diff --git a/README.md b/README.md index 0f4c39d..a8fe511 100644 --- a/README.md +++ b/README.md @@ -1,67 +1,51 @@ -# Agenda 2020 + +# Agenda 2026 Please upload your **slides** or a **introduction (Chinese or English)** of your presentation **in advance**, such as **conference, title, abstract**,which can be written in the form of [markdown](http://sspai.com/25137). Please add your title in the agenda. -**Location**: Zetonglou 104 or DingTalk - -**Time**: Friday 18:00-20:00 Welcome to attend the seminar! - - -```diff -- ATTENTION: Migration happens -``` - -New address: https://github.com/ZJUNESA/SANDP - - -||Date|Speaker|Title| -|---|:---:|:---:|:---:| -|1|2020.1.3|李宇薇
刘倩君|| -|2|2020.1.10|卢令令
周俊丰|| -|3|2020.1.17|邱鹏宇
沈鹿嘉|| -|4| 2020.2.28 |唐嘉蔚
应燕芸|| -|5| 2020.3.6 |王琴应
付冲|| -|6| 2020.3.13 |王赛卓
王博|| -|7| 2020.3.20 |胡思昊
付之笑|| -|8| 2020.3.27 |魏成坤
付丽嫆|| -|9| 2020.4.3 |施程辉
沈鹿嘉|| -|10| 2020.4.10 |方佳
伍一鸣|| -|11| 2020.4.17 |杜天宇
陈安莹|| -|12|2020.4.24|吴寒露
马哲|| -|13|2020.5.1|刘沛宇
张耀|| -|14|2020.5.8|刘丁豪
谢之源|| -|15|2020.5.15|卢令令
邱鹏宇|| -|16|2020.5.22|陈源
沈鹿嘉|| -|17|2020.5.29|应燕芸
唐嘉蔚|| -|18|2020.6.5|付冲
王琴应|| -|19|2020.6.12|付之笑
王赛卓|| -|20|2020.6.19|付丽嫆
王博|| -|21|2020.6.26|方佳
陈安莹|| -|22|2020.7.3|杜天宇
伍一鸣|| -|23|2020.7.10|施程辉
吕晨阳|| -|24|2020.7.17|吴寒露
马哲|| -|25|2020.7.24|刘沛宇
张耀|| -|26|2020.7.31|刘丁豪
谢之源|| -|27|2020.8.7|卢令令
邱鹏宇|| -|28|2020.8.14|陈源
陈越尧|| -|29|2020.8.21|唐嘉蔚
应燕芸|| -|30|2020.8.28|付冲
王琴应|| -|31|2020.9.4|方佳
陈安莹|| -|32|2020.9.11|付丽嫆
王博|| -|33|2020.9.18|杜天宇
伍一鸣|| -|34|2020.9.25|吴寒露
马哲|| -|35|2020.10.2|施程辉
刘丁豪|| -|36|2020.10.9|方佳
沈鹿嘉|| -|37|2020.10.16|王琴应
付冲|| -|38|2020.10.23|邱鹏宇
付丽嫆|| -|39|2020.10.30|王博
吴寒露|| -|40|2020.11.6|马哲
陈源|| -|41|2020.11.13|梁红
唐嘉蔚|| -|42|2020.11.20|应燕芸
张耀|| -|43|2020.11.27|付之笑
杜天宇|| -|44|2020.12.4|向意
甘雨由|| -|45|2020.12.11|刘倩君
卢令令|| -|46|2020.12.18|伍一鸣
沈鹿嘉|| -|47|2020.12.25|陈安莹
谢之源|| +## AI Security Group Meeting +**Location**:Cao Guangbiao High-tech Building 201 + +**Time**: Friday 18:00 + +
+ +||Date|Speaker|Title|Sharer| +|---|:---:|:---:|:---:|:---:| +|1|2026.01.02|章琦|||| +|2|2026.01.09|陈佳豪|||| +|3|2026.01.16|刘家宁|||| +|4|2026.01.23|赵芷茗|||| +|5|2026.01.30|曾睿|||| +|6|2026.02.06|王异鸣|||| +|7|2026.02.13||||| +|8|2026.02.20||||| +|9|2026.02.27|张铃沛|||| +|10|2026.03.06|陈曦|||| +|11|2026.03.13|冯周|||| +|12|2026.03.20|丁婉蒙|||| +|13|2026.03.27|贺兴|||| +|14|2026.04.03|李欣迪|||| +|15|2026.04.10|李俊豪|||| + +## System Security Group Meeting +**Location**:Cao Guangbiao High-tech Building 201 + +**Time**: Sunday 18:00 + +
+ +||Date|Speaker|Title|Sharer| +|---|:---:|:---:|:---:|:---:| +|1|2026.01.04|徐博|||| +|2|2026.01.11|江世昊|||| +|3|2026.01.18|王晋文|||| +|4|2026.01.25|张宁瑞|||| +|5|2026.02.01|武旗龙|||| +|6|2026.02.08|黄钢|||| +|7|2026.02.15||||| +|8|2026.02.22||||| +|9|2026.03.01|张凌铭|||| +|10|2026.03.08|常博宇|||| diff --git a/Seminar2020/README.md b/Seminar2020/README.md new file mode 100644 index 0000000..2e3a8c0 --- /dev/null +++ b/Seminar2020/README.md @@ -0,0 +1,57 @@ +# Agenda 2020 +Please upload your **slides** or a **introduction (Chinese or English)** of your presentation **in advance**, +such as **conference, title, abstract**,which can be written in the form of [markdown](http://sspai.com/25137). Please add your title in the agenda. + +**Location**: Zetonglou 104 or DingTalk + +**Time**: Friday 18:00-20:00 Welcome to attend the seminar! + + +||Date|Speaker|Title| +|---|:---:|:---:|:---:| +|1|2020.1.3|李宇薇
刘倩君|| +|2|2020.1.10|卢令令
周俊丰|| +|3|2020.1.17|邱鹏宇
沈鹿嘉|| +|4| 2020.2.28 |唐嘉蔚
应燕芸|| +|5| 2020.3.6 |王琴应
付冲|Burglars’ IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds, IEEE S&P 2020 | +|6| 2020.3.13 |王赛卓
王博|| +|7| 2020.3.20 |胡思昊
付之笑|| +|8| 2020.3.27 |魏成坤
付丽嫆|| +|9| 2020.4.3 |施程辉
沈鹿嘉|| +|10| 2020.4.10 |方佳
伍一鸣|| +|11| 2020.4.17 |杜天宇
陈安莹|When Malware is Packin’ Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features, NDSS 2020| +|12|2020.4.24|吴含露
马哲|| +|13|2020.5.1|刘沛宇
张耀|| +|14|2020.5.8|刘丁豪
谢之源|| +|15|2020.5.15|卢令令
邱鹏宇|| +|16|2020.5.22|陈源
沈鹿嘉|| +|17|2020.5.29|应燕芸
唐嘉蔚|| +|18|2020.6.5|付冲
王琴应| BIAS: Bluetooth Impersonation AttackS, IEEE S&P 2020 | +|19|2020.6.12|付之笑
王赛卓|| +|20|2020.6.19|付丽嫆
王博|| +|21|2020.6.26|方佳
陈安莹|Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning, IEEE S&P 2020| +|22|2020.7.3|杜天宇
伍一鸣|| +|23|2020.7.10|施程辉
吕晨阳|| +|24|2020.7.17|吴含露
马哲|| +|25|2020.7.24|刘沛宇
张耀|| +|26|2020.7.31|刘丁豪
谢之源|| +|27|2020.8.7|卢令令
邱鹏宇|| +|28|2020.8.14|陈源
陈越尧|| +|29|2020.8.21|唐嘉蔚
应燕芸|| +|30|2020.8.28|付冲
王琴应|High Accuracy and High Fidelity Extraction of Neural Networks, USENIX Security 2020
Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles as A New Over-the-Air Attack Surface in Automotive IoT, USENIX Security 2020| +|31|2020.9.4|方佳
