+
+||Date|Speaker|Title|Sharer|
+|---|:---:|:---:|:---:|:---:|
+|1|2026.01.02|章琦||||
+|2|2026.01.09|陈佳豪||||
+|3|2026.01.16|刘家宁||||
+|4|2026.01.23|赵芷茗||||
+|5|2026.01.30|曾睿||||
+|6|2026.02.06|王异鸣||||
+|7|2026.02.13|||||
+|8|2026.02.20|||||
+|9|2026.02.27|张铃沛||||
+|10|2026.03.06|陈曦||||
+|11|2026.03.13|冯周||||
+|12|2026.03.20|丁婉蒙||||
+|13|2026.03.27|贺兴||||
+|14|2026.04.03|李欣迪||||
+|15|2026.04.10|李俊豪||||
+
+## System Security Group Meeting
+**Location**:Cao Guangbiao High-tech Building 201
+
+**Time**: Sunday 18:00
+
+
+
+||Date|Speaker|Title|Sharer|
+|---|:---:|:---:|:---:|:---:|
+|1|2026.01.04|徐博||||
+|2|2026.01.11|江世昊||||
+|3|2026.01.18|王晋文||||
+|4|2026.01.25|张宁瑞||||
+|5|2026.02.01|武旗龙||||
+|6|2026.02.08|黄钢||||
+|7|2026.02.15|||||
+|8|2026.02.22|||||
+|9|2026.03.01|张凌铭||||
+|10|2026.03.08|常博宇||||
diff --git a/Seminar2020/README.md b/Seminar2020/README.md
new file mode 100644
index 0000000..2e3a8c0
--- /dev/null
+++ b/Seminar2020/README.md
@@ -0,0 +1,57 @@
+# Agenda 2020
+Please upload your **slides** or a **introduction (Chinese or English)** of your presentation **in advance**,
+such as **conference, title, abstract**,which can be written in the form of [markdown](http://sspai.com/25137). Please add your title in the agenda.
+
+**Location**: Zetonglou 104 or DingTalk
+
+**Time**: Friday 18:00-20:00 Welcome to attend the seminar!
+
+
+||Date|Speaker|Title|
+|---|:---:|:---:|:---:|
+|1|2020.1.3|李宇薇
刘倩君||
+|2|2020.1.10|卢令令
周俊丰||
+|3|2020.1.17|邱鹏宇
沈鹿嘉||
+|4| 2020.2.28 |唐嘉蔚
应燕芸||
+|5| 2020.3.6 |王琴应
付冲|Burglars’ IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds, IEEE S&P 2020 |
+|6| 2020.3.13 |王赛卓
王博||
+|7| 2020.3.20 |胡思昊
付之笑||
+|8| 2020.3.27 |魏成坤
付丽嫆||
+|9| 2020.4.3 |施程辉
沈鹿嘉||
+|10| 2020.4.10 |方佳
伍一鸣||
+|11| 2020.4.17 |杜天宇
陈安莹|When Malware is Packin’ Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features, NDSS 2020|
+|12|2020.4.24|吴含露
马哲||
+|13|2020.5.1|刘沛宇
张耀||
+|14|2020.5.8|刘丁豪
谢之源||
+|15|2020.5.15|卢令令
邱鹏宇||
+|16|2020.5.22|陈源
沈鹿嘉||
+|17|2020.5.29|应燕芸
唐嘉蔚||
+|18|2020.6.5|付冲
王琴应| BIAS: Bluetooth Impersonation AttackS, IEEE S&P 2020 |
+|19|2020.6.12|付之笑
王赛卓||
+|20|2020.6.19|付丽嫆
王博||
+|21|2020.6.26|方佳
陈安莹|Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning, IEEE S&P 2020|
+|22|2020.7.3|杜天宇
伍一鸣||
+|23|2020.7.10|施程辉
吕晨阳||
+|24|2020.7.17|吴含露
马哲||
+|25|2020.7.24|刘沛宇
张耀||
+|26|2020.7.31|刘丁豪
谢之源||
+|27|2020.8.7|卢令令
邱鹏宇||
+|28|2020.8.14|陈源
陈越尧||
+|29|2020.8.21|唐嘉蔚
应燕芸||
+|30|2020.8.28|付冲
王琴应|High Accuracy and High Fidelity Extraction of Neural Networks, USENIX Security 2020
Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT, USENIX Security 2020|
+|31|2020.9.4|方佳
陈安莹|BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-Program Path Sampling and Per-Path Abstract Interpretation, OOPSLA 2019|
+|32|2020.9.11|付丽嫆
王博|PDiff: Semantic-based Patch Presence Testing for Downstream Kernels, ACM CCS 2020|
+|33|2020.9.18|杜天宇
伍一鸣|Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy, IEEE S&P 2019
Learning to Discriminate Perturbations for Blocking Adversarial Attacks in Text Classification, EMNLP 2019|
+|34|2020.9.25|吴含露
马哲|Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach, ACM CCS 2018
Looking Fast and Slow: Memory-Guided Mobile Video Object Detection, arXiv 2019|
+|35|2020.10.2|施程辉
刘丁豪|Latent Backdoor Attacks on Deep Neural Networks, ACM CCS 2019
Check It Again: Detecting Lacking-Recheck Bugs in OS Kernels, ACM CCS 2018|
+|36|2020.10.9|方佳
沈鹿嘉|Machine Learning for Scent: Learning Generalizable Perceptual Representations of Small Molecules, arXiv 2019
STRIP: A Defence Against Trojan Attacks on Deep Neural Networks, ACSAC 19|
+|37|2020.10.16|||
+|38|2020.10.23|陈源
梁红|Cached and Confused: Web Cache Deception in the Wild, USENIX Security 2020
Not All Coverage Measurements Are Equal:Fuzzing by Coverage Accounting for Input Prioritization, NDSS 2020|
+|39|2020.10.30|邱鹏宇
付丽嫆|Machine Unlearning, IEEE S&P 2021
Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison, NDSS 2020|
+|40|2020.11.6|王博
卢令令|Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems, USENIX Security 2020
GEM^2-Tree: A Gas-Efficient Structure for Authenticated Range Queries in Blockchain, ICDE 2019|
+|41|2020.11.13|马哲
王琴应|An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale, arXiv 2020
Unearthing the TrustedCore: A Critical Review on Huawei’s Trusted Execution Environment, USENIX Security 2020|
+|42|2020.11.20|付冲
张耀|Attack of the Tails: Yes, You Really Can Backdoor Federated Learning, NIPS 2020
With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning, USENIX Security 2018|
+|43|2020.11.27|应燕芸
吴含露|Deep learning of spontaneous arousal fluctuations detects early cholinergic defects across neurodevelopmental mouse models and patients, PNAS 2020
TIMME: Twitter Ideology-detection via Multi-task Multi-relational Embedding, KDD 2020|
+|44|2020.12.4|付之笑
沈鹿嘉|Deepfakes Detection with Automatic Face Weighting, CVPRW 2020
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection, USENIX Security 2021|
+|45|2020.12.11|向意
甘雨由|Targeted Greybox Fuzzing with Static Lookahead Analysis, ICSE 2020
Score-CAM: Score-Weighted Visual Explanations for Convolutional Neural Networks, CVPRW 2020|
+|47|2020.12.18|陈越尧
唐嘉蔚|UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers, USENIX Security 2021
28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics, ACM CCS 2019|
diff --git a/Seminar2021/README.md b/Seminar2021/README.md
new file mode 100644
index 0000000..417f4fe
--- /dev/null
+++ b/Seminar2021/README.md
@@ -0,0 +1,107 @@
+# Agenda 2021
+Please upload your **slides** or a **introduction (Chinese or English)** of your presentation **in advance**,
+such as **conference, title, abstract**,which can be written in the form of [markdown](http://sspai.com/25137). Please add your title in the agenda.
