Seminar

Spring 2021 Seminars:

Speaker

Title

Conference

Mar 05 Juchuan Zhang Simba: Scaling Deep-Learning Inference with Multi-Chip-Module-Based Architecture MICRO 2019(Best Paper)
Kaibo Wang Adversarial Distributional Training for Robust Deep Learning Nips2020
Mar 12 Qinhong Jiang TEMPEST Comeback: A Realistic Audio Eavesdropping Threat on Mixed-signal SoCs CCS2020
Yijie Bai Reliable Evaluation of Adversarial Robustness with an Ensemble of Diverse Parameter-free Attacks ICML 2020
Jiahui Yang New Issues: ToF
Zhiyi Zhou New Issues
Mar 19 Yuehan Chi Ijon: Exploring Deep State Spaces via Fuzzing S&P 2020
Yan Jiang Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel ndss2021
Shibo Zhang New Issues
Mar 26 Chaohao Li Mobile Device Baeries as Thermometers ubicomp 2020
Bo Yang ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models CCS 2017
Wenjun Zhu New Issues
April 09 Zhiyun Wang A stealthy location identification attack exploiting carrier aggregation in cellular networks USENIX 2021
Ruiwen He Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles ccs 2020
Jiangyi Deng New Issues
April 16 Zizhi Jin Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures Usenix 2020
Kai Wang VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface USENIX2021
Zhuoyang Shi New Issues
April 23 Yushi Cheng DeepDyve: Dynamic Verification for Deep Neural Networks CCS 2020
Haijun Gui undervoltage voltage
Fei Teng New Issues
April 30 Haoxiang Zhang When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition ccs2020
Shan Zou New Issues
May 07 Ruochen Zhou EarFisher: DetectingWireless Eavesdroppers by Stimulating and Sensing Memory EMR NSDI 2021
Yizhuo Gao Shadow Attacks: Hiding and Replacing Content in Signed PDFs ndss2021
Xinfeng Li MemoryNetwork New Issues
May 14 Jiachang Wen To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media
Yijie Bai New Issues
May 28 Qinhong Jiang When LoRa Meets EMR: Electromagnetic Covert Channels Can Be Super Resilient S&P2021
Yuehan Chi Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection USENIX 2020
Jiahui Yang I Always Feel Like Somebody’s Sensing Me!A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors USENIX2021
Zhihao Wu Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations Usenix2021
Kaibo Wang New Issues
Juchuan Zhang Invisible Probe: Timing Attacks with PCIe Congestion Side-channel oakland 2021
June 04 Yan Jiang Exposing New Vulnerabilities of Error Handling Mechanism in CAN USENIX2021
Wenjun Zhu PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking USENIX2021
Shibo Zhang New Issues
June 11 Chaohao Li IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery NDSS 2021
Bo Yang New Issues
June 18 Ruiwen He SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems S&P 2021
Jiangyi Deng Machine Unlearning S&P 2021
Zhuoyang Shi WaveGuard: Understanding and Mitigating Audio Adversarial Examples Usenix 2021
June 25 Kai Wang microrobotic platform actuated by thermocapillary flows for manipulation at the air-water interface Science Robotics 2021
Haijun Gui Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks usenix 2021
July 23 Zizhi Jin Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks S&P 2021
Fei Teng Swarm Learning for decentralized and confidential clinical machine learning Nature
Haoxiang Zhang New Issues
Shan Zou Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks USENIX Security 2021
Aug 06 Zhixin Xie New Issues
Yijie Bai Clean-Label Backdoor Attacks on Video Recognition Models cvpr2020
Zhiyun Wang Privacy-Preserving and Standard-Compatible AKA Protocol for 5G USENIX 2021