陈安莹|BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-Program Path Sampling and Per-Path Abstract Interpretation, OOPSLA 2019| +|32|2020.9.11|付丽嫆
王博|PDiff: Semantic-based Patch Presence Testing for Downstream Kernels, ACM CCS 2020| +|33|2020.9.18|杜天宇
伍一鸣|Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy, IEEE S&P 2019
Learning to Discriminate Perturbations for Blocking Adversarial Attacks in Text Classification, EMNLP 2019| +|34|2020.9.25|吴含露
马哲|Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach, ACM CCS 2018
Looking Fast and Slow: Memory-Guided Mobile Video Object Detection, arXiv 2019| +|35|2020.10.2|施程辉
刘丁豪|Latent Backdoor Attacks on Deep Neural Networks, ACM CCS 2019
Check It Again: Detecting Lacking-Recheck Bugs in OS Kernels, ACM CCS 2018| +|36|2020.10.9|方佳
沈鹿嘉|Machine Learning for Scent: Learning Generalizable Perceptual Representations of Small Molecules, arXiv 2019
STRIP: A Defence Against Trojan Attacks on Deep Neural Networks, ACSAC 19| +|37|2020.10.16||| +|38|2020.10.23|陈源
梁红|Cached and Confused: Web Cache Deception in the Wild, USENIX Security 2020
Not All Coverage Measurements Are Equal:Fuzzing by Coverage Accounting for Input Prioritization, NDSS 2020| +|39|2020.10.30|邱鹏宇
付丽嫆|Machine Unlearning, IEEE S&P 2021
Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison, NDSS 2020| +|40|2020.11.6|王博
卢令令|Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems, USENIX Security 2020
GEM^2-Tree: A Gas-Efficient Structure for Authenticated Range Queries in Blockchain, ICDE 2019| +|41|2020.11.13|马哲
王琴应|An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale, arXiv 2020
Unearthing the TrustedCore: A Critical Review on Huawei’s Trusted Execution Environment, USENIX Security 2020| +|42|2020.11.20|付冲
张耀|Attack of the Tails: Yes, You Really Can Backdoor Federated Learning, NIPS 2020
With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning, USENIX Security 2018| +|43|2020.11.27|应燕芸
吴含露|Deep learning of spontaneous arousal fluctuations detects early cholinergic defects across neurodevelopmental mouse models and patients, PNAS 2020
TIMME: Twitter Ideology-detection via Multi-task Multi-relational Embedding, KDD 2020| +|44|2020.12.4|付之笑
沈鹿嘉|Deepfakes Detection with Automatic Face Weighting, CVPRW 2020
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection, USENIX Security 2021| +|45|2020.12.11|向意
甘雨由|Targeted Greybox Fuzzing with Static Lookahead Analysis, ICSE 2020
Score-CAM: Score-Weighted Visual Explanations for Convolutional Neural Networks, CVPRW 2020| +|47|2020.12.18|陈越尧
唐嘉蔚|UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers, USENIX Security 2021
28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics, ACM CCS 2019| diff --git a/Seminar2021/README.md b/Seminar2021/README.md new file mode 100644 index 0000000..417f4fe --- /dev/null +++ b/Seminar2021/README.md @@ -0,0 +1,107 @@ +# Agenda 2021 +Please upload your **slides** or a **introduction (Chinese or English)** of your presentation **in advance**, +such as **conference, title, abstract**,which can be written in the form of [markdown](http://sspai.com/25137). Please add your title in the agenda. + +**Location**: Zetonglou 104 + +**Time**: Friday 18:00-20:00 Welcome to attend the seminar! + + +||Date|Speaker|Title| +|---|:---:|:---:|:---:| +|1|2020.12.25|陈安莹
施程辉|CodeCMR: Cross-Modal Retrieval For Function-Level Binary Source Code Matching, NIPS 2020
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks, NIPS 2018| +|2|2021.1.1|陈源
邱鹏宇|sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart Contracts, ICSE 2020
Practical Traffic Analysis Attacks on Secure Messaging Applications, NDSS 2020| +|3|2021.1.8|王琴应
应燕芸|APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise, USENIX Security 2020| +|4|2021.1.15|唐嘉蔚
刘丁豪|The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment, USENIX Security 2020
MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures, USENIX Security 2020| +|5|2021.1.22|张耀
付冲|Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning, USENIX Security 2020
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models, ACM CCS 2020| +|6|2021.1.29|马哲
向意|Exploring Simple Siamese Representation Learning, Arxiv 2020
Fuzzing File Systems via Two-Dimensional Input Space Exploration, IEEE S&P 2019| +|7|2021.2.5||| +|8|2021.2.12||| +|9|2021.2.19|付之笑
陈越尧|Multi-modal Transformer for Video Retrieval, ECCV 2020
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation, USENIX Security 2020| +|10|2021.2.26||| +|11|2021.3.5|沈鹿嘉
