Speaker |
Title |
Conference |
|
Feb 18 | Zhuoyang Shi | Robust Detection of Machine-induced Audio Attacks in Intelligent Audio Systems with Microphone Array | CCS 2021 |
Xiaotian Zhu | |||
Junning Zhai | On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices | ||
Feb 25 | Kai Wang | Dynamic tactility by position-encoded spike spectrum | Science Robotics |
Zizhi Jin | LiDAR Sensor Fusion | ||
Zihao Dan | New Issues | ||
Mar 04 | Haoxiang Zhang | Watching the Watchers: Practical Video Identification Attack in LTE Networks | usenix 2022 |
Bo Yang | Talk : Adversarial Attack on LiDAR-only or Camera-LiDAR models in Autonomous Driving | ||
Shan Zou | New Issues | ||
Mar 11 | Haijun Gui | Flexible computational photodetectors for self-powered activity sensing | nature |
Yizhuo Gao | WEBGRAPH: Capturing Advertising and Tracking Information. | usenix 2022 | |
Huaiyu Liu | The Virtualized Cyber-Physical Testbed for Machine Learning Anomaly Detection A Wind Powered Grid Case Study | IEEE 2021 | |
Mar 18 | Shibo Zhang | Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks | NDSS 2022 |
Zhixin Xie | Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints | ||
Wenjun Zhu | New Issues: CUDA | ||
Mar 25 | Juchuan Zhang | Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems | Oakland 2022 |
Boyang Zhou | Class-Disentanglement and Applications in Adversarial Detection and Defense | NeurIPS 2021 | |
Yijie Bai | New Issues: Privacy in Vertical Federated Learning | ||
April 1 | Jiahui Yang | Simulated Adversarial Testing of Face Recognition Models | CVPR2022 |
Zhihao Wu | Deep physical neural networks trained with backpropagation | Nature | |
Shengyuan Pang | New Issues: GNN | ||
April 8 | Runmin Ou | Four dimensions characterize attributions from faces using a representative set of English trait words | NatureCommunication21 |
Zhiyun Wang | Hiding in Plain Sight On the Efficacy of Power Side Channel-Based Control Flow Monitoring | usenix 2022 | |
Ruochen Zhou | Noise-SDR: Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software and Its Impact on Emission Security | SP 2022 | |
April 22 | Qinhong Jiang | Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors | SP2022 |
Jiachang Wen | Attacks on Deidentification's Defenses | ||
Namin Hou | |||
April 29 | Yan Jiang | WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens | SP 2022 |
Ruiwen He | PCR-Auth Solving Authentication Puzzle Challenge with Encoded Palm Contact Response | S&P 2022 | |
Shilin Xiao | mmSpy: Spying Phone Calls using mmWave Radars | ||
May 6 | Xinfeng Li | FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing | NDSS 2022 |
Zhouhao Ji | Co-Estimation of State and FDI Attacks and Attack Compensation Control for Multi-Area Load Frequency Control Systems Under FDI and DoS Attacks | ||
Kaibo Wang | Adversarial Visual Robustness by Causal Intervention | ||
May 13 | Jiangyi Deng | Attacks on Deidentification's Defenses | USENIX 2022 |
Huaiyu Liu | Real-world embodied AI through a morphologically adaptive quadruped robot | Nature Machine Intelligence | |
Bo Yang | RISC-V | ||
May 20 | Junning Zhai | Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference | usenix2022 |
Kai Wang | IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing | S&P 2022 | |
Zizhi Jin | How human drive | ||
May 27 | Zihao Dan | Data-Driven Cyber-Attack Detection for PV Farms via Time-Frequency Domain Features | IEEE Transactions on Smart Grid |
Fei Teng | Privid: Practical, Privacy-Preserving Video Analytics Queries | NSDI 2022 | |
