAND Flash Storage Need for Analog Sanitization | USENIX 2020 | |
Yijie Bai | New Issues about Sensors | ||
July 10 | Binjing Yan | Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple Machines | soups 2019 |
Fei Teng | New Issues about Sensors | ||
July 17 | Ruochen Zhou | SonicPrint: A Generally Adoptable and Secure Fingerprint Biometrics in Smart Devices | mobisys 2020 |
Yuehan Chi | You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis | NDSS 2020 | |
July 24 | Kai Wang | MagHacker: Eavesdropping on Stylus Pen Writing via Magnetic Sensing from Commodity Mobile Devices | MobiSys'20 |
Zhuoyang Shi | DeepType: On-Device Deep Learning for Input Personalization Service with Minimal Privacy Concern | Ubicomp2019 | |
Jiahui Yang | New Issues about Sensors | ||
July 31 | Yanjie Li | Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation | AsiaCCS2020 |
Jiangyi Deng | WinoGrande: An Adversarial Winograd Schema Challenge at Scale | AAAI-20 | |
Zizhi Jin | New Issues about Sensors | ||
August 07 | Juchuan Zhang | 50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System | USENIX Security 2019 |
Yushi Cheng | |||
Yan Jiang | New Issues about Sensors | ||
August 14 | Ruiwen He | ||
Xinfeng Li | Learning Efficient Representations for Fake Speech Detection | AAAI 2020 | |
Zhuoyang Shi | New Issues about Sensors |