+
+**Location**: Zetonglou 104
+
+**Time**: Friday 18:00-20:00 Welcome to attend the seminar!
+
+
+||Date|Speaker|Title|
+|---|:---:|:---:|:---:|
+|1|2020.12.25|陈安莹
施程辉|CodeCMR: Cross-Modal Retrieval For Function-Level Binary Source Code Matching, NIPS 2020
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks, NIPS 2018|
+|2|2021.1.1|陈源
邱鹏宇|sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart Contracts, ICSE 2020
Practical Traffic Analysis Attacks on Secure Messaging Applications, NDSS 2020|
+|3|2021.1.8|王琴应
应燕芸|APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise, USENIX Security 2020|
+|4|2021.1.15|唐嘉蔚
刘丁豪|The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment, USENIX Security 2020
MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures, USENIX Security 2020|
+|5|2021.1.22|张耀
付冲|Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning, USENIX Security 2020
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models, ACM CCS 2020|
+|6|2021.1.29|马哲
向意|Exploring Simple Siamese Representation Learning, Arxiv 2020
Fuzzing File Systems via Two-Dimensional Input Space Exploration, IEEE S&P 2019|
+|7|2021.2.5|||
+|8|2021.2.12|||
+|9|2021.2.19|付之笑
陈越尧|Multi-modal Transformer for Video Retrieval, ECCV 2020
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation, USENIX Security 2020|
+|10|2021.2.26|||
+|11|2021.3.5|沈鹿嘉
甘雨由|Data Poisoning Attacks to Deep Learning Based Recommender Systems, NDSS 2021
Implicit Semantic Data Augmentation for Deep Networks, NeurIPS 2019|
+|12|2021.3.12|卢令令
谢之源|Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing, ACM CCS 2017
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals, NDSS 2021|
+|13|2021.3.19|邱鹏宇
刘丁豪|Model Watermarking for Image Processing Networks, AAAI 2020
Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code, USENIX Security 2021|
+|14|2021.3.26|马哲
沈鹿嘉|Is Space-Time Attention All You Need for Video Understanding?, arXiv 2021
Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning, NDSS 2021|
+|15|2021.4.2|刘沛宇
梁红|Understanding Worldwide Private Information Collection on Android, NDSS 2021
PANGOLIN: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction, IEEE S&P 2020|
+|16|2021.4.9|张耀
王琴应|CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples, NDSS 2021
Data Privacy in Trigger-Action IoT Systems, IEEE S&P 2021|
+|17|2021.4.16|陈源
梁红|EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts, USENIX Security 2021
Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints, NDSS 2019|
+|18|2021.4.23|应燕芸
付之笑|Deep learning for in vivo near-infrared imaging, PNAS 2021
Multimodal Analytics for Real-world News using Measures of Cross-modal Entity Consistency, ICMR 2020|
+|19|2021.4.30|卢令令
甘雨由|Blockene: A High-throughput Blockchain Over Mobile Devices, OSDI 2020
Towards Efficient Visual Explanation of Black-Box Neural Network, PREVIEW|
+|20|2021.5.7|陈越尧
唐嘉蔚|Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning, NDSS 2021
Evade Deep Image Retrieval by Stashing Private Images in the Hash Space, CVPR 2020|
+|21|2021.5.14|施程辉
付冲|Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment, ACM CCS 2019
Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features, ACM CCS 2020|
+|22|2021.5.21|马哲
向意|Video Corpus Moment Retrieval with Contrastive Learning, SIGIR 2021
SAVIOR: Towards Bug-Driven Hybrid Testing, IEEE S&P 2020|
+|23|2021.5.28|邱鹏宇
刘丁豪|DeepDyve: Dynamic Verification for Deep Neural Networks, ACM CCS 2020
On the Feasibility of Stealthily Introducing Vulnerabilities in Open-Source Software via Hypocrite Commits|
+|24|2021.6.4|段宇萱
叶童|
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels, ACM CCS 2020|
+|25|2021.6.11|刘丁豪
沈鹿嘉|Understanding and Detecting Disordered Error Handling with Precise Function Pairing, USENIX Security 2021
Poisoning the Unlabeled Dataset of Semi-Supervised Learning, arXiv 2021|
+|26|2021.6.18|付冲
侯黎阳|You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion, USENIX Security 2021
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback, ACM CCS 2020|
+|27|2021.6.25|虞楚尔
段宇萱|PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking, USENIX Security 2021
WaveGuard: Understanding and Mitigating Audio Adversarial Examples, USENIX Security 2021|
+|28|2021.7.2|梁红
向意|SLIME: Program-sensitive Energy Allocation for Fuzzing
HFL: Hybrid Fuzzing on the Linux Kernel, NDSS 2020|
+|29|2021.7.9|马哲
陈越尧|WenLan: Bridging Vision and Language by Large-Scale Multi-Modal Pre-Training, arXiv 2021
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization, NDSS 2020|
+|30|2021.7.16|陈源
张耀|WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning, NDSS 2021
Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding, IEEE S&P 2021|
+|31|2021.7.23|甘雨由
付之笑|Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers, USENIX Security 2021
Face Forensics in the Wild, CVPR 2021|
+|32|2021.7.30|邱鹏宇
卢令令|Improving Password Guessing via Representation Learning, IEEE S&P 2021
iQuery: Towards Trustworthy, Scalable Accountability for Blockchain-based IoT Payment System|
