|
Speaker |
Title |
Conference |
|
| Feb 17 | Han Chen | MagEar: Eavesdropping via Audio Recovery using Magnetic Side Channel | MobiSys'22 |
| Yanchen Jiang | BROKENWIRE: Wireless Disruption of CCS Electric Vehicle Charging | NDSS 2023 | |
| Xuancun Lu | DensePose From WiFi | Talk | |
| Feb 24 | Boyang Zhou | Clean-Image Backdoor: Attacking Multi-Label Models with Poisoned Label Only | ICLR 2023 |
| Zihao Dan | PatchVerif: Discovering Faulty Patches in Robotic Vehicles | USENIX 2023 | |
| Shiang Guo | Shedding Light on Inconsistencies in Grid Cybersecurity Disconnects and Recommendations | S&P 2023 | |
| Ruiwen He | Talk: Separate Information in Speeches by Disentanglement | ||
| March 3 | Jiangyi Deng | Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy | S&P 2023 |
| Qidi Zhong | Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof | NDSS 2023 | |
| Jinghui Wu | SMACK: Semantically Meaningful Adversarial Audio Attack | USENIX 2023 | |
| March 10 | Yan Jiang | Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting | USENIX 2023 |
| Shengyuan Pang | Pre-trained Adversarial Peturbations | NIPS 2022 | |
| Qianhao Miao | Multi-modal Pretraining Model: The Big Convergence? | New Issues | |
| March 17 | Ruochen Zhou | Towards a General Video-based Keystroke Inference Attack | USENIX 2023 |
| Runmin Ou | DISTDET: A Cost-Effective Distributed Cyber Threat Detection System | USENIX 2023 | |
| Junning Zhai | Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems | NDSS 2023 | |
| Mar 24 | Wenjun Zhu | Privacy-preserving Lens, Carlos Hinojosa (Ph.D.) | Talk |
| Jialin Wu | RAB: Provable Robustness Against Backdoor Attacks | S&P 2023 | |
| Yuan Sun | AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms | NDSS 2023 | |
| Mar 31 | Xinfeng Li | InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise | NDSS 2023 |
| Zitong Chen | Human vs. Machines in Malware Classification | USENIX 2023 | |
| Yinan Zhong | GPT Large Language Model | New Issues | |
| April 7 | Fengchen Yang | Remote Attacks on Speech Recognition Systems Using Sound from Power Supply | USENIX 2023 |
| Yanze Ren | The Impostor Among US(B): Off-Path Injection Attacks on USB Communication | USENIX 2023 | |
| Lingshuo Meng | AIGC can Memorize | New Issues | |
| April 14 | Kai Wang | Rehearsal: Volttack | S&P 2023 |
| Bo Yang | Dense Reinforcement Learning for Safety Validation of Autonomous Vehicles | Nature | |
| Huaiyu Liu | ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks | USENIX 2023 | |
| April 21 | Zizhi Jin | Rehearsal: PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle | S&P 2023 |
| Zhixin Xie | Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels | S&P 2023 | |
| Jiani Liu | CV No Longer Exists? Segment Anything: the first foundation model for image segmentation | New Issues | |
| April 28 | Zhicong Zheng | StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors | NDSS 2023 |
| Hanlei Zhang | PPA: Preference Profiling Attack Against Federated Learning | NDSS 2023 | |
| Kun Wang | Evasion Attacks and Defenses on Smart Home Physical Event Verification | NDSS 2023 | |
| May 6 | Zhouhao Ji | ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems | NDSS 2023 |
| Shilin Xiao | Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses | S&P 2023 | |
| Namin Hou | A Guide to SDR and DSP | New Issues | |
| May 12 | Qinhong Jiang | Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels | NDSS 2023 |
| Zhihao Wu | DepthFake: Spoofing 3D Face Authentication with a 2D Photo | S&P 2023 | |
| Han Chen | Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards | S&P 2023 | |
| May 19 | Shibo Zhang | Fairness Properties of Face Recognition and Obfuscation Systems | USENIX Security 2023 |
| Yancheng Jiang | mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array | S&P 2023 | |
| May 26 | Boyang Zhou | Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks | USENIX Security 2023 |
| Zihao Dan | EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems | NDSS 2023 | |
| Shiang Guo | |||
| June 2 | Ruiwen He | Analyzing Leakage of Personally Identifiable Information in Language Models | S&P 2023 |
| Qidi Zhong | Drone Security and the Mysterious Case of DJI’s DroneID | NDSS 2023 | |
| Jinghui Wu | Optimization Theory | New Issues | |
| Xuancun Lu | Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks | USENIX Security 2023 | |
| June 9 | Yan Jiang | I Still Know What You Watched Last Sunday: Privacy of the HbbTV Protocol in the European Smart TV Landscape | NDSS 2023 |
| Shengyuan Pang | AI-Guardian: Defeating Adversarial Attacks using Backdoors | S&P 2023 | |
| Qianhao Miao | AI-Generated Text Detection | New Issues | |
| June 16 | Shilin Xiao | mmEcho: A mmWave-based Acoustic Eavesdropping Method | S&P 2023 |
| Runmin Ou | Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems | NDSS 2023 | |
| Junning Zhai | When Evil Calls: Targeted Adversarial Voice over IP Network | CCS 2022 | |
| June 23 | Fengchen Yang | GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line | NDSS 2022 |
| Jialin Wu | PRIVATEFL: Accurate, Differentially Private Federated Learning via Personalized Data Transformation | USENIX Security 2023 | |
| Yuan Sun | |||
| June 30 | Jiangyi Deng | Rehearsal USENIX Security 23 | |
| Zitong Chen | InfinityGauntlet: Brute-force Attack on Smartphone Fingerprint Authentication | USENIX Security 2023 | |
| Yinan Zhong | PICCOLO : Exposing Complex Backdoors in NLP Transformer Models | S&P 2022 | |
| July 7 | Zizhi Jin | Robustness of Fusion-based object detection in Autonomous Driving | Talk |
| Yanze Ren | Going through the motions: AR/VR keylogging from user head motions | USENIX Security 2023 | |
| Lingshuo Meng | 3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning | S&P 2023 | |
| July 14 | Wenjun Zhu | Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations | S&P 2023 |
| Bo Yang | Planning-oriented Autonomous Driving | CVPR 2023 (best paper) | |
| Huaiyu Liu | Exposed Infrastructures: Discoery, Attacks and Remediation of Insecure ICS Remote Management Devices | S&P 2022 | |
| Xinfeng Li | Rehearsal USENIX Security 23 | ||
| July 21 | Wenjun Zhu | Rehearsal USENIX Security 23 | |
| Jiani Liu | the Security Implications of Large Language Model Code Assistants | S&P 2022, USENIX Security 23 | |
| Shibo Zhang | Rehearsal USENIX Security 23 | ||
| Qinhong Jiang | Rehearsal USENIX Security 23 | ||
| Yijie Bai | Rehearsal USENIX Security 23 | ||
| Jiangyi Deng | Rehearsal USENIX Security 23 | ||
| July 28 | Zhixin Xie | ||
| Hanlei Zhang | |||
| Kun Wang | Spoofing Real-world Face Authentication Systems through Optical Synthesis | S&P 2023 |