甘雨由|Data Poisoning Attacks to Deep Learning Based Recommender Systems, NDSS 2021
Implicit Semantic Data Augmentation for Deep Networks, NeurIPS 2019| +|12|2021.3.12|卢令令
谢之源|Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing, ACM CCS 2017
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals, NDSS 2021| +|13|2021.3.19|邱鹏宇
刘丁豪|Model Watermarking for Image Processing Networks, AAAI 2020
Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code, USENIX Security 2021| +|14|2021.3.26|马哲
沈鹿嘉|Is Space-Time Attention All You Need for Video Understanding?, arXiv 2021
Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning, NDSS 2021| +|15|2021.4.2|刘沛宇
梁红|Understanding Worldwide Private Information Collection on Android, NDSS 2021
PANGOLIN: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction, IEEE S&P 2020| +|16|2021.4.9|张耀
王琴应|CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples, NDSS 2021
Data Privacy in Trigger-Action IoT Systems, IEEE S&P 2021| +|17|2021.4.16|陈源
梁红|EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts, USENIX Security 2021
Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints, NDSS 2019| +|18|2021.4.23|应燕芸
付之笑|Deep learning for in vivo near-infrared imaging, PNAS 2021
Multimodal Analytics for Real-world News using Measures of Cross-modal Entity Consistency, ICMR 2020| +|19|2021.4.30|卢令令
甘雨由|Blockene: A High-throughput Blockchain Over Mobile Devices, OSDI 2020
Towards Efficient Visual Explanation of Black-Box Neural Network, PREVIEW| +|20|2021.5.7|陈越尧
唐嘉蔚|Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning, NDSS 2021
Evade Deep Image Retrieval by Stashing Private Images in the Hash Space, CVPR 2020| +|21|2021.5.14|施程辉
付冲|Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment, ACM CCS 2019
Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features, ACM CCS 2020| +|22|2021.5.21|马哲
向意|Video Corpus Moment Retrieval with Contrastive Learning, SIGIR 2021
SAVIOR: Towards Bug-Driven Hybrid Testing, IEEE S&P 2020| +|23|2021.5.28|邱鹏宇
刘丁豪|DeepDyve: Dynamic Verification for Deep Neural Networks, ACM CCS 2020
On the Feasibility of Stealthily Introducing Vulnerabilities in Open-Source Software via Hypocrite Commits| +|24|2021.6.4|段宇萱
叶童|
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels, ACM CCS 2020| +|25|2021.6.11|刘丁豪
沈鹿嘉|Understanding and Detecting Disordered Error Handling with Precise Function Pairing, USENIX Security 2021
Poisoning the Unlabeled Dataset of Semi-Supervised Learning, arXiv 2021| +|26|2021.6.18|付冲
侯黎阳|You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion, USENIX Security 2021
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback, ACM CCS 2020| +|27|2021.6.25|虞楚尔
段宇萱|PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking, USENIX Security 2021
WaveGuard: Understanding and Mitigating Audio Adversarial Examples, USENIX Security 2021| +|28|2021.7.2|梁红
向意|SLIME: Program-sensitive Energy Allocation for Fuzzing
HFL: Hybrid Fuzzing on the Linux Kernel, NDSS 2020| +|29|2021.7.9|马哲
陈越尧|WenLan: Bridging Vision and Language by Large-Scale Multi-Modal Pre-Training, arXiv 2021
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization, NDSS 2020| +|30|2021.7.16|陈源
张耀|WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning, NDSS 2021
Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding, IEEE S&P 2021| +|31|2021.7.23|甘雨由
付之笑|Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers, USENIX Security 2021
Face Forensics in the Wild, CVPR 2021| +|32|2021.7.30|邱鹏宇
卢令令|Improving Password Guessing via Representation Learning, IEEE S&P 2021
iQuery: Towards Trustworthy, Scalable Accountability for Blockchain-based IoT Payment System| +|33|2021.8.6|梁红
陈安莹|TCP-Fuzz: Detecting Memory and Semantic Bugs in TCP Stacks with Fuzzing, USENIX ATC 2021
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary, IEEE S&P 2021| +|34|2021.8.13|许嘉诚
侯黎阳|Automated Conformance Testing for JavaScript Engines via Deep Compiler Fuzzing, PLDI 2021
Industry Practice of Coverage-Guided Enterprise-Level DBMS Fuzzing, ICSE 2021| +|35|2021.8.20|虞楚尔
段宇萱|Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision, IEEE S&P 2021
Demodalizing Face Recognition with Synthetic Samples, AAAI 2021| +|36|2021.8.27|陈源
付之笑|Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage, NDSS 2021
Multi-attentional Deepfake Detection, CVPR 2021| +|37|2021.9.3|张耀
付丽嫆|Extracting Training Data from Large Language Models, USENIX Security 2021
“It’s the Company, the Government, You and I”: User Perceptions of Responsibility for Smart Home Privacy and Security, USENIX Security 2021| +|38|2021.9.10|施程辉
