Seminar Schedule
Fall 2025-2026
| Date | Speaker | Title | Conference | Download |
| 9.24 | Junxian Li | Exploring the Robustness of Vision-Language-Action Models against Sensor Attacks | LAMPS@CCS25 | |
| Boyang Xu | The Ghost Navigator: Revisiting the Hidden Vulnerability of Localization in Autonomous Driving | USENIX 2025 | ||
| 10.15 | Qianhui Dai |
Heracles: Chosen Plaintext Attack on AMD SEV-SNP |
CCS 2025 | |
| Zhen Huang | Hygon CSV Analysis | |||
| 10.22 | Wei Teng | |||
| Ruqin Fu | ||||
| 10.29 | Jiaqin Yan | |||
| 11.5 | Xiangzhi Liu | |||
| Tianyu Liu | ||||
| 11.12 | Fazhong Liu | |||
| 11.19 | Qibin Wang | |||
| Haodong Li | ||||
| 11.26 | Yanbo Xu | |||
| 12.3 | Muchen Pan | |||
| Peilin luo | ||||
| 12.10 | Zhenyu Xu | |||
| 12.17 | Dexi Liu | |||
| Chenlei Wang | ||||
| 12.24 | Yuhan Ren | |||
| 12.31 | Wei Wang | |||
| Yujia Huo |
Spring 2024-2025
| Date | Speaker | Title | Conference | Download |
| 2.26 | Yanbo Xu | Demystifying RCE Vulnerabilities in LLM-Integrated Apps | CCS 2024 | Link |
| Yanbo Xu | Large Language Models for Code Analysis: Do LLMs Really Do Their Job? | USENIX Security 2024 | Link | |
| 3.5 | Muchen Pan | A Key-Driven Framework for Identity-Preserving Face Anonymization | NDSS 2025 | Link |
| 3.12 | Wei Wang | BAIT: Large Language Model Backdoor Scanning by Inverting Attack Target | IEEE S&P 2025 | Link |
| 3.19 | Fazhong Liu | Alchemy: Data-Free Adversarial Training | ACM CCS 2024 | Link |
| Wei Teng | More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor | USENIX Security 2024 | Link | |
| 3.26 | Junxian Li | CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models | NDSS 2025 | Link |
| 4.2 | Qianhui Dai | CipherSteal: Stealing Input Data from TEE-Shielded Neural Networks with Ciphertext Side Channels | IEEE S&P 2025 | Link |
| 4.9 | Yujia Huo | Evaluating LLMs Towards Automated Assessment of Privacy Policy Understandability | NDSS 2025 | Link |
| 4.16 | Tianyu Liu | Distributed Backdoor Attacks on Federated Graph Learning and Certified Defenses | ACM CCS 2024 | Link |
| 4.23 | Peilin Luo | Prompt Fuzzing for Fuzz Driver Generation | ACM CCS 2024 | Link |
| 4.30 | Jiaqin Yan | Tutorial of Electronic Voting | / | Link |
| 5.7 | Chenlei Wang | ACE: A Model Poisoning Attack on Contribution Evaluation Method in Federated Learning | USENIX Security 2024 | Link |
| 5.14 | Xiangzhi Liu | LLMmap: Fingerprinting for Large Language Models | USENIX Security 2025 | Link |
| 5.21 | Dexi Liu | Tutorial of MCP | / | Link |
| 5.28 | Zhen Huang | Tutorial of SEV-SNP | / | |
| 6.4 | Yichi Zhang | Careful About What App Promotion Ads Recommend! Detecting and Explaining Malware Promotion via App Promotion Graph | NDSS 2025 |
Fall 2024-2025
| Date | Speaker | Title | Conference | Download |
| 10.09 | Tian Dong | What Was Your Prompt? A Remote Keylogging Attack on AI Assistants | USENIX Security 2024 | |
| Dexi Liu | GPU TEE Tutorial | / | ||
| 10.16 | Jiaqin yan | S3Voting: A Blockchain Sharding Based E-voting Approach with Security and Scalability | TDSC | |
| 10.23 | Junxian Li | When LLM Meets DRL: Advancing Jailbreaking Efficiency via DRL-guided Search | NeurIPS 2024 | |
| Yichi Zhang | KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection | Usenix 2024 | ||
| 10.30 | Fazhong Liu | Voice Jailbreak Attacks Against GPT-4o | arXiv:2405.19103 | |
