|
Speaker |
Title |
Conference |
|
| September 29 | Zhiyun Wang | Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach | CCS 2018 |
| JiaYu Zhang | Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices | USENIX 2018 | |
| Ruiwen He | BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid | USENIX 2018 | |
| October 11 | Guoming Zhang | PrinTracker: Fingerprinting 3D Printers using Commodity Scanners | CCS 2018 |
| Chen Yan | Fear the Reaper: Characterization and Fast Detection of Card Skimmers | USENIX 2018 | |
| Bingjing Yan | New issues | ||
| October 15 | Yushi Cheng | Fear the Reaper: Characterization and Fast Detection of Card Skimmers | USENIX 2018 |
| Taiming Zhang | Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning | USENIX 2018 | |
| Kai Wang | New issues | ||
| October 22 | Juchuan Zhang | Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach | CCS 2018 |
| Zhou Zhuang | |||
| Ruochen Zhou | New issues | ||
| October 29 | Yanmiao Zhang | Meltdown: Reading Kernel Memory from User Space | USENIX 2018 |
| Tianchen Zhang | QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing | USENIX 2018 | |
| Xinfeng Li | New issues | ||
| November 19 | Ruochen Zhou | If This Then What? Controlling Flows in IoT Apps | CCS 2018 |
| Yanjie Li | DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN | IEEE 2018 | |
| Jiangyi Deng | Clock Around the Clock: Time-Based Device Fingerprinting | CCS 2018 | |
| Tao Zhao | DScreaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers | CCS 2018 | |
| Zhiyun Wang | New issues | ||
| November 29 | Chaohao Li | SoK: Security Evaluation of Home-Based IoT Deployments | S&P 2019 |
| Bingjing Yan | Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies | USENIX 2018 | |
| Ruiwen He | New issues | ||
| December 6 | Ruiwen He | Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power Attacks | CCS 2018 |
| Jiayu Zhang | HoMonit: Monitoring Smart Home Apps from Encrypted Traffic | CCS 2018 | |
| Yanjie Li | New issues | ||
| December 13 | Zhiyun Wang | PatternListener: Cracking Android Pattern Lock Using Acoustic Signals | CCS 2018 |
| Xuan Ouyang | |||
| Tao Zhao | New issues | ||
| December 20 | Chen Yan | Rebooting Ultrasonic Positioning Systems for Ultrasound-incapable Smart Devices | MobiCom2019 |
| Guoming Zhang | No Training Hurdles: Fast Training-Agnostic Atacks to Infer Your Typing | CCS 2018 | |
| Bingjing Yan | New issues | ||
| December 27 | Yushi Cheng | DeepMasterPrints: Generating Master Prints for Dictionary Attacks via Latent Variable Evolution | CCS 2018 |
| Taiming Zhang | |||
| Kai Wang | RainbowLight: Towards Low Cost Ambient Light Positioning with Mobile Phones | MobiCom 2018 | |
| January 3 | Juchuan Zhang | ChromaCode: A Fully Imperceptible Screen-Camera Communication System | CCS 2018 |
| Zhou Zhuang | |||
| Xinfeng Li | Resolving Policy Conflicts in Multi-Carrier Cellular Access | MobiCom 2018 | |
| January 10 | Yanmiao Zhang | FUZE:Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities | USENIX 2018 |
| Tianchen Zhang | Inception: System-Wide Security Testing of Real-World Embedded Systems Software | USENIX 2018 | |
| Ruochen Zhou | New issues | ||
| January 17 | Jiangyi Deng | Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring | USENIX 2018 |
| Yanjie Li | Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks | NDSS 2017 | |
| Zhiyun Wang | New issues |