+|33|2021.8.6|梁红
陈安莹|TCP-Fuzz: Detecting Memory and Semantic Bugs in TCP Stacks with Fuzzing, USENIX ATC 2021
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary, IEEE S&P 2021|
+|34|2021.8.13|许嘉诚
侯黎阳|Automated Conformance Testing for JavaScript Engines via Deep Compiler Fuzzing, PLDI 2021
Industry Practice of Coverage-Guided Enterprise-Level DBMS Fuzzing, ICSE 2021|
+|35|2021.8.20|虞楚尔
段宇萱|Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision, IEEE S&P 2021
Demodalizing Face Recognition with Synthetic Samples, AAAI 2021|
+|36|2021.8.27|陈源
付之笑|Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage, NDSS 2021
Multi-attentional Deepfake Detection, CVPR 2021|
+|37|2021.9.3|张耀
付丽嫆|Extracting Training Data from Large Language Models, USENIX Security 2021
“It’s the Company, the Government, You and I”: User Perceptions of Responsibility for Smart Home Privacy and Security, USENIX Security 2021|
+|38|2021.9.10|施程辉
唐嘉蔚|Leakage of Dataset Properties in Multi-Party Machine Learning, USENIX Security 2021
Adversarial Examples for Hamming Space Search, IEEE Trans 2020|
+|39|2021.9.17|卢令令
付冲|Dynamic Authenticated Index Structures for Outsourced Databases, SIGMOD 2006
Blind Backdoors in Deep Learning Models, arXiv 2020|
+|40|2021.9.24|沈鹿嘉
向意|Systematic Evaluation of Privacy Risks of Machine Learning Models, USENIX Security 2021
Constraint-guided Directed Greybox Fuzzing, USENIX Security 2021|
+|41|2021.10.1|邱鹏宇
刘丁豪|Subpopulation Data Poisoning Attacks, arXiv 2020
Static Detection of Unsafe DMA Accesses in Device Drivers, USENIX Security 2021|
+|42|2021.10.8|马哲
王琴应|Not All Unlabeled Data are Equal: Learning to Weight Data in Semi-supervised Learning, NIPS 2020
SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems, IEEE S&P 2020|
+|43|2021.10.15|梁红
陈安莹|Krace: Data Race Fuzzing for Kernel File Systems, IEEE S&P 2020
Supply-Chain Vulnerability Elimination via Active Learning & Regeneration, ACM CCS 2021|
+|44|2021.10.22|甘雨由
付丽嫆|Seek-and-Hide: Adversarial Steganography via Deep Reinforcement Learning, TPAMI 2021
NA|
+
+## AI Security Group Meeting
+**Location**:Zetonglou 104
+
+**Time**: Friday 18:00
+
+
+
+||Date|Speaker|Title|Sharer|
+|---|:---:|:---:|:---:|:---:|
+|45|2021.10.29|付之笑|Spatiotemporal Inconsistency Learning for DeepFake Video Detection, ACM MM 2021|何平&付冲|
+|46|2021.11.05|甘雨由|Entangled Watermarks as a Defense against Model Extraction, USENIX Security 2021|何平|
+|47|2021.11.12|包晗|ID-Reveal: Identity-aware DeepFake Video Detection, ICCV 2021|付冲|
+|48|2021.11.19|虞楚尔||甘雨由|
+|49|2021.11.26|杜杨凯||麻瓯博|
+|50|2021.12.03|段宇萱||高向珊|
+|51|2021.12.10|白熠阳||林瑞潇|
+|52|2021.12.17|沈鹿嘉||施程辉|
+|53|2021.12.24|李泽宇||唐嘉蔚|
+|54|2021.12.31|马哲||付之笑|
+
+
+
+
+## System Security Group Meeting
+**Location**:Zetonglou 104
+
+**Time**: Sunday 18:00
+
+
+
+||Date|Speaker|Title|Sharer|
+|---|:---:|:---:|:---:|:---:|
+|45|2021.10.31|叶童|A Lightweight Framework for Function Name Reassignment Based on Larege-Scale Stripped Binaries, ISSTA 2021|许嘉诚|
+|46|2021.11.07|陈源|NA|向意|
+|47|2021.11.14|侯黎阳|Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference, ACM CCS 2021|刘丁豪|
+|48|2021.11.21|卢令令|Bitcoin: A Peer-to-Peer Electronic Cash System, 2008|刘沛宇|
+|49|2021.11.28|王琴应|SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning, USENIX Security 2021|夏亦凡|
+|50|2021.12.05|常博宇|ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems, USENIX Security 2021|刘昕鹏|
+|51|2021.12.12|潘高宁|HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs, ACM CCS 2021|梁红|
+|52|2021.12.19|张凌铭|Directed Grey-Box Fuzzing with Provable Path Pruning, IEEE S&P 2022|常博宇|
+|53|2021.12.26|夏亦凡|The Use of Likely Invariants as Feedback for Fuzzers, USENIX Security 2021|侯黎阳|
+
+
+
+
diff --git a/Seminar2022/README.md b/Seminar2022/README.md
new file mode 100644
index 0000000..edf9fa4
--- /dev/null
+++ b/Seminar2022/README.md
@@ -0,0 +1,151 @@
+
+
+# Agenda 2022
+Please upload your **slides** or a **introduction (Chinese or English)** of your presentation **in advance**,
+such as **conference, title, abstract**,which can be written in the form of [markdown](http://sspai.com/25137). Please add your title in the agenda.
+
+
+## AI Security Group Meeting
+**Location**:Zetonglou 104
+
+**Time**: Friday 18:00
+
+
+
+||Date|Speaker|Title|Sharer|
+|---|:---:|:---:|:---:|:---:|
+|1|2021.12.24||||
+|2|2021.12.31|马哲|Learning Segment Similarity and Alignment in Large-Scale Content Based Video Retrieval, MM 2021|付之笑|
+|3|2022.01.07|麻瓯勃|Robust Deep Reinforcement Learning against Adversarial Perturbations on State Observations, arXiv 2020|杜林康|
+|4|2022.01.14|何平|HopSkipJumpAttack: A Query-Efficient Decision-Based Attack, IEEE S&P 2020|包晗|
+|5|2022.01.21|白熠阳|Defense Against Synonym Substitution-based Adversarial Attack via Dirichlet Neighborhood Ensemble, ACL 2021|沈鹿嘉|
+|6|2022.02.11|高向珊|An Empirical Study of Example Forgetting during Deep Neural Network Learning, ICLR 2019|杜杨凯|
+|7|2022.02.18|林瑞潇|Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning, IEEE S&P 2021|甘雨由|