| 11.06 | Muchen Pan | PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound | NDSS 2024 | |
| Yanbo Xu | From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover | Oakland 2024 | ||
| 11.13 | Hongliang Yong | Defense rehearsal | ||
| Zhiyong Liu | Defense rehearsal | |||
| 11.20 | Yunmeng Shu | Defense rehearsal | ||
| Hongzhi Luo | Defense rehearsal | |||
| 11.27 | Zhen Huang | Breaking Confidential VMs with Malicious Interrupts | USENIX Security 2024 | |
| 12.04 | Jiachun Li | |||
| 12.11 | Chenlei Wang | |||
| Wei Wang | ||||
| 12.18 | Tong Zhu | |||
| 12.25 | Peilin Luo | |||
| Yujia Huo |
Spring 2023-2024
| Date | Speaker | Title | Conference | Download |
| 2.23 | Tian Dong | LLM Agents can Autonomously Hack Websites | arXiv:2402 | Link |
| 3.1 | Zhiyong Liu | Beyond Imitation: Generating Human Mobility from Context-aware Reasoning with Large Language Models | arXiv:2402 | Link |
| Peilin Luo | Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps | NDSS 2020 | Link | |
| 3.8 | Yichi Zhang | Understanding and Detecting Abused lmage Hosting Modules as Malicious Services | ACM CCS 2023 | Link |
| 3.15 | Yanbo Xu | Access Your Tesla without Your AwarenessCompromising Keyless Entry System of Model 3 | NDSS 2023 | Link |
| Linxi Jiang | SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings | ACM CCS 2022 | Link | |
| 3.22 | Tong Zhu | DroidEvolver: Self-Evolving Android Malware Detection System, Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware | IEEE EuroS&P, ACM CCS 2020 | Link |
| 3.29 | Hongzhi Luo | InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force Attack | USENIX Security 2023 | Link |
| Fazhong Liu | Dual Defense: Adversarial,Traceable, and Invisible Robust Watermarking against Face Swapping | IEEE TIFS | Link | |
| 4.12 | Zhen Huang | GPU TEE | ||
| 4.19 | Yunmeng Shu | Soft Prompt Threats: Attacking Safety Alignment and Unlearning in Open-Source LLMs through the Embedding Space | arXiv:2402 | Link |
| Junxian Li | – | |||
| 4.26 | Tian Dong | Moderating New Waves of Online Hatewith Chain-of-Thought Reasoning in Large Language Models | IEEE S&P 2024 | Link |
| 5.10 | Hongliang Yong | USENIX Security Submission Paper | ||
| Muchen Pan | Can Virtual Reality Protect Users from Keystroke Inference Attacks? | USENIX Security 2024 | Link | |
| 5.17 | Zhen Huang | GPU TEE#2 | ||
| 5.24 | Yanbo Xu | Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols | USENIX Security 2022 | Link |
| Yichi Zhang | Large Language Models for Cyber Security: A Systematic Literature Review | arXiv:2405 | Link | |
| 5.31 | Zhiyong Liu | Adaptive Graph Representation Learning for Next POlRecommendation | SIGIR 23 | Link |
| Hongliang Yong | ||||
| 6.7 | Tong Zhu |
Autumn 2023
| Date | Speaker | Title | Conference | Download |
| 9.18 | Yichi Zhang | Messy States of Wiring: Vulnerabilities in Emerging Personal Payment Systems | USENIX 2021 | |
| 9.25 | Zhiyong Liu | TRIDENT: Towards Detecting and Mitigating Web-based Social Engineering Attacks | USENIX 2023 | PPT |
| Le Yu | Thesis | |||
| 10.9 | Ke Tang | PrivGuard: Privacy Regulation Compliance Made Easier | USENIX 2022 | PPT |
| 10.16 | Yunmeng Shu | VILLAIN: Backdoor Attacks Against Vertical Split Learning | USENIX 2023 | |
| 10.23 | Jiachun Li | Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks | Oakland 2023 | |
