Spring 2023 Seminars:




Feb 17 Han Chen MagEar: Eavesdropping via Audio Recovery using Magnetic Side Channel MobiSys'22
Yanchen Jiang BROKENWIRE: Wireless Disruption of CCS Electric Vehicle Charging NDSS 2023
Xuancun Lu DensePose From WiFi Talk
Feb 24 Boyang Zhou Clean-Image Backdoor: Attacking Multi-Label Models with Poisoned Label Only ICLR 2023
Zihao Dan PatchVerif: Discovering Faulty Patches in Robotic Vehicles USENIX 2023
Shiang Guo Shedding Light on Inconsistencies in Grid Cybersecurity Disconnects and Recommendations S&P 2023
Ruiwen He Talk: Separate Information in Speeches by Disentanglement
March 3 Jiangyi Deng Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy S&P 2023
Qidi Zhong Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof NDSS 2023
Jinghui Wu SMACK: Semantically Meaningful Adversarial Audio Attack USENIX 2023
March 10 Yan Jiang Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting USENIX 2023
Shengyuan Pang Pre-trained Adversarial Peturbations NIPS 2022
Qianhao Miao Multi-modal Pretraining Model: The Big Convergence? New Issues
March 17 Ruochen Zhou Towards a General Video-based Keystroke Inference Attack USENIX 2023
Runmin Ou DISTDET: A Cost-Effective Distributed Cyber Threat Detection System USENIX 2023
Junning Zhai Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems NDSS 2023
Mar 24 Wenjun Zhu Privacy-preserving Lens, Carlos Hinojosa (Ph.D.) Talk
Jialin Wu RAB: Provable Robustness Against Backdoor Attacks S&P 2023
Yuan Sun AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms NDSS 2023
Mar 31 Xinfeng Li InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise NDSS 2023
Zitong Chen Human vs. Machines in Malware Classification USENIX 2023
Yinan Zhong GPT Large Language Model New Issues
April 7 Fengchen Yang Remote Attacks on Speech Recognition Systems Using Sound from Power Supply USENIX 2023
Yanze Ren The Impostor Among US(B): Off-Path Injection Attacks on USB Communication USENIX 2023
Lingshuo Meng AIGC can Memorize New Issues
April 14 Kai Wang Rehearsal: Volttack S&P 2023
Bo Yang Dense Reinforcement Learning for Safety Validation of Autonomous Vehicles Nature
Huaiyu Liu ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks USENIX 2023
April 21 Zizhi Jin Rehearsal: PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle S&P 2023
Zhixin Xie Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels S&P 2023
Jiani Liu CV No Longer Exists? Segment Anything: the first foundation model for image segmentation New Issues
April 28 Zhicong Zheng StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors NDSS 2023
Hanlei Zhang PPA: Preference Profiling Attack Against Federated Learning NDSS 2023
Kun Wang Evasion Attacks and Defenses on Smart Home Physical Event Verification NDSS 2023
May 6 Zhouhao Ji ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems NDSS 2023
Shilin Xiao Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses S&P 2023
Namin Hou A Guide to SDR and DSP New Issues
May 12 Qinhong Jiang Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels NDSS 2023
Zhihao Wu DepthFake: Spoofing 3D Face Authentication with a 2D Photo S&P 2023
Han Chen Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards S&P 2023
May 19 Shibo Zhang Fairness Properties of Face Recognition and Obfuscation Systems USENIX Security 2023
Yancheng Jiang mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array S&P 2023
May 26 Boyang Zhou Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks USENIX Security 2023
Zihao Dan EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems NDSS 2023
Shiang Guo
June 2 Ruiwen He Analyzing Leakage of Personally Identifiable Information in Language Models S&P 2023
Qidi Zhong Drone Security and the Mysterious Case of DJI’s DroneID NDSS 2023
Jinghui Wu Optimization Theory New Issues
Xuancun Lu Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks USENIX Security 2023
June 9 Yan Jiang I Still Know What You Watched Last Sunday: Privacy of the HbbTV Protocol in the European Smart TV Landscape NDSS 2023
Shengyuan Pang AI-Guardian: Defeating Adversarial Attacks using Backdoors S&P 2023
Qianhao Miao AI-Generated Text Detection New Issues
June 16 Shilin Xiao mmEcho: A mmWave-based Acoustic Eavesdropping Method S&P 2023
Runmin Ou Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems NDSS 2023
Junning Zhai When Evil Calls: Targeted Adversarial Voice over IP Network CCS 2022
June 23 Fengchen Yang GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line NDSS 2022
Jialin Wu PRIVATEFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation USENIX Security 2023
Yuan Sun
June 30 Jiangyi Deng Rehearsal USENIX Security 23
Zitong Chen InfinityGauntlet: Brute-force Attack on Smartphone Fingerprint Authentication USENIX Security 2023
Yinan Zhong PICCOLO : Exposing Complex Backdoors in NLP Transformer Models S&P 2022
July 7 Zizhi Jin Robustness of Fusion-based object detection in Autonomous Driving Talk
Yanze Ren Going through the motions: AR/VR keylogging from user head motions USENIX Security 2023
Lingshuo Meng 3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning S&P 2023
July 14 Wenjun Zhu Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations S&P 2023
Bo Yang Planning-oriented Autonomous Driving CVPR 2023 (best paper)
Huaiyu Liu Exposed Infrastructures: Discoery, Attacks and Remediation of Insecure ICS Remote Management Devices S&P 2022
Xinfeng Li Rehearsal USENIX Security 23
July 21 Wenjun Zhu Rehearsal USENIX Security 23
Jiani Liu the Security Implications of Large Language Model Code Assistants S&P 2022, USENIX Security 23
Shibo Zhang Rehearsal USENIX Security 23
Qinhong Jiang Rehearsal USENIX Security 23
Yijie Bai Rehearsal USENIX Security 23
Jiangyi Deng Rehearsal USENIX Security 23
July 28 Zhixin Xie
Hanlei Zhang
Kun Wang Spoofing Real-world Face Authentication Systems through Optical Synthesis S&P 2023

Autumn 2022 Seminars

Spring 2022 Seminars

Autumn 2021 Seminars

Spring 2021 Seminars

Autumn 2020 Seminars

Summer 2020 Seminars

Spring 2020 Seminars

Autumn 2019 Seminars

Spring 2019 Seminars

Autumn 2018 Seminars