|
Speaker |
Title |
Conference |
|
| July 1 | Boyang Zhou | Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Production Federated Learning | S&P 2022 |
| Yijie Bai | On adaptive attacks to adversarial example defense | Talk | |
| Lingshuo Meng | FL Backdoor Defenses FLAME & DeepSight | USENIX + NDSS 2022 | |
| July 8 | Jiahui Yang | Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era | USENIX 2022 |
| Zhihao Wu | Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks | S&P 2022 | |
| Shengyuan Pang | LINKTELLER: Recovering Private Edges from Graph Neural Networks via Influence Analysis | S&P 2022 | |
| July 15 | Runmin Ou | SketchLib: Enabling Efficient Sketch-based Monitoring on Programmable Switches | NDSS 2022 |
| Zhiyun Wang | Cyber-attack Detection for Photovoltaic Farms based on Power-Electronics-Enabled Harmonic State Space Modeling | IEEE Transactions on Smart Grid | |
| Ruochen Zhou | Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices | S&P 2022 | |
| July 22 | Qinhong Jiang | Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 | USENIX 2022 |
| Namin Hou | CamShield: Securing Smart Cameras through Physical Replication and Isolation | USENIX 2022 | |
| Jiachang Weng | New Issues: 平衡车 | ||
| July 29 | Yan Jiang | LTRACK: Stealthy Tracking of Mobile Phones in LTE | USENIX 2022 |
| Ruiwen He | PCR-Auth Solving Authentication Puzzle Challenge with Encoded Palm Contact Response | S&P 2022 | |
| Shilin Xiao | CrossTalk: Speculative Data Leaks Across Cores Are Real | S&P 2021 | |
| Aug 5 | Xinfeng Li | Study of Pre-Processing Defenses Against Adversarial Attacks on State-of-the-Art Speaker Recognition Systems | TIFS 2021 |
| Zhouhao Ji | The effect ofrenewable energy incorporation on power grid stability and resilience | Science Advance | |
| Kaibo Wang | New Issues: Certified robustness of adversarial attacks | ||
| Sep 16 | Lingshuo Meng | PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier | USENIX 2022 |
| Huaiyu Liu | Swarm of micro flying robots in the wild | Science Robotics | |
| Bo Yang | Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles | USENIX 2022 | |
| Sep 23 | Zhicong Zheng | AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary | S&P 2022 |
| Fei Teng | Privacy for Free: How does Dataset Condensation Help Privacy? | ICML 2022 | |
| Zizhi Jin | Seeing is Not Always Believing”: Detecting Perception Error Attacks Against Autonomous Vehicles | IEEE TDSC | |
| Sep 30 | Kai Wang | MeshUp: Stateless Cache Side-channel Attack on CPU Mesh | S&P 2022 |
| Wenjun Zhu | Fawkes: Protecting privacy against unauthorized deep learning models | USENIX Security 2020/td> | |
| Junning Zhai | Detecting Audio Adversarial Examples with Logit Noising | ACSAC 2021 | |
| Oct 7 | Zhixin Xie | Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation | S&P 2022 |
| Haoxiang Zhang | Dissecting Click Fraud Autonomy in the Wild | CCS 2021 | |
| Shan Zou | Introduction of Docker | ||
| Oct 14 | Shibo Zhang | Lowkey: Leveraging adversarial attacks to protect social media users from facial recognition | ICLR 2021 |
| Boyang Zhou | Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks | USENIX 2022 | |
| Yanze Ren | CCD & CMOS | ||
| Oct 21 | Shiang Guo | MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses | USENIX 2022 |
| Zihao Dan | Authoring and Verifying Human-Robot Interactions | 2018 UIST | |
| Han Chen | HeatDeCam:Detecting Hidden Spy Cameras via Thermal Emissions | CCS 2022 | |
| Oct 28 | Fengchen Yang | Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators | USENIX 2022 |
| Yizhuo Gao | Towards More Robust Keyword Spotting for Voice Assistants | USENIX 2022 | |
| Qidi Zhong | PGPATCH: Policy-Guided Logic Bug Patching for Robotic Vehicles | S&P 2022 | |
| Nov 4 | Haijun Gui | New Issues: Industrial Control System——Profibus | |
| Runmin Ou | Aggregate-based congestion control for pulse-wave DDoS defense | SIGCOMM 2022 | |
| Jiangyi Deng | Sphinx: Enabling Privacy-Preserving Online Learning over the Cloud | S&P 2022 | |
| Nov 11 | Jiahui Yang | ||
| Zhuoyang Shi | Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data | USENIX 2022 | |
| Yancheng Jiang | New Issues: Sensing of Motor Position with Resolver | ||
| Nov 18 | Ruochen Zhou | TickTock: Detecting Microphone Status in Laptops Leveraging Electromagnetic Leakage of Clock Signals | CCS 2022 |
| Zhihao Wu | Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints | S&P 2022 | |
| Yinan Zhong | New Issues: Diffusion: The answer to the next generation of image generative model | ||
| Nov 25 | Qinhong Jiang | Blue's Clues: Practical Discovery of Non-Discoverable Bluetooth Devices | S&P 2023 |
| Shengyuan Pang | Amnesiac Machine Learning | AAAA 21 | |
| Qianhao Miao | New Issues: Chain of Thought Prompting Elicits Reasoning in Large Language Models | ||
| Dec 2 | Yan Jiang | Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks | S&P 2023 |
| Yuan Sun | |||
| Zitong Chen | A Wolf in Sheep's Clothing: Spreading Deadly Pathogens Under the Disguise of Popular Music | CCS 2022 | |
| Dec 9 | Ruiwen He | Topic: Separate Information in Speeches by Disentanglement | |
| Namin Hou | DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems | USENIX 2022 | |
| Kun Wang | AI Chips | ||
| Dec 16 | Shilin Xiao | Overo: Sharing Private Audio Recordings | CCS 2022 |
| Kaibo Wang | Beyond neural scaling laws: beating power law scaling via data pruning | NIPS 2022 | |
| Hanlei Zhang | |||
| Dec 23 | Xinfeng Li | SpecPatch: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech recognition | CCS 2022 |
| Huaiyu Liu | Data Integrity Attack in Dynamic State Estimation of Smart Grid: Attack Model and Countermeasures | IEEE trans | |
| Jiani Liu | New Issues: Popular Metrics in CV Applications | ||
| Dec 30 | Zhouhao Ji | MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT Botnets | CCS 2021 |
| Fei Teng | |||
| Jinghui Wu | |||
| Jan 6 | Zizhi Jin | HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs | USENIX 2023 |
| Zhicong Zheng | |||
| Jialin Wu | RamBoAttack: A Robust Query Efficient Deep Neural Network Decision Exploit | NDSS 22 | |
| Jan 12 | Jiangyi Deng | DPIS: An Enhanced Mechanism for Differentially Private SGD with Importance Sampling | |
| Lingshuo Meng | Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation | CCS 2022 | |
| Xuancun Lu |