唐嘉蔚|Leakage of Dataset Properties in Multi-Party Machine Learning, USENIX Security 2021
Adversarial Examples for Hamming Space Search, IEEE Trans 2020| +|39|2021.9.17|卢令令
付冲|Dynamic Authenticated Index Structures for Outsourced Databases, SIGMOD 2006
Blind Backdoors in Deep Learning Models, arXiv 2020| +|40|2021.9.24|沈鹿嘉
向意|Systematic Evaluation of Privacy Risks of Machine Learning Models, USENIX Security 2021
Constraint-guided Directed Greybox Fuzzing, USENIX Security 2021| +|41|2021.10.1|邱鹏宇
刘丁豪|Subpopulation Data Poisoning Attacks, arXiv 2020
Static Detection of Unsafe DMA Accesses in Device Drivers, USENIX Security 2021| +|42|2021.10.8|马哲
王琴应|Not All Unlabeled Data are Equal: Learning to Weight Data in Semi-supervised Learning, NIPS 2020
SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems, IEEE S&P 2020| +|43|2021.10.15|梁红
陈安莹|Krace: Data Race Fuzzing for Kernel File Systems, IEEE S&P 2020
Supply-Chain Vulnerability Elimination via Active Learning & Regeneration, ACM CCS 2021| +|44|2021.10.22|甘雨由
付丽嫆|Seek-and-Hide: Adversarial Steganography via Deep Reinforcement Learning, TPAMI 2021
NA| + +## AI Security Group Meeting +**Location**:Zetonglou 104 + +**Time**: Friday 18:00 + +
+ +||Date|Speaker|Title|Sharer| +|---|:---:|:---:|:---:|:---:| +|45|2021.10.29|付之笑|Spatiotemporal Inconsistency Learning for DeepFake Video Detection, ACM MM 2021|何平&付冲| +|46|2021.11.05|甘雨由|Entangled Watermarks as a Defense against Model Extraction, USENIX Security 2021|何平| +|47|2021.11.12|包晗|ID-Reveal: Identity-aware DeepFake Video Detection, ICCV 2021|付冲| +|48|2021.11.19|虞楚尔||甘雨由| +|49|2021.11.26|杜杨凯||麻瓯博| +|50|2021.12.03|段宇萱||高向珊| +|51|2021.12.10|白熠阳||林瑞潇| +|52|2021.12.17|沈鹿嘉||施程辉| +|53|2021.12.24|李泽宇||唐嘉蔚| +|54|2021.12.31|马哲||付之笑| + + +
+ +## System Security Group Meeting +**Location**:Zetonglou 104 + +**Time**: Sunday 18:00 + +
+ +||Date|Speaker|Title|Sharer| +|---|:---:|:---:|:---:|:---:| +|45|2021.10.31|叶童|A Lightweight Framework for Function Name Reassignment Based on Larege-Scale Stripped Binaries, ISSTA 2021|许嘉诚| +|46|2021.11.07|陈源|NA|向意| +|47|2021.11.14|侯黎阳|Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference, ACM CCS 2021|刘丁豪| +|48|2021.11.21|卢令令|Bitcoin: A Peer-to-Peer Electronic Cash System, 2008|刘沛宇| +|49|2021.11.28|王琴应|SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning, USENIX Security 2021|夏亦凡| +|50|2021.12.05|常博宇|ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems, USENIX Security 2021|刘昕鹏| +|51|2021.12.12|潘高宁|HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs, ACM CCS 2021|梁红| +|52|2021.12.19|张凌铭|Directed Grey-Box Fuzzing with Provable Path Pruning, IEEE S&P 2022|常博宇| +|53|2021.12.26|夏亦凡|The Use of Likely Invariants as Feedback for Fuzzers, USENIX Security 2021|侯黎阳| + + + +
diff --git a/Seminar2022/README.md b/Seminar2022/README.md new file mode 100644 index 0000000..edf9fa4 --- /dev/null +++ b/Seminar2022/README.md @@ -0,0 +1,151 @@ + + +# Agenda 2022 +Please upload your **slides** or a **introduction (Chinese or English)** of your presentation **in advance**, +such as **conference, title, abstract**,which can be written in the form of [markdown](http://sspai.com/25137). Please add your title in the agenda. + + +## AI Security Group Meeting +**Location**:Zetonglou 104 + +**Time**: Friday 18:00 + +
+ +||Date|Speaker|Title|Sharer| +|---|:---:|:---:|:---:|:---:| +|1|2021.12.24|||| +|2|2021.12.31|马哲|Learning Segment Similarity and Alignment in Large-Scale Content Based Video Retrieval, MM 2021|付之笑| +|3|2022.01.07|麻瓯勃|Robust Deep Reinforcement Learning against Adversarial Perturbations on State Observations, arXiv 2020|杜林康| +|4|2022.01.14|何平|HopSkipJumpAttack: A Query-Efficient Decision-Based Attack, IEEE S&P 2020|包晗| +|5|2022.01.21|白熠阳|Defense Against Synonym Substitution-based Adversarial Attack via Dirichlet Neighborhood Ensemble, ACL 2021|沈鹿嘉| +|6|2022.02.11|高向珊|An Empirical Study of Example Forgetting during Deep Neural Network Learning, ICLR 2019|杜杨凯| +|7|2022.02.18|林瑞潇|Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning, IEEE S&P 2021|甘雨由| +|8|2022.02.25|何平|Bad Characters: Imperceptible NLP Attacks, IEEE S&P 2022|李泽宇| +|9|2022.03.04|姜毅|BERT-Attack: Adversarial Attack Against BERT Using BERT, EMNLP 2020|邱鹏宇| +|10|2022.03.11|甘雨由|/|段宇萱| +|11|2022.03.18|谢廷浩|Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks, arXiv 2021|马哲| +|12|2022.03.25|付之笑|SelfReg: Self-supervised Contrastive Regularization for Domain Generalization, ICCV 2021|曾睿| +|13|2022.04.01|林瑞潇|Hierarchical Personalized Federated Learning for User Modeling, WWW 