| Hongzhi Luo | AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves | USENIX 2023 | ||
| 10.30 | Peilin Luo | No Linux, No Problem: Fast and Correct Windows Binary Fuzzing via Target-embedded Snapshotting | USENIX 2023 | |
| Muchen Pan | Nowhere to Hide: Detecting Live Video Forgery via Vision-WiFi Silhouette Correspondence | INFOCOM 2023 | ||
| 11.06 | Zhen Huang | SoK: Taxonomy of Attacks on Open-Source Software Supply Chains | Oakland 2023 | |
| 11.13 | Hongliang Yong | An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting | USENIX 2023 | |
| Jiaxin Yan | Mid-term Report | |||
| 11.20 | Tong Zhu | Project Report | ||
| 11.27 | Hui Liu, Yuxia Zhan | Thesis | ||
| Le Zhang, Jia Xiang | Thesis | |||
| 12.04 | Tian Dong | |||
| 12.11 | Chengyang Liu | |||
| 12.18 | Hongliang Yong | |||
| Zhiyong Liu | ||||
| 12.25 | Yunmeng Shu | |||
| Hongzhi Luo |
Spring 2022
| Date | Speaker | Title | Conference | Download |
| 2.22 | Hongzhi Luo | Building a High-performance Fine-grained Deduplication Framework for Backup Storage with High Deduplication Ratio |
USENIX ATC 2022 | |
| Hongliang Yong | Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols | USENIX 2022 | PPT | |
| 3.1 | Zhiyong Liu | Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission | USENIX 2022 | PPT |
| 3.8 | Le Zhang | Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels | NDSS 2023 | PPT |
| Jia Xiang | StrongBox: A GPU TEE on Arm Endpoints | CCS 2022 | ||
| 3.15 | Yuxia Zhan | SoundLock: A Novel User Authentication Scheme for VR Devices Using Auditory-Pupillary Response | NDSS 2023 | PPT |
| 3.22 | Jiachun Li | “OK, Siri” or “Hey, Google”: Evaluating Voiceprint Distinctiveness Via Content-based PROLE Score | USENIX 2022 | PPT |
| Tian Dong | CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph | NDSS 2023 | PPT | |
| 3.29 | Ke Tang | A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned | USENIX 2022 | PPT |
| 4.12 | Zhen Huang | SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier |
USENIX 2022 | |
| 4.19 | Linxi Jiang | Demystifying Exploitable Bugs in Smart Contracts |
ICSE 2023 | |
| 4.26 | Tong Zhu | Khaleesi: Breaker of Advertising & Tracking Request Chains | USENIX 2022 | |
| 5.10 | Chenyang Liu | Cross-Language Attacks | NDSS 2022 | PPT |
| Hui Liu | Tap: Transparent and Privacy-Preserving Data Services | USENIX 2023 | PPT | |
| 5.17 | Yichi Zhang | |||
| 5.24 | Fazhong Liu | |||
| Haoxuan Xu | ||||
| 5.31 | Hongzhi Luo | |||
| Ganxiang Yang |
Autumn 2022
| Date | Speaker | Title | Conference | Download |
| 9.29 | Jiachun Li | FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing | NDSS 2022 | PPT |
| 10.13 | Tian Dong | Are Attribute Inference Attacks Just Imputation? | CCS 2022 | PPT |
| Hongliang Yong | BROKENWIRE : Wireless Disruption of CCS Electric Vehicle Charging | NDSS 2023 | PPT | |
| 10.20 | Zhiyong Liu | A Large-scale and Longitudinal Measurement Study of DKIM Deployment | USENIX 2022 | PPT |
| 10.28 | Zhen Huang | Introduction to Zero-Knowledge Pro | PPT | |
| Linxin Jiang | Binoculars:Contention-Based Side-Channel Attacks Exploiting the Page Walker | USENIX 2022 | ||
| 11.4 | Ganxiang Yang | SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX | USENIX 2022 | PPT |
| 11.10 | Le Yu | CGM: An Enhanced Mechanism for Streaming Data Collectionwith Local Differential Privacy | VLDB 2021 | PPT |
