Speaker |
Title |
Conference |
|
Mar 05 | Juchuan Zhang | Simba: Scaling Deep-Learning Inference with Multi-Chip-Module-Based Architecture | MICRO 2019(Best Paper) |
Kaibo Wang | Adversarial Distributional Training for Robust Deep Learning | Nips2020 | |
Mar 12 | Qinhong Jiang | TEMPEST Comeback: A Realistic Audio Eavesdropping Threat on Mixed-signal SoCs | CCS2020 |
Yijie Bai | Reliable Evaluation of Adversarial Robustness with an Ensemble of Diverse Parameter-free Attacks | ICML 2020 | |
Jiahui Yang | New Issues: ToF | ||
Zhiyi Zhou | New Issues | ||
Mar 19 | Yuehan Chi | Ijon: Exploring Deep State Spaces via Fuzzing | S&P 2020 |
Yan Jiang | Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel | ndss2021 | |
Shibo Zhang | New Issues | ||
Mar 26 | Chaohao Li | Mobile Device Baeries as Thermometers | ubicomp 2020 |
Bo Yang | ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models | CCS 2017 | |
Wenjun Zhu | New Issues | ||
April 09 | Zhiyun Wang | A stealthy location identification attack exploiting carrier aggregation in cellular networks | USENIX 2021 |
Ruiwen He | Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles | ccs 2020 | |
Jiangyi Deng | New Issues | ||
April 16 | Zizhi Jin | Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures | Usenix 2020 |
Kai Wang | VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface | USENIX2021 | |
Zhuoyang Shi | New Issues | ||
April 23 | Yushi Cheng | DeepDyve: Dynamic Verification for Deep Neural Networks | CCS 2020 |
Haijun Gui | undervoltage | voltage | |
Fei Teng | New Issues | ||
April 30 | Haoxiang Zhang | When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition | ccs2020 |
Shan Zou | New Issues | ||
May 07 | Ruochen Zhou | EarFisher: DetectingWireless Eavesdroppers by Stimulating and Sensing Memory EMR | NSDI 2021 |
Yizhuo Gao | Shadow Attacks: Hiding and Replacing Content in Signed PDFs | ndss2021 | |
Xinfeng Li | MemoryNetwork | New Issues | |
May 14 | Jiachang Wen | To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media | |
Yijie Bai | New Issues | ||
May 28 | Qinhong Jiang | When LoRa Meets EMR: Electromagnetic Covert Channels Can Be Super Resilient | S&P2021 |
Yuehan Chi | Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection | USENIX 2020 | |
Jiahui Yang | I Always Feel Like Somebody’s Sensing Me!A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors | USENIX2021 | |
Zhihao Wu | Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations | Usenix2021 | |
Kaibo Wang | New Issues | ||
Juchuan Zhang | Invisible Probe: Timing Attacks with PCIe Congestion Side-channel | oakland 2021 | |
June 04 | Yan Jiang | Exposing New Vulnerabilities of Error Handling Mechanism in CAN | USENIX2021 |
Wenjun Zhu | PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking | USENIX2021 | |
Shibo Zhang | New Issues | ||
June 11 | Chaohao Li | IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery | NDSS 2021 |
Bo Yang | New Issues | ||
June 18 | Ruiwen He | SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems | S&P 2021 |
Jiangyi Deng | Machine Unlearning | S&P 2021 | |
Zhuoyang Shi | WaveGuard: Understanding and Mitigating Audio Adversarial Examples | Usenix 2021 | |
June 25 | Kai Wang | microrobotic platform actuated by thermocapillary flows for manipulation at the air-water interface | Science Robotics 2021 |
Haijun Gui | Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks | usenix 2021 | |
July 23 | Zizhi Jin | Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks | S&P 2021 |
Fei Teng | Swarm Learning for decentralized and confidential clinical machine learning | Nature | |
Haoxiang Zhang | New Issues | ||
Shan Zou | Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks | USENIX Security 2021 | |
Aug 06 | Zhixin Xie | New Issues | |
Yijie Bai | Clean-Label Backdoor Attacks on Video Recognition Models | cvpr2020 | |
Zhiyun Wang | Privacy-Preserving and Standard-Compatible AKA Protocol for 5G | USENIX 2021 |