Seminar Schedule


Spring 2021

Date Speaker Title Conference Download
3.12 Le Zhang EarArray: Defending against DolphinAttack via Acoustic Attenuation NDSS 2021 PPT
Haotian Hu A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks CCS 2020 PPT
3.19 Binhan Xi Security Analysis of the Democracy Live Online Voting System USENIX 2021 PPT
3.26 Ruoxu Yang Security of GPS/INS based On-road Location Tracking Systems NDSS 2019 PPT
Suibin Sun DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels CCS 2020 PPT
4.2 Chengyong-xiao Wei PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps NDSS 2021 PPT
4.9 Hui Liu Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile APPs USENIX 2021 PDF
Ya Fang PriSEC: A Privacy Settings Enforcement Controller USENIX 2021 PPT
4.16 Youqun Li Tales of Favicons and Caches: Persistent Tracking in Modern Browsers NDSS 2021 PPT
4.23 Yuxia Zhan Secure Multi User Content Sharing for Augmented Reality Applications USENIX 2019 PPT
5.14 Yan Meng Securing Voice Interface via Ubiquitous Wireless Sensing PPT
5.21 Shaofeng Li Stealthy Backdoors as Compression Artifacts PPT
Tong Zhu Understanding and Detecting International Revenue Share Fraud NDSS 2021 PPT
5.28 Brandon Falk Self-Illusion: A Study on Cognition of Role-Playing in Immersive Virtual Environments PDF
Jiachun Li  Recent Focus in IoT (Internet of Things) PPT
6.4 Le Yu R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions CCS 2020 PPT

Fall 2020

Date Speaker Title Conference Download
9.11 Le Zhang Chaperone: Real-time Locking and Loss Prevention for Smartphones USENIX 2020 PPT
Haotian Hu Towards HTTPS Everywhere on Android: We Are Not There Yet USENIX 2020 PPT
 9.18 Binhan Xi TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applicaitons NDSS 2020 PPT
9.25  Le Yu Sufficient Statistics RAR
Jiachun Li Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems USENIX 2020 PPT
10.9 Youqun Li Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses S&P 2020 PPT
10.16 Shaofeng Li Information Leakage in Embedding Models CCS 2020 PDF
Brandon Falk OcuLock: Exploring Human Visual Systemfor Authentication in Virtual RealityHead-mounted Display NDSS 2021 PDF
10.23 Yan Meng Thwarting Replay Attacks and Their Defects PPT
10.30 Suibin Sun Impersonation-as-a-Service: Characterizing the Emerging Criminal Infrastructure for User Impersonation at Scale CCS 2020 PPT
Ruoxu Yang Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing USENIX 2020 PDF
11.6 Lu Zhou Plug N Pwned : Comprehensive Vulnerability Analysis of OBD II Dongles as A New Over the Air Attack Surface in Automotive IoT USENIX 2020 PDF
11.13 Yichi Zhang Brainstorm Section PDF
Chengyongxiao Wei From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security USENIX 2020 PDF
11.20 Tong Zhu FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities in Pre-Installed Apps in Android Firmware USENIX 2020 PDF
11.27 Hui Liu Adversarial Semantic Collisions EMNLP 2020 PPT