| Yichi Zhang | “Gambling Scam Detection” Literature Review | |||
| 11.17 | Ke Tang | A Large-scale Investigation into Geodifferences in Mobile Apps | USENIX 2022 | PPT |
| 11.25 | Le Zhang | Method Confusion Attack on Bluetooth Pairing | IEEE S&P 2021 | PPT |
| Yuxia Zhan | Everything I want to share about Privacy Policy | PPT | ||
| 12.2 | Hui Liu | Caring about Sharing: User Perceptions of Multiparty Data Sharing | USENIX 2022 | PPT |
| 12.9 | Tong Zhu | The Inventory is Dark and Full of Misinformation Understanding the Abuse of Ad Inventory Pooling in the Ad-Tech Supply Chain | PPT | |
| Haoxuan Xu | Preventing Use-After-Free Attacks with Fast Forward Allocation | USENIX 2021 | ||
| 12.16 | Jia Xiang | Narrator: Secure and Practical State Continuity for Trusted Execution in the Cloud | ACM CCS 2022 | |
| 12.23 | Hongliang Yong | Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition | USENIX 2022 | PPT |
| Zhiyong Liu | LTrack: Stealthy Tracking of Mobile Phones in LTE | USENIX 2022 | PPT | |
| 12.30 | Hongzhi Luo |
Spring 2022
| Date | Speaker | Title | Conference | Download |
| 2.25 | Yuxia Zhan | OVRSEEN: Auditing Network Traffic and Privacy Policies in Oculus VR | USENIX 2022 | PPT |
| Hui Liu | When the Curious Abandon Honesty: Federated Learning Is Not Private | PPT | ||
| 3.4 | Jia Xiang | Native Client: A Sandbox for Portable, Untrusted x86 Native Code | IEEE S&P 2009 | |
| 4.8 | Le Zhang | Lend Me Your Ear: Passive Remote Physical Side Channels on PCs | USENIX 2022 | PPT |
| Haotian Hu | SAID: State-aware Defense Against Injection Attacks on In-vehicle Network | USENIX 2022 | PPT | |
| 4.15 | Binhan Xi | On the Security Risks of NAS | USENIX 2022 | PPT |
| 4.22 | Jiachun Li | I Always Feel Like Somebody’s Sensing Me! A Framework to Detect, Identify, and Localize Clandestine Wireless Sensors | USENIX 2021 | PPT |
| Zhen Huang | Civet: An Efficient Java Partitioning Framework for Hardware Enclaves | USENIX 2020 | ||
| 4.29 | Shaofeng Li | Are We There Yet? Timing and Floating Attacks on Different Privacy Systems | IEEE S&P 2022 | PPT |
| 5.6 | Tong Zhu | Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code | USENIX 2021 | |
| Tian Dong | Hyperparameter Tuning with Renyi Differential Privacy | ICLR 2022 | PPT | |
| 5.13 | Le Yu | Privacy Odometers and Filters: Pay-as-you-Go Composition | NIPS 2016 | PPT |
| 5.20 | Yan Meng | GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line | NDSS 2022 | PPT |
| Yichi Zhang | How Machine Learning Is Solving the Binary Function Similarity Problem | USENIX 2022 | PPT | |
| 5.27 | Xinyu Wang | SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks | IEEE S&P 2022 | PPT |
| 6.3 | Ke Tang | Understanding Worldwide Private Information Collection on Android | NDSS 2021 | PPT |
Autumn 2021
| Date | Speaker | Title | Conference | Download |
| 10.8 | Yuxia Zhan | AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads | USENIX 2021 | PPT |
| Hui Liu | Extracting Training Data from Large Language Models | PPT | ||
| 10.15 | Jia Xiang | Hurdle Securing Jump Instructions Against Code Reuse Attacks | ASPLOS 2020 | |
| 10.22 | Le Zhang | Wireless Charging Power Side-Channel Attacks | CCS 2021 | PPT |
| Haotian Hu | Detection of Message Injection Attacks onto the CAN Bus using Similarity of Successive Messages-Sequence Graphs | PPT | ||
