Seminar Schedule

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Spring 2020

Date Speaker Title Conference Download
2.14 Lei Zhang Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving CCS 2020 PPT
Yichi Zhang MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps i3w 2020 PDF
2.21 Xinyu Wang Neural Network Inversionin Adversarial Setting via Background Knowledge Alignment CCS 2019 PDF
Chengyongxiao Wei (Un)informed Consent: Studying GDPR Consent Notices in the Field CCS 2019 PPT
2.28 Ke Tang What Are You Searching For? A Remote Keylogging Attack on Search Engine Autocomplete USENIX 2019 PPT
Le Yu Location Privacy Protection in Vehicle-Based Spatial Crowdsourcing via Geo-Indistinguishability ICDCS 2019 PPT
3.6 Shaofeng Li Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning* Okland 2020 PPT
Lu Zhou EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks NDSS2020 PPT
3.13 Suibin Sun Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals NDSS2020 PPT
Tong Zhu FraudDroid: Automated Ad Fraud Detection for Android APP ESEC/FSE 2018 PPT
3.20 Ruoxu Yang All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems USENIX 2018 PPT
Jinlei Li PEEVES: Physical Event Verification in Smart Homes CCS 2019 PPT
4.3 Brandon Falk Novel Encryption Method of GPS Information in Image File Using Format-preserving Encryption  IMIS 2019 PDF
Yixiao Fei Privacy Risks of Securing Machine Learning Models against Adversarial Examples  CCS 2019 PPT
4.10 Jiachun Li PDVocal: Towards Privacy-preserving Parkinson’s Disease Detection using Non-speech Body Sounds Mobicom 2019 PPT
Peilin Wu Beyond Digital Domain: Fooling Deep learning Based Recognition System in Physical World AAAI 2020 PPT
5.1  Shufan Zhang A Brief Tutorial on Sparse Vector Technique PDF
Binhan Xi Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer NDSS 2020 PPT
5.8 Lu Yan ParmeSan: Sanitizer-guided Greybox Fuzzing USENIX 2020 PDF
Tianhao Hu Encrypted DNS =⇒ Privacy? A Traffic Analysis Perspective NDSS 2020 PPT
5.22 Jiahao Yu Certified Robustness to Adversarial Examples with Differential Privacy S&P 2019 PPT
Hui Liu Universal Adversarial Training CVPR 2017 PPT
5.29 Ren Zhou Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms USENIX 2019 PPT

Autumn 2019

Date Speaker Title Conference Download
10.11 Ruoxu Yang ORide: APrivacy-PreservingyetAccountableRide-HailingService USENIX 2017 PPT
Suibin Sun Business Email Phishing Detection and Characterizing USENIX 2019 PPT
10.18 Jinlei Li Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps USENIX 2019 PPT
Brandon Falk Data-Intensive Routing in Delay-Tolerant Networks INFOCOM 2019 PPT
10.25 Yixiao Fei Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures USENIX 2020 PPT
Chengyongxiao Wei Hearst Patterns Revisited: Automatic Hypernym Detection from Large Text Corpora ACL 2018 PDF
11.1 Peilin Wu Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning Okland 2020 PPT
Brandon Falk VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones INFOCOM 2019 PDF
11.15 Suibin Sun Multi-view clustering and evaluations PPT
Binhan Xi Understanding Black-box Predictions via Influence Functions ICML 2017 PDF
11.22 Lei Zhang Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems PPT
Lu Yan ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery INFOCOM 2019 PDF
11.29 Yichi Zhang Understanding IOS-based Crowdturfing Through Hidden UI Analysis USENIX 2019 PPT
Xinyu Wang Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning PDF
12.6 Zichang Wang LibreCAN: Automated CAN Message Translator CCS 2019 PPT
Le Yu All Your Clicks Belong to Me: Investigating Click Interception on the Web USENIX 2019 PDF

Spring 2019

Date Speaker Title Conference Download
3.14 Jinlei Li Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services NDSS 2019 PPT PDF
Suibin Sun Yet Another Text Captcha Solver:A Generative Adversarial Network Based Approach CCS 2018 PPT
3.21 Peilin Wu ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android CCS 2018 PPT
Shaofeng Li Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks IEEE S&P 2019 PPT
3.28 Xinyu Wang ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models NDSS 2019 PPT
Tong Zhu MAPS: Scaling Privacy Compliance Analysis to a Million Apps  PoPETs 2019 PPT
4.4 Yan Meng Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services NDSS 2019 PPT
Yichi Zhang Do Android Taint Analysis Tool Keep their Promises? ESEC/FSE 2018 PPT
4.11 Tong Zhu Can We Trust the Privacy Policies of Android Apps?  DSN 2016 PPT
Suibin Sun Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach CCS 2018 PPT
4.18 Ke Tang IoTGuard Dynamic Enforcement of Security and Safety Policy in Commodity IoT NDSS 2019 PPT
Lu Yan Exploiting Unintended Feature Leakage in Collaborative Learning IEEE S&P 2018 PPT
4.25 Le Yu Differential Privacy PPT
Yichi Zhang A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through AppleWireless Direct Link (AWDL) USENIX 2019 PPT
5.2 Chong Xiang No-Jump-into-Latency in China’s Internet! Toward Last-Mile Hop Count Based IP Geo-localization IWQoS 2019 PPT
5.9 Zichang Wang Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach CCS 2018 PPT
Ruoxu Yang On the Economics of Offline Password Cracking IEEE S&P 2018 PPT