Autumn 2021 Seminars:




Feb 18 Zhuoyang Shi Robust Detection of Machine-induced Audio Attacks in Intelligent Audio Systems with Microphone Array CCS 2021
Xiaotian Zhu
Junning Zhai On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices
Feb 25 Kai Wang Dynamic tactility by position-encoded spike spectrum Science Robotics
Zizhi Jin LiDAR Sensor Fusion
Zihao Dan New Issues
Mar 04 Haoxiang Zhang Watching the Watchers: Practical Video Identification Attack in LTE Networks usenix 2022
Bo Yang Talk : Adversarial Attack on LiDAR-only or Camera-LiDAR models in Autonomous Driving
Shan Zou New Issues
Mar 11 Haijun Gui Flexible computational photodetectors for self-powered activity sensing nature
Yizhuo Gao WEBGRAPH: Capturing Advertising and Tracking Information. usenix 2022
Huaiyu Liu The Virtualized Cyber-Physical Testbed for Machine Learning Anomaly Detection A Wind Powered Grid Case Study IEEE 2021
Mar 18 Shibo Zhang Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks NDSS 2022
Zhixin Xie Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints
Wenjun Zhu New Issues: CUDA
Mar 25 Juchuan Zhang Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems Oakland 2022
Boyang Zhou Class-Disentanglement and Applications in Adversarial Detection and Defense NeurIPS 2021
Yijie Bai New Issues: Privacy in Vertical Federated Learning
April 1 Jiahui Yang Simulated Adversarial Testing of Face Recognition Models CVPR2022
Zhihao Wu Deep physical neural networks trained with backpropagation Nature
Shengyuan Pang New Issues: GNN
April 8 Runmin Ou Four dimensions characterize attributions from faces using a representative set of English trait words NatureCommunication21
Zhiyun Wang Hiding in Plain Sight On the Efficacy of Power Side Channel-Based Control Flow Monitoring usenix 2022
Ruochen Zhou Noise-SDR: Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software and Its Impact on Emission Security SP 2022
April 22 Qinhong Jiang Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors SP2022
Jiachang Wen Attacks on Deidentification's Defenses
Namin Hou
April 29 Yan Jiang WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens SP 2022
Ruiwen He PCR-Auth Solving Authentication Puzzle Challenge with Encoded Palm Contact Response S&P 2022
Shilin Xiao mmSpy: Spying Phone Calls using mmWave Radars
May 6 Xinfeng Li FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing NDSS 2022
Zhouhao Ji Co-Estimation of State and FDI Attacks and Attack Compensation Control for Multi-Area Load Frequency Control Systems Under FDI and DoS Attacks
Kaibo Wang Adversarial Visual Robustness by Causal Intervention
May 13 Jiangyi Deng Attacks on Deidentification's Defenses USENIX 2022
Huaiyu Liu Real-world embodied AI through a morphologically adaptive quadruped robot Nature Machine Intelligence
Bo Yang RISC-V
May 20 Junning Zhai Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference usenix2022
Kai Wang IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing S&P 2022
Zizhi Jin How human drive
May 27 Zihao Dan Data-Driven Cyber-Attack Detection for PV Farms via Time-Frequency Domain Features IEEE Transactions on Smart Grid
Fei Teng Privid: Practical, Privacy-Preserving Video Analytics Queries NSDI 2022
Fengchen Yang Biometrics-protected optical communication enabled by deep learning–enhanced triboelectric/photonic synergistic interface Science advances 2022
June 03 Haoxiang Zhang Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems NDSS 2022
Shan Zou PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP NDSS 2022
Yanze Ren Method Confusion Attack on Bluetooth Pairing S&P 2021
June 10 Haijun Gui 语音主动降噪技术
Shibo Zhang Transfer Attacks Revisited: A Large-Scale Emprical Study in Real Computer Vision Settings S&P 2022
Han Chen 数据加密传输一对多传输协议
June 17 Zhuoyang Shi Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction USENIX 2022
Zhixin Xie Wireless Manipulation of Serial Communication AsiaCCS 2022
Yizhuo Gao 聚类算法概述
June 24 Wenjun Zhu Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA S&P 2022
Boyang Zhou Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning S&P 2022
Qidi Zhong RVPLAYER: Robotic Vehicle Forensics by Replay with What-if Reasoning NDSS 2022
July 1 Boyang Zhou Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning S&P 2022
Yijie Bai On adaptive attacks to adversarial example defense Talk
Lingshuo Meng FL Backdoor Defenses FLAME & DeepSight USENIX + NDSS 2022
July 8 Jiahui Yang Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era USENIX 2022
Zhihao Wu Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks S&P 2022
Shengyuan Pang LINKTELLER: Recovering Private Edges from Graph Neural Networks via Influence Analysis S&P 2022
July 15 Runmin Ou SketchLib: Enabling Efficient Sketch-based Monitoring on Programmable Switches NDSS 2022
Zhiyun Wang Cyber-attack Detection for Photovoltaic Farms based on Power-Electronics-Enabled Harmonic State Space Modeling IEEE Transactions on Smart Grid
Ruochen Zhou Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices S&P 2022
July 22 Qinhong Jiang Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 USENIX 2022
Namin Hou CamShield: Securing Smart Cameras through Physical Replication and Isolation USENIX 2022
Jiachang Weng New Issues: 平衡车
July 29 Yan Jiang LTRACK: Stealthy Tracking of Mobile Phones in LTE USENIX 2022
Ruiwen He PCR-Auth Solving Authentication Puzzle Challenge with Encoded Palm Contact Response S&P 2022
Shilin Xiao CrossTalk: Speculative Data Leaks Across Cores Are Real S&P 2021
Aug 5 Xinfeng Li Study of Pre-Processing Defenses Against Adversarial Attacks on State-of-the-Art Speaker Recognition Systems TIFS 2021
Zhouhao Ji The effect ofrenewable energy incorporation on power grid stability and resilience Science Advance
Kaibo Wang New Issues: Certified robustness of adversarial attacks
Aug 12 Jiangyi Deng Sphinx: Enabling Privacy-Preserving Online Learning over the Cloud S&P 2022
Huaiyu Liu Swarm of micro flying robots in the wild Science Robotics
Bo Yang Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles USENIX 2022
Aug 19 Zhicong Zheng AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary S&P 2022
Fei Teng Privacy for Free: How does Dataset Condensation Help Privacy? ICML 2022
Zizhi Jin Seeing is Not Always Believing”: Detecting Perception Error Attacks Against Autonomous Vehicles IEEE TDSC
Aug 26 Junning Zhai Detecting Audio Adversarial Examples with Logit Noising ACSAC 2021
Kai Wang MeshUp: Stateless Cache Side-channel Attack on CPU Mesh S&P 2022
Fengchen Yang Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators USENIX 2022

Autumn 2021 Seminars

Spring 2021 Seminars

Autumn 2020 Seminars

Summer 2020 Seminars

Spring 2020 Seminars

Autumn 2019 Seminars

Spring 2019 Seminars

Autumn 2018 Seminars