2021|谢廷浩| +|14|2022.04.08|邱鹏宇|DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle Avoidance in Autonomous Systems, USENIX Security 2022|付冲| +|15|2022.04.15|杜杨凯|Contrastive Code Representation Learning, EMNLP 2021|麻瓯勃| +|16|2022.04.22|包晗|Pose-Controllable Talking Face Generation by Implicitly Modularized Audio-Visual Representation, CVPR 2021|白熠阳| +|17|2022.04.29|李泽宇|MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation, CVPR 2021|姜毅| +|18|2022.05.06|沈鹿嘉|PICCOLO : Exposing Complex Backdoors in NLP Transformer Models, IEEE S&P 2022|姜毅| +|19|2022.05.13|段宇萱|Protecting Celebrities from DeepFake with Identity Consistency Transformer, CVPR 2022|何平| +|20|2022.05.20|付冲|Pass off Fish Eyes for Pearls: Attacking Model Selection of Pre-trained Models, ACL 2022|邱鹏宇| +|21|2022.05.27|姜毅|Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs, USENIX Security 2021|甘雨由| +|22|2022.06.03|马哲|Barlow Twins: Self-Supervised Learning via Redundancy Reduction, ICML 2021|付之笑| +|23|2022.06.10|麻瓯勃|Adversarial Policy Learning in Two-player Competitive Games, ICML 2021|林瑞潇| +|24|2022.06.17|虞楚尔|Detecting Deepfakes with Self-Blended Images, CVPR 2022|李泽宇| +|25|2022.06.24|甘雨由||沈鹿嘉| +|26|2022.07.01|付之笑|Few-Shot Head Swapping in the Wild, CVPR 2022|包晗| +|27|2022.07.08|何平|Anti-Backdoor Learning: Training Clean Models on Poisoned Data, NeurIPS 2021|杜杨凯| +|28|2022.07.15|姜毅|Differentiable Prompt Makes Pre-trained Language Models Better Few-shot Learners! , ICLR 2022|付冲| +|29|2022.07.22|林瑞潇|CAFE: Catastrophic Data Leakage in Vertical Federated Learning, NeurIPS 2021|马哲| +|30|2022.07.29|李泽宇|Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations, CVPR 2022|麻瓯勃| +|31|2022.08.05|邱鹏宇|Inference Attacks Against Graph Neural Networks, USENIX Security 2022|甘雨由| +|32|2022.08.12|包晗|DeepFake Disrupter: The Detector of DeepFake Is My Friend, CVPR 2022|白熠阳| +|33|2022.08.19|沈鹿嘉|Get a Model! Model Hijacking Attack Against Machine Learning Models, NDSS 2022|付之笑| +|34|2022.08.26|杜杨凯|Fantastically Ordered Prompts and Where to Find Them: Overcoming Few-Shot Prompt Order Sensitivity, ACL 2022|何平| +|35|2022.09.02|麻瓯勃|Deep Reinforcement Learning That Matters, AAAI 2018|付冲| +|36|2022.09.09|甘雨由||林瑞潇| +|37|2022.09.16|||| +|38|2022.09.23|马哲|A Self-Supervised Descriptor for Image Copy Detection, CVPR 2022|姜毅| +|39|2022.09.30|何平|CADE: Detecting and Explaining Concept Drift Samples for Security Applications, USENIX Security 2021|邱鹏宇| +|40|2022.10.07|付之笑|On sensitivity of meta-learning to support data, NIPS 2021|包晗| +|41|2022.10.14|李泽宇||沈鹿嘉| +|42|2022.10.21|付冲|PoisonedEncoder: Poisoning the Unlabeled Pre-training Data in Contrastive Learning|甘雨由| +|43|2022.10.28|林瑞潇||麻瓯勃| +|44|2022.11.04|陈佳豪||白熠阳| +|45|2022.11.11|丁卓远||何平| +|46|2022.11.18|柴欣怡||杜杨凯| +|47|2022.11.25|沈志强||马哲| +|48|2022.12.02|姜毅||李泽宇| +|49|2022.12.09|包晗||邱鹏宇| +|50|2022.12.16|甘雨由||林瑞潇| +|51|2022.12.23|麻瓯勃||陈佳豪| + + + + +
+ +## System Security Group Meeting +**Location**:Zetonglou 104 + +**Time**: Sunday 18:00 + +
+ + +||Date|Speaker|Title|Sharer| +|---|:---:|:---:|:---:|:---:| +|1|2021.12.26|夏亦凡|BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning, IEEE S&P 2022|侯黎阳| +|2|2022.01.02|许嘉诚|HEALER: Relation Learning Guided Kernel Fuzzing, SOSP 2021|卢令令| +|3|2022.01.09|叶童|Retrieval-Augmented Generation for Code Summarization via Hybrid GNN, ICLR 2021|陈安莹| +|4|2022.01.16|刘昕鹏|DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices, IEEE S&P 2021|张凌铭| +|5|2022.01.23|夏亦凡|Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing, USENIX Security 2021|潘高宁| +|6|2022.02.13|常博宇|μAFL: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware, ICSE 2022|陈源| +|7|2022.02.20|向意|ParmeSan: Sanitizer-guided Greybox Fuzzing, USENIX Security 2020|许嘉诚| +|8|2022.02.27|刘丁豪|Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking, USENIX Security 2021|刘昕鹏| +|9|2022.03.06|张凌铭|Regression Greybox Fuzzing, ACM CCS 2021|夏亦凡| +|10|2022.03.13|梁红|SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel, USENIX Security 2022|常博宇| +|11|2022.03.20|许嘉诚|Demystifying the Dependency Challenge in Kernel Fuzzing, ICSE 2022|王琴应| +|12|2022.03.27|侯黎阳|ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing, ACSAC 2021|向意| +|13|2022.04.03|夏亦凡|Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators, NDSS 2022|梁红| +|14|2022.04.10|刘昕鹏|PATA: Fuzzing with Path Aware Taint Analysis, IEEE S&P 2022|刘丁豪| +|15|2022.04.17|陈源|As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service, NDSS 2022|许嘉诚| +|16|2022.04.24|叶童|Retrieval-based neural source code summarization, ICSE 2020|陈安莹| +|17|2022.05.01|常博宇|Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis, IEEE