| 10.29 | Binhan Xi | SmashEx: Smashing SGX Enclaves Using Exceptions | CCS 2021 | PPT |
| 11.5 | Xinyu Wang | Trojan Source: Invisiable Vulnerabilities | PPT | |
| Zirui Peng | Entangled watermark as a Defense against Model Extraction | USENIX 2021 | PPT | |
| 11.12 | Zhen Huang | DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks | USENIX 2016 | |
| 11.19 | Jiachun Li | Charger-Surfing: Exploiting a Power Line Side- Channel for Smartphone Information Leakage | USENIX 2021 | PPT |
| 11.26 | Tian Dong | BLACKSMITH: Scalable Rowhammering in the Frequency Domain | IEEE S&P 2022 | PPT |
| Tong Zhu | Discussion on advertising fraud | |||
| 12.3 | Le Yu | Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks | TMC 2020 | PPT |
| Yan Meng | Inferring Live Speech and Speaker Identity via AR/VR Motion Sensors | MobiCom | PPT | |
| 12.10 | Yichi Zhang | Understanding Malicious Cross-library Data Harvesting on Android | PPT | |
| 12.17 | Shaofeng Li | Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures | USENIX 2020 | PPT |
| 12.24 | Brain Storm |
Spring 2021
| Date | Speaker | Title | Conference | Download |
| 3.12 | Le Zhang | EarArray: Defending against DolphinAttack via Acoustic Attenuation | NDSS 2021 | PPT |
| Haotian Hu | A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks | CCS 2020 | PPT | |
| 3.19 | Binhan Xi | Security Analysis of the Democracy Live Online Voting System | USENIX 2021 | PPT |
| 3.26 | Ruoxu Yang | Security of GPS/INS based On-road Location Tracking Systems | NDSS 2019 | PPT |
| Suibin Sun | DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels | CCS 2020 | PPT | |
| 4.2 | Chengyong-xiao Wei | PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps | NDSS 2021 | PPT |
| 4.9 | Hui Liu | Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile APPs | USENIX 2021 | |
| Ya Fang | PriSEC: A Privacy Settings Enforcement Controller | USENIX 2021 | PPT | |
| 4.16 | Youqun Li | Tales of Favicons and Caches: Persistent Tracking in Modern Browsers | NDSS 2021 | PPT |
| 4.23 | Yuxia Zhan | Secure Multi User Content Sharing for Augmented Reality Applications | USENIX 2019 | PPT |
| 5.14 | Yan Meng | Securing Voice Interface via Ubiquitous Wireless Sensing | PPT | |
| 5.21 | Shaofeng Li | Stealthy Backdoors as Compression Artifacts | PPT | |
| Tong Zhu | Understanding and Detecting International Revenue Share Fraud | NDSS 2021 | PPT | |
| 5.28 | Brandon Falk | Self-Illusion: A Study on Cognition of Role-Playing in Immersive Virtual Environments | ||
| Jiachun Li | Recent Focus in IoT (Internet of Things) | PPT | ||
| 6.4 | Le Yu | R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions | CCS 2020 | PPT |
Fall 2020
| Date | Speaker | Title | Conference | Download |
| 9.11 | Le Zhang | Chaperone: Real-time Locking and Loss Prevention for Smartphones | USENIX 2020 | PPT |
| Haotian Hu | Towards HTTPS Everywhere on Android: We Are Not There Yet | USENIX 2020 | PPT | |
| 9.18 | Binhan Xi | TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applicaitons | NDSS 2020 | PPT |
| 9.25 | Le Yu | Sufficient Statistics | RAR | |
| Jiachun Li | Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems | USENIX 2020 | PPT | |
| 10.9 | Youqun Li | Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses | S&P 2020 | PPT |
| 10.16 | Shaofeng Li | Information Leakage in Embedding Models | CCS 2020 | |