+|8|2022.02.25|何平|Bad Characters: Imperceptible NLP Attacks, IEEE S&P 2022|李泽宇|
+|9|2022.03.04|姜毅|BERT-Attack: Adversarial Attack Against BERT Using BERT, EMNLP 2020|邱鹏宇|
+|10|2022.03.11|甘雨由|/|段宇萱|
+|11|2022.03.18|谢廷浩|Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks, arXiv 2021|马哲|
+|12|2022.03.25|付之笑|SelfReg: Self-supervised Contrastive Regularization for Domain Generalization, ICCV 2021|曾睿|
+|13|2022.04.01|林瑞潇|Hierarchical Personalized Federated Learning for User Modeling, WWW 2021|谢廷浩|
+|14|2022.04.08|邱鹏宇|DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems, USENIX Security 2022|付冲|
+|15|2022.04.15|杜杨凯|Contrastive Code Representation Learning, EMNLP 2021|麻瓯勃|
+|16|2022.04.22|包晗|Pose-Controllable Talking Face Generation by Implicitly Modularized Audio-Visual Representation, CVPR 2021|白熠阳|
+|17|2022.04.29|李泽宇|MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation, CVPR 2021|姜毅|
+|18|2022.05.06|沈鹿嘉|PICCOLO : Exposing Complex Backdoors in NLP Transformer Models, IEEE S&P 2022|姜毅|
+|19|2022.05.13|段宇萱|Protecting Celebrities from DeepFake with Identity Consistency Transformer, CVPR 2022|何平|
+|20|2022.05.20|付冲|Pass off Fish Eyes for Pearls: Attacking Model Selection of Pre-trained Models, ACL 2022|邱鹏宇|
+|21|2022.05.27|姜毅|Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs, USENIX Security 2021|甘雨由|
+|22|2022.06.03|马哲|Barlow Twins: Self-Supervised Learning via Redundancy Reduction, ICML 2021|付之笑|
+|23|2022.06.10|麻瓯勃|Adversarial Policy Learning in Two-player Competitive Games, ICML 2021|林瑞潇|
+|24|2022.06.17|虞楚尔|Detecting Deepfakes with Self-Blended Images, CVPR 2022|李泽宇|
+|25|2022.06.24|甘雨由||沈鹿嘉|
+|26|2022.07.01|付之笑|Few-Shot Head Swapping in the Wild, CVPR 2022|包晗|
+|27|2022.07.08|何平|Anti-Backdoor Learning: Training Clean Models on Poisoned Data, NeurIPS 2021|杜杨凯|
+|28|2022.07.15|姜毅|Differentiable Prompt Makes Pre-trained Language Models Better Few-shot Learners! , ICLR 2022|付冲|
+|29|2022.07.22|林瑞潇|CAFE: Catastrophic Data Leakage in Vertical Federated Learning, NeurIPS 2021|马哲|
+|30|2022.07.29|李泽宇|Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations, CVPR 2022|麻瓯勃|
+|31|2022.08.05|邱鹏宇|Inference Attacks Against Graph Neural Networks, USENIX Security 2022|甘雨由|
+|32|2022.08.12|包晗|DeepFake Disrupter: The Detector of DeepFake Is My Friend, CVPR 2022|白熠阳|
+|33|2022.08.19|沈鹿嘉|Get a Model! Model Hijacking Attack Against Machine Learning Models, NDSS 2022|付之笑|
+|34|2022.08.26|杜杨凯|Fantastically Ordered Prompts and Where to Find Them: Overcoming Few-Shot Prompt Order Sensitivity, ACL 2022|何平|
+|35|2022.09.02|麻瓯勃|Deep Reinforcement Learning That Matters, AAAI 2018|付冲|
+|36|2022.09.09|甘雨由||林瑞潇|
+|37|2022.09.16||||
+|38|2022.09.23|马哲|A Self-Supervised Descriptor for Image Copy Detection, CVPR 2022|姜毅|
+|39|2022.09.30|何平|CADE: Detecting and Explaining Concept Drift Samples for Security Applications, USENIX Security 2021|邱鹏宇|
+|40|2022.10.07|付之笑|On sensitivity of meta-learning to support data, NIPS 2021|包晗|
+|41|2022.10.14|李泽宇||沈鹿嘉|
+|42|2022.10.21|付冲|PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in Contrastive Learning|甘雨由|
+|43|2022.10.28|林瑞潇||麻瓯勃|
+|44|2022.11.04|陈佳豪||白熠阳|
+|45|2022.11.11|丁卓远||何平|
+|46|2022.11.18|柴欣怡||杜杨凯|
+|47|2022.11.25|沈志强||马哲|
+|48|2022.12.02|姜毅||李泽宇|
+|49|2022.12.09|包晗||邱鹏宇|
+|50|2022.12.16|甘雨由||林瑞潇|
+|51|2022.12.23|麻瓯勃||陈佳豪|
+
+
+
+
+
+
+## System Security Group Meeting
+**Location**:Zetonglou 104
+
+**Time**: Sunday 18:00
+
+
+
+
+||Date|Speaker|Title|Sharer|
+|---|:---:|:---:|:---:|:---:|
+|1|2021.12.26|夏亦凡|BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning, IEEE S&P 2022|侯黎阳|
+|2|2022.01.02|许嘉诚|HEALER: Relation Learning Guided Kernel Fuzzing, SOSP 2021|卢令令|
+|3|2022.01.09|叶童|Retrieval-Augmented Generation for Code Summarization via Hybrid GNN, ICLR 2021|陈安莹|
+|4|2022.01.16|刘昕鹏|DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices, IEEE S&P 2021|张凌铭|
+|5|2022.01.23|夏亦凡|Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing, USENIX Security 2021|潘高宁|
+|6|2022.02.13|常博宇|μAFL: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware, ICSE 2022|陈源|
+|7|2022.02.20|向意|ParmeSan: Sanitizer-guided Greybox Fuzzing, USENIX Security 2020|许嘉诚|
+|8|2022.02.27|刘丁豪|Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking, USENIX Security 2021|刘昕鹏|
+|9|2022.03.06|张凌铭|Regression Greybox Fuzzing, ACM CCS 2021|夏亦凡|
+|10|2022.03.13|梁红|SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel, USENIX Security 2022|常博宇|
+|11|2022.03.20|许嘉诚|Demystifying the Dependency Challenge in Kernel Fuzzing, ICSE 2022|王琴应|
+|12|2022.03.27|侯黎阳|ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing, ACSAC 2021|向意|
+|13|2022.04.03|夏亦凡|Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators, NDSS 2022|梁红|
+|14|2022.04.10|刘昕鹏|PATA: Fuzzing with Path Aware Taint Analysis, IEEE S&P 2022|刘丁豪|
+|15|2022.04.17|陈源|As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service, NDSS 2022|许嘉诚|
+|16|2022.04.24|叶童|Retrieval-based neural source code summarization, ICSE 2020|陈安莹|