S&P 2022|张凌铭| +|18|2022.05.08|刘丁豪|Undo Workarounds for Kernel Bugs, USENIX Security 2021|陈源| +|19|2022.05.15|王琴应|FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware, NDSS 2022|吕晨阳| +|20|2022.05.22|陈安莹|Scalable Validation of Binary Lifters, PLDI 2020|向意| +|21|2022.05.29|梁红|MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing, NDSS 2022|| +|22|2022.06.05|卢令令|ImageProof: Enabling Authentication for Large-Scale Image Retrieval, ICDE 2019|刘昕鹏| +|23|2022.06.12|张凌铭|InstruGuard: Find and Fix Instrumentation Errors for Coverage-based Greybox Fuzzing, ASE 2021|夏亦凡| +|24|2022.06.19|向意|WindRanger: A Directed Greybox Fuzzer driven by Deviation Basic Blocks, ICSE 2022|常博宇| +|25|2022.06.26|许嘉诚|SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers, ACM CCS 2021|王琴应| +|26|2022.07.03|刘丁豪|Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs, USENIX Security 2021|陈安莹| +|27|2022.07.10|刘昕鹏|Capture: Centralized Library Management for Heterogeneous IoT Devices, USENIX Security 2021|侯黎阳| +|28|2022.07.17|陈源|Broken Metre: Attacking Resource Metering in EVM, NDSS 2020|刘沛宇| +|29|2022.07.24|常博宇|JIGSAW: Efficient and Scalable Path Constraints Fuzzing, IEEE S&P 2022|梁红| +|30|2022.07.31|||| +|31|2022.08.07|向意|VulScope: Facilitating Vulnerability Assessment through PoC, ACM CCS 2021|张凌铭| +|32|2022.08.14|夏亦凡|Program Vulnerability Repair via Inductive Inference, ISSTA 2022|许嘉诚| +|33|2022.08.21|王琴应|FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks, IEEE S&P 2022|刘丁豪| +|34|2022.08.28|潘高宁|MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar Inference, USENIX Security 2022|陈源| +|35|2022.09.04|侯黎阳|Vulnerability Detection of ICS Protocols Via Cross-State Fuzzing, EMSOFT 2022|常博宇| +|36|2022.09.11|梁红|SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis, USENIX Security 2022|刘昕鹏| +|37|2022.09.18|张凌铭|FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing, USENIX Security 2022|向意| +|38|2022.09.25|刘丁豪|UBITect: A Precise and Scalable Method to Detect Use-before-Initialization Bugs in Linux Kernel, FSE 2022|夏亦凡| +|39|2022.10.02|陈源|eTainter: detecting gas-related vulnerabilities in smart contracts, ISSTA 2022|许嘉诚| +|40|2022.10.09|常博宇|Exploit the Last Straw That Breaks Android Systems, IEEE S&P 2022|王琴应| +|41|2022.10.16|刘昕鹏|SnapFuzz:An Efficient Fuzzing Framework for Network Applications, ISSTA 2022|张凌铭| +|42|2022.10.23|向意|MC2: Rigorous and Efficient Directed Greybox Fuzzing, ACM CCS 2022|侯黎阳| +|43|2022.10.30|武昊天|One Fuzzing Strategy to Rule Them All, ICSE 2022|梁红| +|44|2022.11.06|许嘉诚|StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing, USENIX Security 2022|刘丁豪| +|45|2022.11.13|夏亦凡|Tracer: Signature-based Static Analysis for Detecting Recurring Vulnerabilities, ACM CCS 2022|陈源| +|46|2022.11.20|王琴应|NCScope: Hardware-Assisted Analyzer for Native Code in Android Apps, ISSTA 2022|常博宇| +|47|2022.11.27|张凌铭||刘昕鹏| +|48|2022.12.04|梁红||向意| +|49|2022.12.11|刘丁豪||武昊天| +|50|2022.12.18|陈源||许嘉诚| +|51|2022.12.25|常博宇||夏亦凡| + + + + +
+ + + diff --git a/Seminar2023/README.md b/Seminar2023/README.md new file mode 100644 index 0000000..1eb2f05 --- /dev/null +++ b/Seminar2023/README.md @@ -0,0 +1,156 @@ + + +# Agenda 2023 +Please upload your **slides** or a **introduction (Chinese or English)** of your presentation **in advance**, +such as **conference, title, abstract**,which can be written in the form of [markdown](http://sspai.com/25137). Please add your title in the agenda. + + +## AI Security Group Meeting +**Location**:Zetonglou 104 + +**Time**: Friday 18:00 + +
+ +||Date|Speaker|Title|Sharer| +|---|:---:|:---:|:---:|:---:| +|1|2022.12.16|甘雨由||林瑞潇| +|2|2022.12.23|麻瓯勃||陈佳豪| +|3|2022.12.30|何平||丁卓远| +|4|2023.01.06|白熠阳||柴欣怡| +|5|2023.01.13|||| +|6|2023.01.20|||| +|7|2023.01.27|||| +|8|2023.02.03|杜杨凯||付冲| +|9|2023.02.10|沈鹿嘉||沈志强| +|10|2023.02.17|马哲||姜毅| +|11|2023.02.24|李泽宇||包晗| +|12|2023.03.03|邱鹏宇||甘雨由| +|13|2023.03.10|林瑞潇||麻瓯勃| +|14|2023.03.17|陈佳豪||何平| +|15|2023.03.24|||| +|16|2023.03.31|丁卓远||白熠阳| +|17|2023.04.07|柴欣怡||杜杨凯| +|18|2023.04.14|沈志强||沈鹿嘉| +|19|2023.04.21|姜毅||李泽宇| +|20|2023.04.28|付冲||马哲| +|21|2023.05.05|包晗||施程辉| +|22|2023.05.12|甘雨由||何平| +|23|2023.05.19|麻瓯勃||丁卓远| +|24|2023.05.26|杜杨凯||柴欣怡| +|25|2023.06.02|沈鹿嘉||沈志强| +|26|2023.06.09|白熠阳||姜毅| +|27|2023.06.16|李泽宇||付冲| +|28|2023.06.23|马哲||包晗| +|29|2023.06.30|陈佳豪||付冲| +|30|2023.07.07|麻瓯勃||沈鹿嘉| +|31|2023.07.14|马哲||白熠阳| +|32|2023.07.21|姜毅||曾睿| +|33|2023.07.28|甘雨由||杜杨凯| +|34|2023.08.04|李欣迪||李泽宇| +|35|2023.08.11|柴欣怡||马哲| +|36|2023.08.18|丁卓远||陈佳豪| +|37|2023.08.25|王异鸣||包晗| +|38|2023.09.01|陈曦||麻瓯勃| +|39|2023.09.08|沈志强||姜毅| +|40|2023.09.15|李秦峰||林瑞潇| +|41|2023.09.22|||何平| +|42|2023.09.29|曾睿||| +|43|2023.10.06|王异鸣||| +|44|2023.10.13|潘淼||| +|45|2023.10.20|柴欣怡||| +|46|2023.10.27|丁卓远||| +|47|2023.11.03|陈佳豪||| +|48|2023.11.10|包云泰|| +|49|2023.11.17|李欣迪||| +|50|2023.11.24|林瑞潇||| +|51|2023.12.01|杜梦瑶||| +|52|2023.12.08|冯周||| +|53|2023.12.15|包晗||| +|54|2023.12.22|丁卓远||| +|55|2023.12.29|曾睿||| + + + + +