| Brandon Falk | OcuLock: Exploring Human Visual Systemfor Authentication in Virtual RealityHead-mounted Display | NDSS 2021 | ||
| 10.23 | Yan Meng | Thwarting Replay Attacks and Their Defects | PPT | |
| 10.30 | Suibin Sun | Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale | CCS 2020 | PPT |
| Ruoxu Yang | Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing | USENIX 2020 | ||
| 11.6 | Lu Zhou | Plug N Pwned : Comprehensive Vulnerability Analysis of OBD II Dongles as A New Over the Air Attack Surface in Automotive IoT | USENIX 2020 | |
| 11.13 | Yichi Zhang | Brainstorm Section | ||
| Chengyongxiao Wei | From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security | USENIX 2020 | ||
| 11.20 | Tong Zhu | FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware | USENIX 2020 | |
| 11.27 | Hui Liu | Adversarial Semantic Collisions | EMNLP 2020 | PPT |
Spring 2020
| Date | Speaker | Title | Conference | Download |
| 2.14 | Lei Zhang | Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving | CCS 2020 | PPT |
| Yichi Zhang | MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps | i3w 2020 | ||
| 2.21 | Xinyu Wang | Neural Network Inversionin Adversarial Setting via Background Knowledge Alignment | CCS 2019 | |
| Chengyongxiao Wei | (Un)informed Consent: Studying GDPR Consent Notices in the Field | CCS 2019 | PPT | |
| 2.28 | Ke Tang | What Are You Searching For?A Remote Keylogging Attack on Search Engine Autocomplete | USENIX 2019 | PPT |
| Le Yu | Location Privacy Protection in Vehicle-Based Spatial Crowdsourcing via Geo-Indistinguishability | ICDCS 2019 | PPT | |
| 3.6 | Shaofeng Li | Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning* | Okland 2020 | PPT |
| Lu Zhou | EASI: Edge-Based Sender Identification onResource-Constrained Platforms for Automotive Networks | NDSS2020 | PPT | |
| 3.13 | Suibin Sun | Into the Deep Web: Understanding E-commerceFraud from Autonomous Chat with Cybercriminals | NDSS2020 | PPT |
| Tong Zhu | FraudDroid: Automated Ad Fraud Detection for Android APP | ESEC/FSE 2018 | PPT | |
| 3.20 | Ruoxu Yang | All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems | USENIX 2018 | PPT |
| Jinlei Li | PEEVES: Physical Event Verification in Smart Homes | CCS 2019 | PPT | |
| 4.3 | Brandon Falk | Novel Encryption Method of GPS Information in Image File Using Format-preserving Encryption | IMIS 2019 | |
| Yixiao Fei | Privacy Risks of Securing Machine Learning Models against Adversarial Examples | CCS 2019 | PPT | |
| 4.10 | Jiachun Li | PDVocal: Towards Privacy-preserving Parkinson’s Disease Detection using Non-speech Body Sounds | Mobicom 2019 | PPT |
| Peilin Wu | Beyond Digital Domain: Fooling Deep learning Based Recognition System inPhysical World | AAAI 2020 | PPT | |
| 5.1 | Shufan Zhang | A Brief Tutorial on Sparse Vector Technique | ||
| Binhan Xi | Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer | NDSS 2020 | PPT | |
| 5.8 | Lu Yan | ParmeSan: Sanitizer-guided Greybox Fuzzing | USENIX 2020 | |
| Haotian Hu | Encrypted DNS =⇒ Privacy? A Traffic Analysis Perspective | NDSS 2020 | PPT | |
| 5.22 | Jiahao Yu | Certified Robustness to Adversarial Examples with Differential Privacy | S&P 2019 | PPT |
| Hui Liu | Universal Adversarial Training | CVPR 2017 | PPT | |
| 5.29 | Ren Zhou | Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms | USENIX 2019 | PPT |
Autumn 2019
