Skip to content

Latest commit

 

History

History
 
 

Seminar2018

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Agenda 2018

Please upload your slides or a introduction (Chinese or English) of your presentation in advance, such as conference, title, abstract,which can be written in the form of markdown. Please add your title in the agenda.

Location: Caoguangbiao-201

Time: 18:00-20:00 Welcome to attend the seminar!

Date Speaker Title
1 2018.1.5 施程辉
唐凯宇
DANCin SEQ2SEQ: Fooling Text Classifiers with Adversarial Text Example Generation
ADVERSARIAL EXAMPLES IN THE PHYSICAL WORLD
2 2018.1.12 徐晓刚
王博
Adversarial Attacks on Neural Network Policies
Meltdown & Spectre
3 2018.1.19 刘沛宇
陈源
Broken Fingers: On the Usage of the Fingerprint API in Android
Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications
4 2018.1.26 卢令令
李长江
BLOCKBENCH: A Framework for Analyzing Private Blockchains
Feature Squeezing:Detecting Adversarial Examples in Deep Neural Networks
5 2018.2.2 杜天宇
李进锋
Trojaning Attack on Neural Networks
Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data
6 2018.2.9
Report
7 2018.2.24 李宇薇
刘倩君
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection(CCS-17).
8 2018.3.2 凌祥
李旭嵘
Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong
WHITENING BLACK-BOX NEURAL NETWORKS
9 2018.3.9 伍一鸣
刘倩君
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations
When coding style survives compilation: de-anonymizing programmers from executable binaries.
10 2018.3.16 翁海琴
贺思睿

Machine Learning Models that Remember Too Much
11 2018.3.23 周骏丰
魏成坤
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection
IKP: Turning a PKI Around with Decentralized Automated Incentives
12 2018.3.30 唐凯宇
吕晨阳
Knock Knock, Who’s There? Membership Inference on Aggregate Location Data
13 2018.4.6 段辅正
陈源
How to Learn Klingon Without Dictionary: Detection and Measurement of Black Keywords Used by Underground Economy
14 2018.4.13 肖特嗣
刘栩威
ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models
Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning
15 2018.4.20 周安妮
付丽嫆
PlatPal: Detecting Malicious Documents with Platform Diversity
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
16 2018.4.27 冯依南
刘丁豪
RELIABLE ATTACKS AGAINST BLACK-BOX MACHINE LEARNING MODEL
Town Crier: An Authenticated Data Feed for Smart Contracts
17 2018.5.4 施程辉
李长江
Spatially Transformed Adversarial Example
18 2018.5.11 No Group meeting
19 2018.5.18 刘沛宇 Prudent Practices for Designing Malware Experiments: Status Quo and Outlook
20 2018.5.25 李宇薇 Angora: Efficient Fuzzing by Principled Search
21 2018.6.1 刘倩君
魏成坤
22 2018.6.8 陈源
吕晨阳

CCS 2017: Directed Greybox Fuzzing
23 2018.6.15 王博
唐凯宇
24 2018.6.22 杜天宇
李进锋
25 2018.6.29 施程辉
贺思睿
A Machine Learning Approach To Prevent Mailcious Calls Over Telephoney Networks
26 2018.7.6 王琴应
宋宇
Spying on the Smart Home Privacy Attacks and Defenses on Encrypted IoT Traffic
27 2018.7.13 黄诤杰
付丽嫆
SMARTPOOL: Practical Decentralized Pooled Mining
28 2018.7.20 吴含露
董剑辉

Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning
29 2018.7.27 伍一鸣
卢令令

CertChain Public and Efficient Certificate Audit Based on Blockchain for TLS Connections
30 2018.8.3 刘沛宇
魏成坤
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps
31 2018.8.10 李长江
李宇薇

SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits (CCS-2017)
32 2018.8.17 翁海琴
王博
33 2018.8.24 施程辉
唐凯宇
34 2018.8.31 吕晨阳
陈源

Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path
35 2018.9.7 王琴应
宋宇
Analysis of Privacy Protections in Fitness Tracking Social Networks
36 2018.9.14 李旭嵘
付丽嫆
Detecting Adversarial Examples through Image Transformation
37 2018.9.21 董剑辉
陈安莹
Learning Universal Adversarial Perturbations with Generative Models
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense
38 2018.9.28 凌祥
黄诤杰
39 2018.10.5 杜天宇
李进锋
With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning
Exact and Consistent Interpretation for Piecewise Linear Neural Networks: A Closed Form Solution
40 2018.10.12 贺思睿
段辅正
41 2018.10.19 刘沛宇
魏成坤
42 2018.10.26 吴含露
翁海琴
43 2018.11.2 卢令令
伍一鸣
usenixsecurity17 Ensuring Authorized Updates in Multi-user Database-Backed Applications
44 2018.11.9 付聪聪
李宇薇
45 2018.11.16 胡思昊
王博
46 2018.11.23 施程辉
李长江
47 2018.11.30 刘倩君
唐嘉蔚
48 2018.12.7 邱鹏宇
徐维亚
49 2018.12.14 吕晨阳
唐凯宇
50 2018.12.21 王琴应
宋宇
51 2018.12.28 吴寒露
张耀
51 2019.1.4 杜天宇
李进锋
52 2019.1.11 应燕芸
马哲
53 2019.1.18 赵彬彬
陈安莹
54 2019.1.25 黄诤杰
陈源