+|17|2022.05.01|常博宇|Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis, IEEE S&P 2022|张凌铭|
+|18|2022.05.08|刘丁豪|Undo Workarounds for Kernel Bugs, USENIX Security 2021|陈源|
+|19|2022.05.15|王琴应|FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware, NDSS 2022|吕晨阳|
+|20|2022.05.22|陈安莹|Scalable Validation of Binary Lifters, PLDI 2020|向意|
+|21|2022.05.29|梁红|MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing, NDSS 2022||
+|22|2022.06.05|卢令令|ImageProof: Enabling Authentication for Large-Scale Image Retrieval, ICDE 2019|刘昕鹏|
+|23|2022.06.12|张凌铭|InstruGuard: Find and Fix Instrumentation Errors for Coverage-based Greybox Fuzzing, ASE 2021|夏亦凡|
+|24|2022.06.19|向意|WindRanger: A Directed Greybox Fuzzer driven by Deviation Basic Blocks, ICSE 2022|常博宇|
+|25|2022.06.26|许嘉诚|SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers, ACM CCS 2021|王琴应|
+|26|2022.07.03|刘丁豪|Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs, USENIX Security 2021|陈安莹|
+|27|2022.07.10|刘昕鹏|Capture: Centralized Library Management for Heterogeneous IoT Devices, USENIX Security 2021|侯黎阳|
+|28|2022.07.17|陈源|Broken Metre: Attacking Resource Metering in EVM, NDSS 2020|刘沛宇|
+|29|2022.07.24|常博宇|JIGSAW: Efficient and Scalable Path Constraints Fuzzing, IEEE S&P 2022|梁红|
+|30|2022.07.31||||
+|31|2022.08.07|向意|VulScope: Facilitating Vulnerability Assessment through PoC, ACM CCS 2021|张凌铭|
+|32|2022.08.14|夏亦凡|Program Vulnerability Repair via Inductive Inference, ISSTA 2022|许嘉诚|
+|33|2022.08.21|王琴应|FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks, IEEE S&P 2022|刘丁豪|
+|34|2022.08.28|潘高宁|MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar Inference, USENIX Security 2022|陈源|
+|35|2022.09.04|侯黎阳|Vulnerability Detection of ICS Protocols Via Cross-State Fuzzing, EMSOFT 2022|常博宇|
+|36|2022.09.11|梁红|SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis, USENIX Security 2022|刘昕鹏|
+|37|2022.09.18|张凌铭|FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing, USENIX Security 2022|向意|
+|38|2022.09.25|刘丁豪|UBITect: A Precise and Scalable Method to Detect Use-before-Initialization Bugs in Linux Kernel, FSE 2022|夏亦凡|
+|39|2022.10.02|陈源|eTainter: detecting gas-related vulnerabilities in smart contracts, ISSTA 2022|许嘉诚|
+|40|2022.10.09|常博宇|Exploit the Last Straw That Breaks Android Systems, IEEE S&P 2022|王琴应|
+|41|2022.10.16|刘昕鹏|SnapFuzz:An Efficient Fuzzing Framework for Network Applications, ISSTA 2022|张凌铭|
+|42|2022.10.23|向意|MC2: Rigorous and Efficient Directed Greybox Fuzzing, ACM CCS 2022|侯黎阳|
+|43|2022.10.30|武昊天|One Fuzzing Strategy to Rule Them All, ICSE 2022|梁红|
+|44|2022.11.06|许嘉诚|StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing, USENIX Security 2022|刘丁豪|
+|45|2022.11.13|夏亦凡|Tracer: Signature-based Static Analysis for Detecting Recurring Vulnerabilities, ACM CCS 2022|陈源|
+|46|2022.11.20|王琴应|NCScope: Hardware-Assisted Analyzer for Native Code in Android Apps, ISSTA 2022|常博宇|
+|47|2022.11.27|张凌铭||刘昕鹏|
+|48|2022.12.04|梁红||向意|
+|49|2022.12.11|刘丁豪||武昊天|
+|50|2022.12.18|陈源||许嘉诚|
+|51|2022.12.25|常博宇||夏亦凡|
+
+
+
+
+
+
+
+
diff --git a/Seminar2023/README.md b/Seminar2023/README.md
new file mode 100644
index 0000000..1eb2f05
--- /dev/null
+++ b/Seminar2023/README.md
@@ -0,0 +1,156 @@
+
+
+# Agenda 2023
+Please upload your **slides** or a **introduction (Chinese or English)** of your presentation **in advance**,
+such as **conference, title, abstract**,which can be written in the form of [markdown](http://sspai.com/25137). Please add your title in the agenda.
+
+
+## AI Security Group Meeting
+**Location**:Zetonglou 104
+
+**Time**: Friday 18:00
+
+
+
+||Date|Speaker|Title|Sharer|
+|---|:---:|:---:|:---:|:---:|
+|1|2022.12.16|甘雨由||林瑞潇|
+|2|2022.12.23|麻瓯勃||陈佳豪|
+|3|2022.12.30|何平||丁卓远|
+|4|2023.01.06|白熠阳||柴欣怡|
+|5|2023.01.13||||
+|6|2023.01.20||||
+|7|2023.01.27||||
+|8|2023.02.03|杜杨凯||付冲|
+|9|2023.02.10|沈鹿嘉||沈志强|
+|10|2023.02.17|马哲||姜毅|
+|11|2023.02.24|李泽宇||包晗|
+|12|2023.03.03|邱鹏宇||甘雨由|
+|13|2023.03.10|林瑞潇||麻瓯勃|
+|14|2023.03.17|陈佳豪||何平|
+|15|2023.03.24||||
+|16|2023.03.31|丁卓远||白熠阳|
+|17|2023.04.07|柴欣怡||杜杨凯|
+|18|2023.04.14|沈志强||沈鹿嘉|
+|19|2023.04.21|姜毅||李泽宇|
+|20|2023.04.28|付冲||马哲|
+|21|2023.05.05|包晗||施程辉|
+|22|2023.05.12|甘雨由||何平|
+|23|2023.05.19|麻瓯勃||丁卓远|
+|24|2023.05.26|杜杨凯||柴欣怡|
+|25|2023.06.02|沈鹿嘉||沈志强|
+|26|2023.06.09|白熠阳||姜毅|
+|27|2023.06.16|李泽宇||付冲|
+|28|2023.06.23|马哲||包晗|
+|29|2023.06.30|陈佳豪||付冲|
+|30|2023.07.07|麻瓯勃||沈鹿嘉|
+|31|2023.07.14|马哲||白熠阳|
+|32|2023.07.21|姜毅||曾睿|
+|33|2023.07.28|甘雨由||杜杨凯|
+|34|2023.08.04|李欣迪||李泽宇|
+|35|2023.08.11|柴欣怡||马哲|
+|36|2023.08.18|丁卓远||陈佳豪|
+|37|2023.08.25|王异鸣||包晗|
+|38|2023.09.01|陈曦||麻瓯勃|
+|39|2023.09.08|沈志强||姜毅|
+|40|2023.09.15|李秦峰||林瑞潇|
+|41|2023.09.22|||何平|
+|42|2023.09.29|曾睿|||
+|43|2023.10.06|王异鸣|||
+|44|2023.10.13|潘淼|||
+|45|2023.10.20|柴欣怡|||
+|46|2023.10.27|丁卓远|||
+|47|2023.11.03|陈佳豪|||
+|48|2023.11.10|包云泰||
+|49|2023.11.17|李欣迪|||
+|50|2023.11.24|林瑞潇|||
+|51|2023.12.01|杜梦瑶|||
+|52|2023.12.08|冯周|||
+|53|2023.12.15|包晗|||
+|54|2023.12.22|丁卓远|||
+|55|2023.12.29|曾睿|||
+
+
+
+
+
+
+## System Security Group Meeting
+**Location**:Zetonglou 104
