Speaker |
Title |
Conference |
|
April 19 | Zhiyun Wang | Ghostbuster: Detecting the Presence of Hidden Eavesdroppers | MobiCom 2018 |
Jiayu Zhang | Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information | NDSS 2019 | |
Kai Wang | New Issues | ||
April 26 | Guoming Zhang | Fire in Your Hands: Understanding Thermal Behavior of Smartphones | MobiCom 2019 |
Long Yan | Keep Others from Peeking at Your Mobile Device Screen! | mobicom 2019 | |
Xingdong Cao | New Issues | ||
May 10 | Yushi Cheng | EchoPrint: Two-factor Authentication using Vision and Acoustics on Smartphones | MobiCom 2018 |
Yanjie Li | Towards Deep Learning Models Resistant to Adversarial Attacks | NDSS2018 | |
Yuepeng Zhang | New Issues | ||
May 17 | Juchuan Zhang | Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding | NDSS 2019 |
Ruochen Zhou | Towards Environment Independent Device Free Human Activity Recognition | MobiCom 2018 | |
Yan Long | New Issues | ||
May 24 | Yanmiao Zhang | Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs | NDSS 2019 |
Tianchen Zhang | LEMNA: Explaining Deep Learning based Security Applications | CCS2018 | |
Qinhong Jiang | New Issues | ||
May 31 | Chaohao Li | The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection | NDSS 2019 |
Yanjie Li | Enabling Covert Body Area Network using Electro-Quasistatic Human Body Communication | NDSS2018 | |
Yuepeng Zhang | New Issues | ||
June 14 | Tao Zhao | RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid | NDSS2019 |
Jiangyi Deng | Countering Malicious Processes with Process-DNS Association | NDSS 2019 | |
Huaiyu Liu | New Issues | ||
June 21 | Ruiwen He | DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems | NDSS 2019 |
Jiayu Zhang | Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data | NDSS 2019 | |
Chenyang Qi | New Issues | ||
June 28 | Zhiyun Wang | Life after Speech Recognition:Fuzzing Semantic Misinterpretation for Voice Assistant Applications | NDSS 2019 |
Xinfeng Li | Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems | USENIX 2018 | |
Yuehan Chi | New Issues | ||
July 5 | Kai Wang | Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems | NDSS 2019 |
Ruochen Zhou | NIC: Detecting Adversarial Samples with Neural Network Invariant Checking | NDSS 2019 | |
Lixu Wang | New Issues | ||
July 12 | Bingjing Yan | DroidCap: OS Support for Capability-based Permissions in Android | NDSS 2019 |
Xingdong Cao | Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks | S&P 2018 | |
Qi Pang | New Issues | ||
July 19 | Chen Yan | Tap'n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens | S&P 2019 |
Jiangyi Deng | Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring | USENIX 2018 | |
Qinhong Jiang | New Issues | ||
July 26 | Tao Zhao | RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid | NDSS 2019 |
Yushi Cheng | CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition | USENIX 2018 | |
Chen Shen | New Issues | ||
August 2 | Juchuan Zhang | Statistical Privacy for Streaming Traffic | NDSS 2019 |
Ruiwen He | Simultaneous Localization and Mapping with Power Network Electromagnetic Field | MobiCom 2018 | |
Xinfeng Li | New Issues | ||
August 9 | Tianchen Zhang | TextBugger: Generating Adversarial Text Against Real-world Applications | NDSS2019 |
Yanmiao Zhang | Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints | NDSS 2019 | |
Yan Long | New Issues |