Seminar Schedule

Autumn 2019

Date Speaker Title Conference Download
10.11 Ruoxu Yang ORide: APrivacy-PreservingyetAccountableRide-HailingService USENIX 2017 PPT
Suibin Sun Business Email Phishing Detection and Characterizing USENIX 2019 PPT
10.18 Jinlei Li Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps USENIX 2019 PPT
Brandon Falk Data-Intensive Routing in Delay-Tolerant Networks INFOCOM 2019 PPT
10.25 Yixiao Fei Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures USENIX 2020 PPT
Chengyongxiao Wei Hearst Patterns Revisited: Automatic Hypernym Detection from Large Text Corpora ACL 2018 PDF
11.1 Peilin Wu Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning Okland 2020 PPT
Brandon Falk VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones INFOCOM 2019 PDF
11.15 Suibin Sun Multi-view clustering and evaluations PPT
Binhan Xi Understanding Black-box Predictions via Influence Functions ICML 2017 PDF
11.22 Lei Zhang Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems PPT
Lu Yan ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery INFOCOM 2019 PDF
11.29 Yichi Zhang Understanding IOS-based Crowdturfing Through Hidden UI Analysis USENIX 2019 PPT
Xinyu Wang Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning PDF
12.6 Zichang Wang LibreCAN: Automated CAN Message Translator CCS 2019 PPT
Le Yu All Your Clicks Belong to Me: Investigating Click Interception on the Web USENIX 2019 PDF

Spring 2019

Date Speaker Title Conference Download
3.14 Jinlei Li Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services NDSS 2019 PPT PDF
Suibin Sun Yet Another Text Captcha Solver:A Generative Adversarial Network Based Approach CCS 2018 PPT
3.21 Peilin Wu ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android CCS 2018 PPT
Shaofeng Li Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks IEEE S&P 2019 PPT
3.28 Xinyu Wang ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models NDSS 2019 PPT
Tong Zhu MAPS: Scaling Privacy Compliance Analysis to a Million Apps  PoPETs 2019 PPT
4.4 Yan Meng Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services NDSS 2019 PPT
Yichi Zhang Do Android Taint Analysis Tool Keep their Promises? ESEC/FSE 2018 PPT
4.11 Tong Zhu Can We Trust the Privacy Policies of Android Apps?  DSN 2016 PPT
Suibin Sun Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach CCS 2018 PPT
4.18 Ke Tang IoTGuard Dynamic Enforcement of Security and Safety Policy in Commodity IoT NDSS 2019 PPT
Lu Yan Exploiting Unintended Feature Leakage in Collaborative Learning IEEE S&P 2018 PPT
4.25 Le Yu Differential Privacy PPT
Yichi Zhang A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through AppleWireless Direct Link (AWDL) USENIX 2019 PPT
5.2 Chong Xiang No-Jump-into-Latency in China’s Internet! Toward Last-Mile Hop Count Based IP Geo-localization IWQoS 2019 PPT
5.9 Zichang Wang Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach CCS 2018 PPT
Ruoxu Yang On the Economics of Offline Password Cracking IEEE S&P 2018 PPT