Spring 2020

Date Speaker Title Conference Download
2.14 Lei Zhang Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving CCS 2020 PPT
Yichi Zhang MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps i3w 2020 PDF
2.21 Xinyu Wang Neural Network Inversionin Adversarial Setting via Background Knowledge Alignment CCS 2019 PDF
Chengyongxiao Wei (Un)informed Consent: Studying GDPR Consent Notices in the Field CCS 2019 PPT
2.28 Ke Tang What Are You Searching For? A Remote Keylogging Attack on Search Engine Autocomplete USENIX 2019 PPT
Le Yu Location Privacy Protection in Vehicle-Based Spatial Crowdsourcing via Geo-Indistinguishability ICDCS 2019 PPT
3.6 Shaofeng Li Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning* Okland 2020 PPT
Lu Zhou EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks NDSS2020 PPT
3.13 Suibin Sun Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals NDSS2020 PPT
Tong Zhu FraudDroid: Automated Ad Fraud Detection for Android APP ESEC/FSE 2018 PPT
3.20 Ruoxu Yang All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems USENIX 2018 PPT
Jinlei Li PEEVES: Physical Event Verification in Smart Homes CCS 2019 PPT
4.3 Brandon Falk Novel Encryption Method of GPS Information in Image File Using Format-preserving Encryption  IMIS 2019 PDF
Yixiao Fei Privacy Risks of Securing Machine Learning Models against Adversarial Examples  CCS 2019 PPT
4.10 Jiachun Li PDVocal: Towards Privacy-preserving Parkinson’s Disease Detection using Non-speech Body Sounds Mobicom 2019 PPT
Peilin Wu Beyond Digital Domain: Fooling Deep learning Based Recognition System in Physical World AAAI 2020 PPT
5.1  Shufan Zhang A Brief Tutorial on Sparse Vector Technique PDF
Binhan Xi Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer NDSS 2020 PPT
5.8 Lu Yan ParmeSan: Sanitizer-guided Greybox Fuzzing USENIX 2020 PDF
Haotian Hu Encrypted DNS =⇒ Privacy? A Traffic Analysis Perspective NDSS 2020 PPT
5.22 Jiahao Yu Certified Robustness to Adversarial Examples with Differential Privacy S&P 2019 PPT
Hui Liu Universal Adversarial Training CVPR 2017 PPT
5.29 Ren Zhou Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms USENIX 2019 PPT

Autumn 2019

Date Speaker Title Conference Download
10.11 Ruoxu Yang ORide: APrivacy-PreservingyetAccountableRide-HailingService USENIX 2017 PPT
Suibin Sun Business Email Phishing Detection and Characterizing USENIX 2019 PPT
10.18 Jinlei Li Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps USENIX 2019 PPT
Brandon Falk Data-Intensive Routing in Delay-Tolerant Networks INFOCOM 2019 PPT
10.25 Yixiao Fei Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures USENIX 2020 PPT
Chengyongxiao Wei Hearst Patterns Revisited: Automatic Hypernym Detection from Large Text Corpora ACL 2018 PDF
11.1 Peilin Wu Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning Okland 2020 PPT
Brandon Falk VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones INFOCOM 2019 PDF
11.15 Suibin Sun Multi-view clustering and evaluations PPT
Binhan Xi Understanding Black-box Predictions via Influence Functions ICML 2017 PDF
11.22 Lei Zhang Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems PPT
Lu Yan ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery INFOCOM 2019 PDF
11.29 Yichi Zhang Understanding IOS-based Crowdturfing Through Hidden UI Analysis USENIX 2019 PPT
Xinyu Wang Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning PDF
12.6 Zichang Wang LibreCAN: Automated CAN Message Translator CCS 2019 PPT
Le Yu All Your Clicks Belong to Me: Investigating Click Interception on the Web USENIX 2019 PDF

Spring 2019

Date Speaker Title Conference Download
3.14 Jinlei Li Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services NDSS 2019 PPT PDF
Suibin Sun Yet Another Text Captcha Solver:A Generative Adversarial Network Based Approach CCS 2018 PPT
3.21 Peilin Wu ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android CCS 2018 PPT
Shaofeng Li Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks IEEE S&P 2019 PPT
3.28 Xinyu Wang ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models NDSS 2019 PPT
Tong Zhu MAPS: Scaling Privacy Compliance Analysis to a Million Apps  PoPETs 2019 PPT
4.4 Yan Meng Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services NDSS 2019 PPT
Yichi Zhang Do Android Taint Analysis Tool Keep their Promises? ESEC/FSE 2018 PPT
4.11 Tong Zhu Can We Trust the Privacy Policies of Android Apps?  DSN 2016 PPT
Suibin Sun Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach CCS 2018 PPT
4.18 Ke Tang IoTGuard Dynamic Enforcement of Security and Safety Policy in Commodity IoT NDSS 2019 PPT
Lu Yan Exploiting Unintended Feature Leakage in Collaborative Learning IEEE S&P 2018 PPT
4.25 Le Yu Differential Privacy PPT
Yichi Zhang A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through AppleWireless Direct Link (AWDL) USENIX 2019 PPT
5.2 Chong Xiang No-Jump-into-Latency in China’s Internet! Toward Last-Mile Hop Count Based IP Geo-localization IWQoS 2019 PPT
5.9 Zichang Wang Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach CCS 2018 PPT
Ruoxu Yang On the Economics of Offline Password Cracking IEEE S&P 2018 PPT