+ +## System Security Group Meeting +**Location**:Zetonglou 104 + +**Time**: Sunday 18:00 + +
+ +||Date|Speaker|Title|Sharer| +|---|:---:|:---:|:---:|:---:| +|1|2022.12.18|陈源||许嘉诚| +|2|2022.12.25|常博宇||夏亦凡| +|3|2023.01.01|刘昕鹏||张凌铭| +|4|2023.01.08|向意||潘高宁| +|5|2023.01.15|||| +|6|2023.01.22|||| +|7|2023.01.29|||| +|8|2023.02.05|||刘丁豪| +|9|2023.02.12|武昊天||梁红| +|10|2023.02.19|许嘉诚||陈源| +|11|2023.02.26|常博宇||刘昕鹏| +|12|2023.03.05|夏亦凡||向意| +|13|2023.03.12|张凌铭||武昊天| +|14|2023.03.19|刘丁豪||许嘉诚| +|15|2023.03.26|陈源||常博宇| +|16|2023.04.02|刘昕鹏||梁红| +|17|2023.04.09||| +|18|2023.04.16|向意||夏亦凡| +|19|2023.04.23|武昊天||张凌铭| +|20|2023.04.30|许嘉诚||刘丁豪| +|21|2023.05.07|常博宇||陈源| +|22|2023.05.14|梁红||刘昕鹏| +|23|2023.05.21|夏亦凡||向意| +|24|2023.05.28|张凌铭||武昊天| +|25|2023.06.04|梁红||许嘉诚| +|26|2023.06.11|陈源||常博宇| +|27|2023.06.18|刘昕鹏||梁红| +|28|2023.06.25|武昊天||夏亦凡| +|29|2023.07.02|侯黎阳||许嘉诚| +|30|2023.07.09|刘昕鹏||张凌铭| +|31|2023.07.16|肖潇||常博宇| +|32|2023.07.23|夏亦凡||武昊天| +|33|2023.07.30|梁红||陈源| +|34|2023.08.06|夏亦凡||| +|35|2023.08.13|杨禹||武昊天| +|36|2023.08.20|肖潇||向意| +|37|2023.08.27|朱烜辰||许嘉诚| +|38|2023.09.03|张凌铭||刘昕鹏| +|39|2023.09.10|常博宇||李秉政| +|40|2023.09.17|陈源||夏亦凡| +|41|2023.09.24|许嘉诚||肖潇| +|42|2023.10.01|向意||刘丁豪| +|43|2023.10.08|杨禹||| +|44|2023.10.15|侯黎阳||| +|45|2023.10.22|武昊天||| +|46|2023.10.29|梁红||| +|47|2023.11.05|李秉政||| +|48|2023.11.12|张凌铭||| +|49|2023.11.19|肖潇||| +|50|2023.11.26|江世昊||| +|51|2023.12.03|祝遥||| +|52|2023.12.10|杨禹||| +|53|2023.12.17|常博宇||| +|54|2023.12.24|夏亦凡||| +|55|2023.12.31|刘昕鹏||| + + + +
+ + diff --git a/Seminar2024/README.md b/Seminar2024/README.md new file mode 100644 index 0000000..9ac9c47 --- /dev/null +++ b/Seminar2024/README.md @@ -0,0 +1,151 @@ + + +# Agenda 2024 +Please upload your **slides** or a **introduction (Chinese or English)** of your presentation **in advance**, +such as **conference, title, abstract**,which can be written in the form of [markdown](http://sspai.com/25137). Please add your title in the agenda. + + +## AI Security Group Meeting +**Location**:Cao Guangbiao High-tech Building 201 + +**Time**: Friday 18:00 + +
+ +||Date|Speaker|Title|Sharer| +|---|:---:|:---:|:---:|:---:| +|1|2024.01.05|马哲||| +|2|2024.01.12|赵芷茗||| +|3|2024.01.19|杜扬恺||| +|4|2024.01.26|李泽宇||| +|5|2024.02.02|包晗||| +|6|2024.02.09|||| +|7|2024.02.16|||| +|8|2024.02.23|姜毅||| +|6|2024.03.01|何平||| +|7|2024.03.08|麻瓯勃||| +|8|2024.03.15|曾睿||| +|9|2024.03.22|杨勇||| +|10|2024.03.29|沈志强||| +|11|2024.04.05|李秦峰||| +|12|2024.04.12|王异鸣||| +|13|2024.04.19|赵芷茗||| +|14|2024.04.26|陈曦||| +|15|2024.05.03|贺兴||| +|16|2024.05.10|朱烜辰||| +|17|2024.05.17|张余程||| +|18|2024.05.24|潘淼||| +|19|2024.05.31|杨勇||| +|20|2024.06.07|曾睿||| +|21|2024.06.14|马哲||| +|22|2024.06.21|何平||| +|23|2024.06.28|麻瓯勃||| +|24|2024.07.05|李欣迪||| +|25|2024.07.12|赵芷茗||| +|26|2024.07.19|姜毅||| +|27|2024.07.26|林瑞潇||| +|28|2024.08.02|包云泰||| +|29|2024.08.09|朱烜辰||| +|30|2024.08.16|冯周||| +|31|2024.08.23|李秦峰||| +|32|2024.08.30|王异鸣||| +|33|2024.09.06|张童||| +|34|2024.09.13|甘雨由||| +|35|2024.09.20|贺兴||| +|36|2024.09.27|陈曦||| +|37|2024.10.04|李欣迪||| +|38|2024.10.11|陈佳豪||| +|39|2024.10.18|林瑞潇||| +|40|2024.10.25|周豪杰||| +|41|2024.11.01|冯周||| +|42|2024.11.08|包晗||| +|43|2024.11.15|杨勇||| +|44|2024.11.22|姜毅||| +|45|2024.11.29|刘家宁||| +|46|2024.12.06|麻瓯勃||| +|47|2024.12.13|马哲||| +|48|2024.12.20|张铃沛||| +|49|2024.12.27|张童||| + + + +
+ +## System Security Group Meeting +**Location**:Cao Guangbiao High-tech Building 201 + +**Time**: Sunday 18:00 + +
+ +||Date|Speaker|Title|Sharer| +|---|:---:|:---:|:---:|:---:| +|1|2024.01.07|张乔||| +|2|2024.01.14|江世昊||| +|3|2024.01.21|祝遥||| +|4|2024.01.28|肖潇||| +|5|2024.02.04|杨禹||| +|6|2024.02.11|||| +|7|2024.02.18|||| +|8|2024.02.25|武昊天||| +|6|2024.03.03|张凌铭||| +|7|2024.03.10|刘昕鹏||| +|8|2024.03.17|李秉政||| +|9|2024.03.24|江世昊||| +|10|2024.03.31|林型双||| +|11|2024.04.07|侯黎阳||| +|12|2024.04.14|张乔||| +|13|2024.04.21|杨禹||| +|14|2024.04.28|梁红||| +|15|2024.05.05|许嘉诚||| +|16|2024.05.12|肖潇||| +|17|2024.05.19|祝遥||| +|18|2024.05.26|常博宇||| +|19|2024.06.02|夏亦凡||| +|20|2024.06.09|张凌铭||| +|21|2024.06.16|刘昕鹏||| +|22|2024.06.23|武昊天||| +|23|2024.06.30|杨禹||| +|24|2024.07.07|林型双||| +|25|2024.07.14|江世昊||| +|26|2024.07.21|梁红||| +|27|2024.07.28|李秉政||| +|28|2024.08.04|肖潇||| +|29|2024.08.11|常博宇||| +|30|2024.08.18|刘昕鹏||| +|31|2024.08.25|林型双||| +|32|2024.09.01|夏亦凡||| +|33|2024.09.08|祝遥||| +|34|2024.09.15|张凌铭||| +|35|2024.09.22|杨禹||| +|36|2024.09.29|刘昕鹏||| +|37|2024.10.06|江世昊||| +|38|2024.10.13|常博宇||| +|39|2024.10.20|夏亦凡||| +|40|2024.10.27|林型双||| +|41|2024.11.03|江世昊||| +|42|2024.11.10|黄钢||| +|43|2024.11.17|张凌铭||| +|44|2024.11.24|祝遥||| +|45|2024.12.01|李秉政||| +|46|2024.12.08|刘昕鹏||| +|47|2024.12.15|林型双||| +|48|2024.12.22|杨禹||| +|49|2024.12.29|常博宇||| + + + + +
