Speaker |
Title |
Conference |
|
Feb 17 | Han Chen | MagEar: Eavesdropping via Audio Recovery using Magnetic Side Channel | MobiSys'22 |
Yanchen Jiang | BROKENWIRE: Wireless Disruption of CCS Electric Vehicle Charging | NDSS 2023 | |
Xuancun Lu | DensePose From WiFi | Talk | |
Feb 24 | Boyang Zhou | Clean-Image Backdoor: Attacking Multi-Label Models with Poisoned Label Only | ICLR 2023 |
Zihao Dan | PatchVerif: Discovering Faulty Patches in Robotic Vehicles | USENIX 2023 | |
Shiang Guo | Shedding Light on Inconsistencies in Grid Cybersecurity Disconnects and Recommendations | S&P 2023 | |
Ruiwen He | Talk: Separate Information in Speeches by Disentanglement | ||
March 3 | Jiangyi Deng | Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy | S&P 2023 |
Qidi Zhong | Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof | NDSS 2023 | |
Jinghui Wu | SMACK: Semantically Meaningful Adversarial Audio Attack | USENIX 2023 | |
March 10 | Yan Jiang | Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting | USENIX 2023 |
Shengyuan Pang | Pre-trained Adversarial Peturbations | NIPS 2022 | |
Qianhao Miao | Multi-modal Pretraining Model: The Big Convergence? | New Issues | |
March 17 | Ruochen Zhou | Towards a General Video-based Keystroke Inference Attack | USENIX 2023 |
Runmin Ou | DISTDET: A Cost-Effective Distributed Cyber Threat Detection System | USENIX 2023 | |
Junning Zhai | Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems | NDSS 2023 | |
Mar 24 | Wenjun Zhu | Privacy-preserving Lens, Carlos Hinojosa (Ph.D.) | Talk |
Jialin Wu | RAB: Provable Robustness Against Backdoor Attacks | S&P 2023 | |
Yuan Sun | AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms | NDSS 2023 | |
Mar 31 | Xinfeng Li | InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise | NDSS 2023 |
Zitong Chen | Human vs. Machines in Malware Classification | USENIX 2023 | |
Yinan Zhong | GPT Large Language Model | New Issues | |
April 7 | Fengchen Yang | Remote Attacks on Speech Recognition Systems Using Sound from Power Supply | USENIX 2023 |
Yanze Ren | The Impostor Among US(B): Off-Path Injection Attacks on USB Communication | USENIX 2023 | |
Lingshuo Meng | AIGC can Memorize | New Issues | |
April 14 | Kai Wang | Rehearsal: Volttack | S&P 2023 |
Bo Yang | Dense Reinforcement Learning for Safety Validation of Autonomous Vehicles | Nature | |
Huaiyu Liu | ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks | USENIX 2023 | |
April 21 | Zizhi Jin | Rehearsal: PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle | S&P 2023 |
Zhixin Xie | Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels | S&P 2023 | |
Jiani Liu | CV No Longer Exists? Segment Anything: the first foundation model for image segmentation | New Issues | |
April 28 | Zhicong Zheng | StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors | NDSS 2023 |
Hanlei Zhang | PPA: Preference Profiling Attack Against Federated Learning | NDSS 2023 | |
Kun Wang | Evasion Attacks and Defenses on Smart Home Physical Event Verification | NDSS 2023 | |
May 6 | Zhouhao Ji | ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems | NDSS 2023 |
Shilin Xiao | Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses | S&P 2023 | |
Namin Hou | A Guide to SDR and DSP | New Issues | |
May 12 | Qinhong Jiang | Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels | NDSS 2023 |
Zhihao Wu | DepthFake: Spoofing 3D Face Authentication with a 2D Photo | S&P 2023 | |
Han Chen | Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards | S&P 2023 | |
May 19 | Shibo Zhang | Fairness Properties of Face Recognition and Obfuscation Systems | USENIX Security 2023 |
Yancheng Jiang | mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array | S&P 2023 | |
May 26 | Boyang Zhou | Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks | USENIX Security 2023 |
Zihao Dan | EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems | NDSS 2023 | |
Shiang Guo | |||
June 2 | Ruiwen He | Analyzing Leakage of Personally Identifiable Information in Language Models | S&P 2023 |
Qidi Zhong | Drone Security and the Mysterious Case of DJI’s DroneID | NDSS 2023 | |
Jinghui Wu | Optimization Theory | New Issues | |
Xuancun Lu | Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks | USENIX Security 2023 | |
June 9 | Yan Jiang | I Still Know What You Watched Last Sunday: Privacy of the HbbTV Protocol in the European Smart TV Landscape | NDSS 2023 |
Shengyuan Pang | AI-Guardian: Defeating Adversarial Attacks using Backdoors | S&P 2023 | |
Qianhao Miao | AI-Generated Text Detection | New Issues | |
June 16 | Shilin Xiao | mmEcho: A mmWave-based Acoustic Eavesdropping Method | S&P 2023 |
Runmin Ou | Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems | NDSS 2023 | |
Junning Zhai | When Evil Calls: Targeted Adversarial Voice over IP Network | CCS 2022 | |
June 23 | Fengchen Yang | GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line | NDSS 2022 |
Jialin Wu | PRIVATEFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation | USENIX Security 2023 | |
Yuan Sun | |||
June 30 | Jiangyi Deng | Rehearsal USENIX Security 23 | |
Zitong Chen | InfinityGauntlet: Brute-force Attack on Smartphone Fingerprint Authentication | USENIX Security 2023 | |
Yinan Zhong | PICCOLO : Exposing Complex Backdoors in NLP Transformer Models | S&P 2022 | |
July 7 | Zizhi Jin | Robustness of Fusion-based object detection in Autonomous Driving | Talk |
Yanze Ren | Going through the motions: AR/VR keylogging from user head motions | USENIX Security 2023 | |
Lingshuo Meng | 3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning | S&P 2023 | |
July 14 | Wenjun Zhu | Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations | S&P 2023 |
Bo Yang | Planning-oriented Autonomous Driving | CVPR 2023 (best paper) | |
Huaiyu Liu | Exposed Infrastructures: Discoery, Attacks and Remediation of Insecure ICS Remote Management Devices | S&P 2022 | |
Xinfeng Li | Rehearsal USENIX Security 23 | ||
July 21 | Wenjun Zhu | Rehearsal USENIX Security 23 | |
Jiani Liu | the Security Implications of Large Language Model Code Assistants | S&P 2022, USENIX Security 23 | |
Shibo Zhang | Rehearsal USENIX Security 23 | ||
Qinhong Jiang | Rehearsal USENIX Security 23 | ||
Yijie Bai | Rehearsal USENIX Security 23 | ||
Jiangyi Deng | Rehearsal USENIX Security 23 | ||
July 28 | Zhixin Xie | ||
Hanlei Zhang | |||
Kun Wang | Spoofing Real-world Face Authentication Systems through Optical Synthesis | S&P 2023 |