Speaker |
Title |
Conference |
|
Feb 12 | Kai Wang | Void: A fast and light voice liveness detection system | USENIX 2020 |
Ruochen Zhou | CANvas:Fast and Inexpensive Automotive Network Mapping | USENIX 2019 | |
Bingjing Yan | Robust Website Fingerprinting Through the Cache Occupancy Channel | USENIX 2019 | |
Feb 14 | Jiahui Yang | Peeves:Physical Event Verification in Smart Homes | CCS 2019 |
Chen Yan | Robust Performance Metrics for Authentication Systems | NDSS 2019 | |
Jiangyi Deng | Leaky Images: Targeted Privacy Attacks in the Web | Usenix 2019 | |
Feb 20 | Qinhong Jiang | WaveSpy: Remote and Through-wall Screen Attack via mmWave Sensing | S&P 2020 |
Tao Zhao | DefRec: Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids’ Cyber-Physical Infrastructures | NDSS 2020 | |
Juchuan Zhang | Wireless Attacks on Aircraft Instrument Landing Systems | USENIX 2019 | |
Feb 21 | Yanjie Li | TEXTBUGGER: Generating Adversarial Text Against Real-world Applications | NDSS 2019 |
Yushi Cheng | RNN-based Room Scale Hand Motion Tracking | MobiCom 2019 | |
Ruiwen He | Defeating Hidden Audio Channel Attacks on Voice Assistants via Audio-induced Surface Vibrations | ACSAC 2019 | |
Feb 27 | Xinfeng Li | Perceptual Based Adversarial Audio Attacks | arxiv |
Chaohao Li | Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices | USENIX 2020 | |
Jiayu Zhang | Velody: Nonlinear Vibration Challenge-Response for Resilient User Authentication | ||
Feb 28 | Zhiyun Wang | CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel | USENIX 2019 |
Kaibo Wang | Weight Agnostic Neural Networks | NIPS 2019 | |
Fei Teng | Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies | S&P 2020 | |
Mar 5 | Yijie Bai | Knockoff Nets: Stealing Functionality of Black-Box Models | CVPR 2019 |
Yan Jiang | Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps | S&P 2019 | |
Mar 6 | Zizhi Jin | Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems | arxiv |
Yuehan Chi | Security of GPS/INS based On-road Location Tracking Systems | S&P 2019 | |
Yuepeng Zhang | Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer | NDSS 2020 | |
Mar 12 | Jiahui Yang | Et Tu Alexa?When Commodity WiFi Devices Turn into Adversarial Motion Sensors | NDSS 2020 |
Zhuoyang Shi | Robust audio adversarial example for a physical attack | IJCAI 2019 | |
Mar 13 | Kai Wang | SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves | NDSS2020 |
Ruochen Zhou | Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft | NDSS 2020 | |
Binjing Yan | On the Challenges of Geographical Avoidance for Tor | NDSS 2019 | |
Mar 19 | Yanmiao Zhang | An Observational Investigation of Reverse Engineers Processes | Chi-ea 2019 |
Chen Yan | Metamorph: Injecting Inaudible Commands into Over-the-air Voice Controlled Systems | NDSS 2020 | |
Jiangyi Deng | Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors | CCS 2019 | |
Mar 20 | Qinhong Jiang | OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display | NDSS 2020 |
Tao Zhao | FLOWPRINT: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic | NDSS 2020 | |
Juchuan Zhang | Leveraging EM Side-Channel Information to Detect Rowhammer Attacks | S&P 2020 | |
Mar 26 | Yanjie Li | A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems | NDSS 2019 |
Yushi Cheng | PINGPONG: Packet-Level Signatures for Smart Home Device Events | NDSS 2020 | |
Ruiwen He | Humpty Dumpty: Controlling Word Meanings via Corpus Modifications | S&P 2020 | |
Mar 27 | Xinfeng Li | The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection | NDSS 2019 |
Chaohao Li | Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses | S&P 2020 | |
Jiayu Zhang | Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers | USENIX 2019 | |
April 2 | Zhiyun Wang | SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants | USENIX 2020 |
Kaibo Wang | Learning Transferable Adversarial Examples via Ghost Networks | AAAI 2020 | |
Fei Teng | Developing Measures of Cognitive Impairment in the Real World from Consumer-Grade Multimodal Sensor Streams | KDD 2019 | |
April 3 | Yijie Bai | ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models | NDSS 2019 |
Yan Jiang | ShadowMove: A Stealthy Lateral Movement Strategy | USENEX 2020 | |
Tianchen Zhang | Stealthy Tracking of Autonomous Vehicles with Cache Side Channels | USENIX 2020 | |
April 9 | Zizhi Jin | SeVI: Boosting Secure Voice Interactionswith Smart Devices | Infocom 2020 |
Yuehan Chi | VoltJockey : Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies | CCS 2019 | |
Yuepeng Zhang | Continuous User Verification via Respiratory Biometrics | Infocom 2020 | |
April 10 | Kai Wang | On the Resilience of Biometric Authentication Systems against Random Inputs | arxiv |
Ruochen Zhou | Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft | NDSS 2020 | |
Binjing Yan | Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting | NDSS 2020 | |
April 16 | Jiahui Yang | Encrypted DNS --> Privacy? A Traffic Analysis Perspective | NDSS 2020 |
Chen Yan | Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars | CHES 2019 | |
Jiangyi Deng | Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks | NDSS 2020 | |
April 17 | Qinhong Jiang | mmTrack: Passive Multi-Person Localization Using Commodity Millimeter Wave Radio | Infocom 2020 |
Tao Zhao | Challenges and Opportunities in CPS Security: A Physics-based Perspective | arxiv 2020 | |
Juchuan Zhang | C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage | S&P 2020 | |
April 23 | Yanjie Li | Oligo-Snoop: A Non-Invasive Side Channel Attack Against DNA Synthesis Machines | NDSS 2019 |
Yushi Cheng | Zero-delay Lightweight Defenses against Website Fingerprinting | sec20fall | |
Ruiwen He | Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home | Infocom 2020 | |
April 24 | Xinfeng Li | Attentive Statistics Pooling for Deep Speaker Embedding | Interspeech 2019 |
Chaohao Li | IoTGAZE: IoT Security Enforcement via Wireless Context Analysis | Infocom 2020 | |
Tao Zhao | Challenges and Opportunities in CPS Security: A Physics-based Perspective | arxiv 2020 | |
April 30 | Zhiyun Wang | RAMBleed: Reading Bits in Memory Without Accessing Them | S&P 2020 |
Kaibo Wang | |||
Fei Teng | Differentiating Higher and Lower Job Performers in the Workplace Using Mobile Sensing | Ubicomp 2019 |