+
+**Time**: Sunday 18:00
+
+
+
+||Date|Speaker|Title|Sharer|
+|---|:---:|:---:|:---:|:---:|
+|1|2022.12.18|陈源||许嘉诚|
+|2|2022.12.25|常博宇||夏亦凡|
+|3|2023.01.01|刘昕鹏||张凌铭|
+|4|2023.01.08|向意||潘高宁|
+|5|2023.01.15||||
+|6|2023.01.22||||
+|7|2023.01.29||||
+|8|2023.02.05|||刘丁豪|
+|9|2023.02.12|武昊天||梁红|
+|10|2023.02.19|许嘉诚||陈源|
+|11|2023.02.26|常博宇||刘昕鹏|
+|12|2023.03.05|夏亦凡||向意|
+|13|2023.03.12|张凌铭||武昊天|
+|14|2023.03.19|刘丁豪||许嘉诚|
+|15|2023.03.26|陈源||常博宇|
+|16|2023.04.02|刘昕鹏||梁红|
+|17|2023.04.09|||
+|18|2023.04.16|向意||夏亦凡|
+|19|2023.04.23|武昊天||张凌铭|
+|20|2023.04.30|许嘉诚||刘丁豪|
+|21|2023.05.07|常博宇||陈源|
+|22|2023.05.14|梁红||刘昕鹏|
+|23|2023.05.21|夏亦凡||向意|
+|24|2023.05.28|张凌铭||武昊天|
+|25|2023.06.04|梁红||许嘉诚|
+|26|2023.06.11|陈源||常博宇|
+|27|2023.06.18|刘昕鹏||梁红|
+|28|2023.06.25|武昊天||夏亦凡|
+|29|2023.07.02|侯黎阳||许嘉诚|
+|30|2023.07.09|刘昕鹏||张凌铭|
+|31|2023.07.16|肖潇||常博宇|
+|32|2023.07.23|夏亦凡||武昊天|
+|33|2023.07.30|梁红||陈源|
+|34|2023.08.06|夏亦凡|||
+|35|2023.08.13|杨禹||武昊天|
+|36|2023.08.20|肖潇||向意|
+|37|2023.08.27|朱烜辰||许嘉诚|
+|38|2023.09.03|张凌铭||刘昕鹏|
+|39|2023.09.10|常博宇||李秉政|
+|40|2023.09.17|陈源||夏亦凡|
+|41|2023.09.24|许嘉诚||肖潇|
+|42|2023.10.01|向意||刘丁豪|
+|43|2023.10.08|杨禹|||
+|44|2023.10.15|侯黎阳|||
+|45|2023.10.22|武昊天|||
+|46|2023.10.29|梁红|||
+|47|2023.11.05|李秉政|||
+|48|2023.11.12|张凌铭|||
+|49|2023.11.19|肖潇|||
+|50|2023.11.26|江世昊|||
+|51|2023.12.03|祝遥|||
+|52|2023.12.10|杨禹|||
+|53|2023.12.17|常博宇|||
+|54|2023.12.24|夏亦凡|||
+|55|2023.12.31|刘昕鹏|||
+
+
+
+
+
+
diff --git a/Seminar2024/README.md b/Seminar2024/README.md
new file mode 100644
index 0000000..9ac9c47
--- /dev/null
+++ b/Seminar2024/README.md
@@ -0,0 +1,151 @@
+
+
+# Agenda 2024
+Please upload your **slides** or a **introduction (Chinese or English)** of your presentation **in advance**,
+such as **conference, title, abstract**,which can be written in the form of [markdown](http://sspai.com/25137). Please add your title in the agenda.
+
+
+## AI Security Group Meeting
+**Location**:Cao Guangbiao High-tech Building 201
+
+**Time**: Friday 18:00
+
+
+
+||Date|Speaker|Title|Sharer|
+|---|:---:|:---:|:---:|:---:|
+|1|2024.01.05|马哲|||
+|2|2024.01.12|赵芷茗|||
+|3|2024.01.19|杜扬恺|||
+|4|2024.01.26|李泽宇|||
+|5|2024.02.02|包晗|||
+|6|2024.02.09||||
+|7|2024.02.16||||
+|8|2024.02.23|姜毅|||
+|6|2024.03.01|何平|||
+|7|2024.03.08|麻瓯勃|||
+|8|2024.03.15|曾睿|||
+|9|2024.03.22|杨勇|||
+|10|2024.03.29|沈志强|||
+|11|2024.04.05|李秦峰|||
+|12|2024.04.12|王异鸣|||
+|13|2024.04.19|赵芷茗|||
+|14|2024.04.26|陈曦|||
+|15|2024.05.03|贺兴|||
+|16|2024.05.10|朱烜辰|||
+|17|2024.05.17|张余程|||
+|18|2024.05.24|潘淼|||
+|19|2024.05.31|杨勇|||
+|20|2024.06.07|曾睿|||
+|21|2024.06.14|马哲|||
+|22|2024.06.21|何平|||
+|23|2024.06.28|麻瓯勃|||
+|24|2024.07.05|李欣迪|||
+|25|2024.07.12|赵芷茗|||
+|26|2024.07.19|姜毅|||
+|27|2024.07.26|林瑞潇|||
+|28|2024.08.02|包云泰|||
+|29|2024.08.09|朱烜辰|||
+|30|2024.08.16|冯周|||
+|31|2024.08.23|李秦峰|||
+|32|2024.08.30|王异鸣|||
+|33|2024.09.06|张童|||
+|34|2024.09.13|甘雨由|||
+|35|2024.09.20|贺兴|||
+|36|2024.09.27|陈曦|||
+|37|2024.10.04|李欣迪|||
+|38|2024.10.11|陈佳豪|||
+|39|2024.10.18|林瑞潇|||
+|40|2024.10.25|周豪杰|||
+|41|2024.11.01|冯周|||
+|42|2024.11.08|包晗|||
+|43|2024.11.15|杨勇|||
+|44|2024.11.22|姜毅|||
+|45|2024.11.29|刘家宁|||
+|46|2024.12.06|麻瓯勃|||
+|47|2024.12.13|马哲|||
+|48|2024.12.20|张铃沛|||
+|49|2024.12.27|张童|||
+
+
+
+
+
+## System Security Group Meeting
+**Location**:Cao Guangbiao High-tech Building 201
+
+**Time**: Sunday 18:00
+
+
+
+||Date|Speaker|Title|Sharer|
+|---|:---:|:---:|:---:|:---:|
+|1|2024.01.07|张乔|||
+|2|2024.01.14|江世昊|||
+|3|2024.01.21|祝遥|||
+|4|2024.01.28|肖潇|||
+|5|2024.02.04|杨禹|||
+|6|2024.02.11||||
+|7|2024.02.18||||
+|8|2024.02.25|武昊天|||
+|6|2024.03.03|张凌铭|||
+|7|2024.03.10|刘昕鹏|||
+|8|2024.03.17|李秉政|||
+|9|2024.03.24|江世昊|||
+|10|2024.03.31|林型双|||
+|11|2024.04.07|侯黎阳|||
+|12|2024.04.14|张乔|||
+|13|2024.04.21|杨禹|||
+|14|2024.04.28|梁红|||
+|15|2024.05.05|许嘉诚|||
+|16|2024.05.12|肖潇|||
+|17|2024.05.19|祝遥|||
+|18|2024.05.26|常博宇|||
+|19|2024.06.02|夏亦凡|||
+|20|2024.06.09|张凌铭|||
+|21|2024.06.16|刘昕鹏|||
+|22|2024.06.23|武昊天|||
+|23|2024.06.30|杨禹|||
+|24|2024.07.07|林型双|||
+|25|2024.07.14|江世昊|||
+|26|2024.07.21|梁红|||
+|27|2024.07.28|李秉政|||
+|28|2024.08.04|肖潇|||
+|29|2024.08.11|常博宇|||
+|30|2024.08.18|刘昕鹏|||
+|31|2024.08.25|林型双|||
+|32|2024.09.01|夏亦凡|||
+|33|2024.09.08|祝遥|||
+|34|2024.09.15|张凌铭|||
+|35|2024.09.22|杨禹|||
+|36|2024.09.29|刘昕鹏|||
+|37|2024.10.06|江世昊|||
+|38|2024.10.13|常博宇|||
+|39|2024.10.20|夏亦凡|||
+|40|2024.10.27|林型双|||
+|41|2024.11.03|江世昊|||
+|42|2024.11.10|黄钢|||
+|43|2024.11.17|张凌铭|||
+|44|2024.11.24|祝遥|||
+|45|2024.12.01|李秉政|||
+|46|2024.12.08|刘昕鹏|||
+|47|2024.12.15|林型双|||
+|48|2024.12.22|杨禹|||
+|49|2024.12.29|常博宇|||
+
+
+
+
+
+
+
+
diff --git a/Seminar2025/README.md b/Seminar2025/README.md
new file mode 100644
index 0000000..e9bcf8b
--- /dev/null
+++ b/Seminar2025/README.md
@@ -0,0 +1,129 @@
+# Agenda 2025
+Please upload your **slides** or a **introduction (Chinese or English)** of your presentation **in advance**,
+such as **conference, title, abstract**,which can be written in the form of [markdown](http://sspai.com/25137). Please add your title in the agenda.