| Date | Speaker | Title | Conference | Download |
| 10.11 | Ruoxu Yang | ORide: APrivacy-PreservingyetAccountableRide-HailingService | USENIX 2017 | PPT |
| Suibin Sun | Business Email Phishing Detection and Characterizing | USENIX 2019 | PPT | |
| 10.18 | Jinlei Li | Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps | USENIX 2019 | PPT |
| Brandon Falk | Data-Intensive Routing in Delay-Tolerant Networks | INFOCOM 2019 | PPT | |
| 10.25 | Yixiao Fei | Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures | USENIX 2020 | PPT |
| Chengyongxiao Wei | Hearst Patterns Revisited: Automatic Hypernym Detection from Large Text Corpora | ACL 2018 | ||
| 11.1 | Peilin Wu | Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning | Okland 2020 | PPT |
| Brandon Falk | VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones | INFOCOM 2019 | ||
| 11.15 | Suibin Sun | Multi-view clusteringand evaluations | PPT | |
| Binhan Xi | Understanding Black-box Predictions via Influence Functions | ICML 2017 | ||
| 11.22 | Lei Zhang | Light Commands: Laser-Based Audio InjectionAttacks on Voice-Controllable Systems | PPT | |
| Lu Yan | ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery | INFOCOM 2019 | ||
| 11.29 | Yichi Zhang | Understanding IOS-based Crowdturfing Through Hidden UI Analysis | USENIX 2019 | PPT |
| Xinyu Wang | Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning | |||
| 12.6 | Zichang Wang | LibreCAN: Automated CAN Message Translator | CCS 2019 | PPT |
| Le Yu | All Your Clicks Belong to Me: Investigating Click Interception on the Web | USENIX 2019 |
Spring 2019
| Date | Speaker | Title | Conference | Download |
| 3.14 | Jinlei Li | Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services | NDSS 2019 | PPT PDF |
| Suibin Sun | Yet Another Text Captcha Solver:A Generative Adversarial Network Based Approach | CCS 2018 | PPT | |
| 3.21 | Peilin Wu | ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android | CCS 2018 | PPT |
| Shaofeng Li | Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks | IEEE S&P 2019 | PPT | |
| 3.28 | Xinyu Wang | ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models | NDSS 2019 | PPT |
| Tong Zhu | MAPS: Scaling Privacy Compliance Analysis to a Million Apps | PoPETs 2019 | PPT | |
| 4.4 | Yan Meng | Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services | NDSS 2019 | PPT |
| Yichi Zhang | Do Android Taint Analysis Tool Keep their Promises? | ESEC/FSE 2018 | PPT | |
| 4.11 | Tong Zhu | Can We Trust the Privacy Policies of Android Apps? | DSN 2016 | PPT |
| Suibin Sun | Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach | CCS 2018 | PPT | |
| 4.18 | Ke Tang | IoTGuard Dynamic Enforcement of Security and Safety Policy in Commodity IoT | NDSS 2019 | PPT |
| Lu Yan | Exploiting Unintended Feature Leakage in Collaborative Learning | IEEE S&P 2018 | PPT | |
| 4.25 | Le Yu | Differential Privacy | PPT | |
| Yichi Zhang | A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through AppleWireless Direct Link (AWDL) | USENIX 2019 | PPT | |
| 5.2 | Chong Xiang | No-Jump-into-Latency in China’s Internet! Toward Last-Mile Hop Count Based IP Geo-localization | IWQoS 2019 | PPT |
| 5.9 | Zichang Wang | Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach | CCS 2018 | PPT |
| Ruoxu Yang | On the Economics of Offline Password Cracking | IEEE S&P 2018 | PPT |