Fengchen Yang | Biometrics-protected optical communication enabled by deep learning–enhanced triboelectric/photonic synergistic interface | Science advances 2022 | |
June 03 | Haoxiang Zhang | Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems | NDSS 2022 |
Shan Zou | PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP | NDSS 2022 | |
Yanze Ren | Method Confusion Attack on Bluetooth Pairing | S&P 2021 | |
June 10 | Haijun Gui | 语音主动降噪技术 | |
Shibo Zhang | Transfer Attacks Revisited: A Large-Scale Emprical Study in Real Computer Vision Settings | S&P 2022 | |
Han Chen | 数据加密传输一对多传输协议 | ||
June 17 | Zhuoyang Shi | Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction | USENIX 2022 |
Zhixin Xie | Wireless Manipulation of Serial Communication | AsiaCCS 2022 | |
Yizhuo Gao | 聚类算法概述 | ||
June 24 | Wenjun Zhu | Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA | S&P 2022 |
Boyang Zhou | Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning | S&P 2022 | |
Qidi Zhong | RVPLAYER: Robotic Vehicle Forensics by Replay with What-if Reasoning | NDSS 2022 | |
July 1 | Boyang Zhou | Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning | S&P 2022 |
Yijie Bai | On adaptive attacks to adversarial example defense | Talk | |
Lingshuo Meng | FL Backdoor Defenses FLAME & DeepSight | USENIX + NDSS 2022 | |
July 8 | Jiahui Yang | Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era | USENIX 2022 |
Zhihao Wu | Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks | S&P 2022 | |
Shengyuan Pang | LINKTELLER: Recovering Private Edges from Graph Neural Networks via Influence Analysis | S&P 2022 | |
July 15 | Runmin Ou | SketchLib: Enabling Efficient Sketch-based Monitoring on Programmable Switches | NDSS 2022 |
Zhiyun Wang | Cyber-attack Detection for Photovoltaic Farms based on Power-Electronics-Enabled Harmonic State Space Modeling | IEEE Transactions on Smart Grid | |
Ruochen Zhou | Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices | S&P 2022 | |
July 22 | Qinhong Jiang | Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 | USENIX 2022 |
Namin Hou | CamShield: Securing Smart Cameras through Physical Replication and Isolation | USENIX 2022 | |
Jiachang Weng | New Issues: 平衡车 | ||
July 29 | Yan Jiang | LTRACK: Stealthy Tracking of Mobile Phones in LTE | USENIX 2022 |
Ruiwen He | PCR-Auth Solving Authentication Puzzle Challenge with Encoded Palm Contact Response | S&P 2022 | |
Shilin Xiao | CrossTalk: Speculative Data Leaks Across Cores Are Real | S&P 2021 | |
Aug 5 | Xinfeng Li | Study of Pre-Processing Defenses Against Adversarial Attacks on State-of-the-Art Speaker Recognition Systems | TIFS 2021 |
Zhouhao Ji | The effect ofrenewable energy incorporation on power grid stability and resilience | Science Advance | |
Kaibo Wang | New Issues: Certified robustness of adversarial attacks | ||
Aug 12 | Jiangyi Deng | Sphinx: Enabling Privacy-Preserving Online Learning over the Cloud | S&P 2022 |
Huaiyu Liu | Swarm of micro flying robots in the wild | Science Robotics | |
Bo Yang | Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles | USENIX 2022 | |
Aug 19 | Zhicong Zheng | AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary | S&P 2022 |
Fei Teng | Privacy for Free: How does Dataset Condensation Help Privacy? | ICML 2022 | |
Zizhi Jin | Seeing is Not Always Believing”: Detecting Perception Error Attacks Against Autonomous Vehicles | IEEE TDSC | |
Aug 26 | Junning Zhai | Detecting Audio Adversarial Examples with Logit Noising | ACSAC 2021 |
Kai Wang | MeshUp: Stateless Cache Side-channel Attack on CPU Mesh | S&P 2022 | |
Fengchen Yang | Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators | USENIX 2022 |