+
+
+## AI Security Group Meeting
+**Location**:Cao Guangbiao High-tech Building 201
+
+**Time**: Friday 18:00
+
+
+
+||Date|Speaker|Title|Publication|
+|---|:---:|:---:|:---:|:---:|
+|1|2025.01.03|曾睿|BAIT: Large Language Model Backdoor Scanning by Inverting Attack Target|IEEE S&P 2025|
+|2|2025.01.10|赵芷茗|Emulated Disalignment: Safety Alignment for Large Language Models May Backfire!|ACL 2024|
+|3|2025.01.17||||
+|4|2025.01.24||||
+|5|2025.01.31||||
+|6|2025.02.07||||
+|7|2025.02.14||||
+|8|2025.02.21|冯周|Towards Backdoor Stealthiness in Model Parameter Space|Preprint 2025|
+|9|2025.02.28|甘雨由|Systematic review of the development of open-source multimodal large language models|-|
+|10|2025.03.07|王异鸣|Rethinking the Invisible Protection against Unauthorized Image Usage in Stable Diffusion|Usenix Security 2024|
+|11|2025.03.14|李欣迪|Stealthy Backdoor Attack in Self-Supervised Learning Vision Encoders for Large Vision Language Models|CVPR 2025|
+|12|2025.03.21|陈曦|Deliberative Alignment Reasoning Enables Safer Language Models|OpenAI|
+|13|2025.03.28|贺兴|DIAGNOSIS: Detecting Unauthorized Data Usages in Text-to-Image Diffusion Models|ICLR 2024|
+|14|2024.04.04|李俊豪|Air Gap: Protecting Privacy-Conscious Conversational Agents|CCS 2024|
+|15|2025.04.11|陈佳豪|On the Security and Privacy Risks of Model Content Protocol||
+|16|2025.04.18|张铃沛|CS-LSTMs: Context and Seasonal LSTMs for Time Series Anomaly Detection||
+|17|2025.04.25|张童|Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution|NDSS 2024|
+|18|2025.05.02|刘家宁|AutoDAN-Turbo: A Lifelong Agent for Strategy Self-Exploration to Jailbreak LLMs|ICLR 2025|
+|19|2025.05.09|曾睿|DataSentinel: A Game-Theoretic Detection of Prompt Injection Attacks|SP 2025|
+|20|2025.05.16|周豪杰|SELFDEFEND: LLMs Can Defend Themselves against Jailbreaking in a Pratical Manner|USENIX Security 2025|
+|21|2025.05.23|冯周|Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems|USENIX Security 2025|
+|22|2025.05.30|赵芷茗|Safety Alignment Should Be Made More Than Just A Few Tokens Deep|ICLR 2025|
+|23|2025.06.06|杨勇|Alleviating the Fear of Losing Alignment in LLM Fine-Tuning|SP 2025|
+|24|2025.06.13|王异鸣|DORMANT: Defending against Pose-driven Human Image Animation|USENIX Security 2025|
+|25|2025.06.20|麻瓯勃|Loss of Plasticity in Deep Reinforcement Learning||
+|26|2025.06.27|李俊豪|Doxing via the Lens: Revealing Location-related Privacy Leakage on Multi-modal Large Reasoning Models|arXiv|
+|27|2025.07.04|李欣迪|Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink|USENIX Security 2025|
+|28|2025.07.11|贺兴|Fuzz-Testing Meets LLM-Based Agents: An Automated and Efficient Framework for Jailbreaking Text-To-Image Generation Models|SP 2025|
+|29|2025.07.18|陈佳豪|Delving into the Privacy Risks of Generative Models||
+|30|2025.07.25|陈曦|BadRobot: Jailbreaking Embodied LLMs in the Physical World|ICLR 2025|
+|31|2025.08.01|林瑞潇|Industrial Frameworks of LLM-based Multi-Agent Systems||
+|32|2025.08.08|张童|Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models|USENIX Security 2025|
+|33|2025.08.15|周豪杰|Safety Layers in Aligned Large Language Models: The Key to LLM Security|ICLR 2025|
+|34|2025.08.22|甘雨由|SafeNeuron: Detecting Jailbreaking in Large Vision Language Model via Locating Critical Neurons|AAAI 2025|
+|35|2025.08.29|冯周|SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis|USENIX Security 2025|
+|36|2025.09.05|曾睿|Cloak, Honey, Trap: Proactive Defenses Against LLM Agents|USENIX Security 2025|
+|37|2025.09.12|王异鸣|Exposing the Guardrails: Reverse-Engineering and Jailbreaking Safety Filters in DALL·E Text-to-Image Pipelines|USENIX Security 2025|
+|38|2025.09.19|姜毅|Cascading Adversarial Bias from Injection to Distillation in Language Models|CCS 2025|
+|39|2025.09.26|刘家宁|We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs|USENIX Security 2025|
+|40|2025.10.03|赵芷茗|Test-Time Poisoning Attacks Against Test-Time Adaptation Models|SP 2024|
+|41|2025.10.10|李欣迪|||
+|42|2025.10.17|陈佳豪|||
+|43|2025.10.24|张铃沛|||
+|44|2025.10.31|陈曦|||
+|45|2025.11.07|李俊豪|||
+|46|2025.11.14|贺兴|||
+|47|2025.11.21|职巳杰||||
+|48|2025.11.28|吴柏祺||||
+|49|2025.12.05|朱富康||||
+|50|2025.12.12|周豪杰||||
+|51|2025.12.19|王露怡||||
+|52|2025.12.26|张童||||
+
+## System Security Group Meeting
+**Location**:Cao Guangbiao High-tech Building 201
+
+**Time**: Sunday 18:00
+
+
+
+||Date|Speaker|Title|Publication|
+|---|:---:|:---:|:---:|:---:|
+|1|2025.01.05|李秉政|SymBisect: Accurate Bisection for Fuzzer-Exposed Vulnerabilities|Usenix Security 2024|
+|2|2025.01.12|黄钢|Can LLMs Obfuscate Code? A Systematic Analysis of Large Language Models into Assembly Code Obfuscation|AAAI 2025|
+|3|2025.01.19|刘昕鹏|Unveiling IoT Security in Reality: A Firmware-Centric Journey|Usenix Security 2024|
+|4|2025.01.26||||
+|5|2025.02.02||||
+|6|2025.02.09||||
+|7|2025.02.16||||
+|8|2025.02.23|江世昊|GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards|NDSS 2024|
+|9|2025.03.02|张凌铭|CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing|Usenix Security 2023|
+|10|2025.03.09|祝遥|Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection|NDSS 2025|
+|11|2025.03.16|常博宇|SpecRover: Code Intent Extraction via LLMs|ICSE 2025|
+|12|2025.03.23|杨禹|AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-Service|TIFS 2024|
+|13|2025.03.30|林型双|PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation|NDSS 2025|
+|14|2025.04.06|武旗龙|Large Language Models for Code Analysis : Do LLMs Really Do Their Job?|USENIX Security 2024|
+|15|2025.04.13|李秉政|ARTEMIS: Toward Accurate Detection of Server-Side Request Forgeries through LLM-Assisted Inter-procedural Path-Sensitive Taint Analysis|OOPSLA 2025|
+|16|2025.04.20|黄钢|kAPR: LLM-assisted Automated Program Repair on Linux Kernel|Personal Progress Report|
+|17|2025.04.27|刘昕鹏|Static Analysis for (RTOS-Based) Firmware|Personal Progress Report|
+|18|2025.05.04|江世昊|Inside Your Robot Dog Friend: Architecture and Security Challenges of Embodied AI Intelligent Unmanned Systems|Personal Progress Report|
+|19|2025.05.11|张凌铭|The Case for Learned Provenance-based System Behavior Baseline|ICML 2025|
+|20|2025.05.18|祝遥|Fuzzing across JavaScript and WebAssembly Language Boundary|Personal Progress Report|
+|21|2025.05.25|杨禹|An Empirical Study on EDR Systems’ Robustness against Attack Mutations by LLMs|Personal Progress Report|
+|22|2025.06.01|常博宇|Towards Patch Correctness Assessment|Personal Progress Report|
+|23|2025.06.08|林型双|CompliGuard: Detecting Reusable Components Usage Logical Noncompliance in Smart Contracts|Personal Progress Report|
+|24|2025.06.15|黄钢|HAFE: A Hybrid and Automated PHP WebShell Obfuscation Technique with Branch-Oriented Control and Variable Functions for Detection Evasion|Personal Progress Report|
+|25|2025.06.22|武旗龙|FLLMBackdoor : Stealthy Injection and Triggering in Malicious LLM Deployment Frameworks|Personal Progress Report|
+|26|2025.06.29|祝遥|What We Talk About When We Talk About Logs: Understanding the Effects of Dataset Quality on Endpoint Threat Detection Research|IEEE S&P 2025|
+|27|2025.07.06|张凌铭|RepairAgent: An Autonomous, LLM-Based Agent for Program Repair|ICSE 2025|
+|28|2025.07.13|林型双|Copy-and-Paste? Identifying EVM-Inequivalent Code Smells in Multi-chain Reuse Contracts|ISSTA 2025|
+|29|2025.07.20|江世昊|Demystifying RCE Vulnerabilities in LLM-Integrated Apps|CCS 2024|
+|30|2025.07.27|刘昕鹏|Stealthy and Persistent Attacks Leveraging AI-IDE|Personal Progress Report|
+|31|2025.08.03|杨禹|Generating API Parameter Security Rules with LLM for API Misuse Detection|NDSS 2025|
+|32|2025.08.10|常博宇|COMMITSHIELD: Tracking Vulnerability Introduction and Fix in Version Control Systems|ICSE 2025|
+|33|2025.08.17|黄钢|An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection|USENIX Security 2024|
+|34|2025.08.24|江世昊|BadRobot: Manipulating Embodied LLMs in the Physical World|ICLR 2025|
+|35|2025.08.31|张凌铭|Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection|ISSTA 2025|
+|36|2025.09.07|刘昕鹏|UntrustIDE: Exploiting Weaknesses in VS Code Extensions|NDSS 2024|
+|37|2025.09.14|祝遥|AutoLabel: Automated Fine-Grained Log Labeling for Cyber Attack Dataset Generation|USENIX Security 2025|
+|38|2025.09.21|林型双|Forge: An LLM-driven Framework for Large-Scale Smart Contract Vulnerability Dataset Construction|ICSE 2026|
+|39|2025.09.28|武旗龙|The philosopher's stone: Trojaning plugins of large language models|NDSS 2025|
+|40|2025.10.05|常博宇|PATCHAGENT: A Practical Program Repair Agent Mimicking Human Expertise|USENIX Security 2025|
+|41|2025.10.12|杨禹|||
+|42|2025.10.19|徐博||||
+|43|2025.10.26|江世昊||||
+|44|2025.11.02|王晋文||||
+|45|2025.11.09|张宁瑞||||
+|46|2025.11.16|林型双||||
+|47|2025.11.23|祝遥||||
+|48|2025.11.30|武旗龙||||
+|49|2025.12.07|黄钢||||
+|50|2025.12.14|张凌铭||||
+|51|2025.12.21|刘昕鹏||||
+|52|2025.12.28|常博宇||||
+
diff --git a/Seminar2026/README.md b/Seminar2026/README.md
new file mode 100644
index 0000000..a8fe511
--- /dev/null
+++ b/Seminar2026/README.md
@@ -0,0 +1,51 @@
+
+
+# Agenda 2026
+Please upload your **slides** or a **introduction (Chinese or English)** of your presentation **in advance**,
+such as **conference, title, abstract**,which can be written in the form of [markdown](http://sspai.com/25137). Please add your title in the agenda.
+
+
+## AI Security Group Meeting
+**Location**:Cao Guangbiao High-tech Building 201
+
+**Time**: Friday 18:00
+
+
+
+||Date|Speaker|Title|Sharer|
+|---|:---:|:---:|:---:|:---:|
+|1|2026.01.02|章琦||||
+|2|2026.01.09|陈佳豪||||
+|3|2026.01.16|刘家宁||||
+|4|2026.01.23|赵芷茗||||
+|5|2026.01.30|曾睿||||
+|6|2026.02.06|王异鸣||||
+|7|2026.02.13|||||
+|8|2026.02.20|||||
+|9|2026.02.27|张铃沛||||
+|10|2026.03.06|陈曦||||
+|11|2026.03.13|冯周||||
+|12|2026.03.20|丁婉蒙||||
+|13|2026.03.27|贺兴||||
+|14|2026.04.03|李欣迪||||
+|15|2026.04.10|李俊豪||||
+
+## System Security Group Meeting
+**Location**:Cao Guangbiao High-tech Building 201
+
+**Time**: Sunday 18:00
+
+
+
+||Date|Speaker|Title|Sharer|
+|---|:---:|:---:|:---:|:---:|
+|1|2026.01.04|徐博||||
+|2|2026.01.11|江世昊||||
+|3|2026.01.18|王晋文||||
+|4|2026.01.25|张宁瑞||||
+|5|2026.02.01|武旗龙||||
+|6|2026.02.08|黄钢||||
+|7|2026.02.15|||||
+|8|2026.02.22|||||
+|9|2026.03.01|张凌铭||||
+|10|2026.03.08|常博宇||||