+ + + diff --git a/Seminar2025/README.md b/Seminar2025/README.md new file mode 100644 index 0000000..e9bcf8b --- /dev/null +++ b/Seminar2025/README.md @@ -0,0 +1,129 @@ +# Agenda 2025 +Please upload your **slides** or a **introduction (Chinese or English)** of your presentation **in advance**, +such as **conference, title, abstract**,which can be written in the form of [markdown](http://sspai.com/25137). Please add your title in the agenda. + + +## AI Security Group Meeting +**Location**:Cao Guangbiao High-tech Building 201 + +**Time**: Friday 18:00 + +
+ +||Date|Speaker|Title|Publication| +|---|:---:|:---:|:---:|:---:| +|1|2025.01.03|曾睿|BAIT: Large Language Model Backdoor Scanning by Inverting Attack Target|IEEE S&P 2025| +|2|2025.01.10|赵芷茗|Emulated Disalignment: Safety Alignment for Large Language Models May Backfire!|ACL 2024| +|3|2025.01.17|||| +|4|2025.01.24|||| +|5|2025.01.31|||| +|6|2025.02.07|||| +|7|2025.02.14|||| +|8|2025.02.21|冯周|Towards Backdoor Stealthiness in Model Parameter Space|Preprint 2025| +|9|2025.02.28|甘雨由|Systematic review of the development of open-source multimodal large language models|-| +|10|2025.03.07|王异鸣|Rethinking the Invisible Protection against Unauthorized Image Usage in Stable Diffusion|Usenix Security 2024| +|11|2025.03.14|李欣迪|Stealthy Backdoor Attack in Self-Supervised Learning Vision Encoders for Large Vision Language Models|CVPR 2025| +|12|2025.03.21|陈曦|Deliberative Alignment Reasoning Enables Safer Language Models|OpenAI| +|13|2025.03.28|贺兴|DIAGNOSIS: Detecting Unauthorized Data Usages in Text-to-Image Diffusion Models|ICLR 2024| +|14|2024.04.04|李俊豪|Air Gap: Protecting Privacy-Conscious Conversational Agents|CCS 2024| +|15|2025.04.11|陈佳豪|On the Security and Privacy Risks of Model Content Protocol|| +|16|2025.04.18|张铃沛|CS-LSTMs: Context and Seasonal LSTMs for Time Series Anomaly Detection|| +|17|2025.04.25|张童|Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution|NDSS 2024| +|18|2025.05.02|刘家宁|AutoDAN-Turbo: A Lifelong Agent for Strategy Self-Exploration to Jailbreak LLMs|ICLR 2025| +|19|2025.05.09|曾睿|DataSentinel: A Game-Theoretic Detection of Prompt Injection Attacks|SP 2025| +|20|2025.05.16|周豪杰|SELFDEFEND: LLMs Can Defend Themselves against Jailbreaking in a Pratical Manner|USENIX Security 2025| +|21|2025.05.23|冯周|Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems|USENIX Security 2025| +|22|2025.05.30|赵芷茗|Safety Alignment Should Be Made More Than Just A Few Tokens Deep|ICLR 2025| +|23|2025.06.06|杨勇|Alleviating the Fear of Losing Alignment in LLM Fine-Tuning|SP 2025| +|24|2025.06.13|王异鸣|DORMANT: Defending against Pose-driven Human Image Animation|USENIX Security 2025| +|25|2025.06.20|麻瓯勃|Loss of Plasticity in Deep Reinforcement Learning|| +|26|2025.06.27|李俊豪|Doxing via the Lens: Revealing Location-related Privacy Leakage on Multi-modal Large Reasoning Models|arXiv| +|27|2025.07.04|李欣迪|Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink|USENIX Security 2025| +|28|2025.07.11|贺兴|Fuzz-Testing Meets LLM-Based Agents: An Automated and Efficient Framework for Jailbreaking Text-To-Image Generation Models|SP 2025| +|29|2025.07.18|陈佳豪|Delving into the Privacy Risks of Generative Models|| +|30|2025.07.25|陈曦|BadRobot: Jailbreaking Embodied LLMs in the Physical World|ICLR 2025| +|31|2025.08.01|林瑞潇|Industrial Frameworks of LLM-based Multi-Agent Systems|| +|32|2025.08.08|张童|Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models|USENIX Security 2025| +|33|2025.08.15|周豪杰|Safety Layers in Aligned Large Language Models: The Key to LLM Security|ICLR 2025| +|34|2025.08.22|甘雨由|SafeNeuron: Detecting Jailbreaking in Large Vision Language Model via Locating Critical Neurons|AAAI 2025| +|35|2025.08.29|冯周|SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis|USENIX Security 2025| +|36|2025.09.05|曾睿|Cloak, Honey, Trap: Proactive Defenses Against LLM Agents|USENIX Security 2025| +|37|2025.09.12|王异鸣|Exposing the Guardrails: Reverse-Engineering and Jailbreaking Safety Filters in DALL·E Text-to-Image Pipelines|USENIX Security 2025| +|38|2025.09.19|姜毅|Cascading Adversarial Bias from Injection to Distillation in Language Models|CCS 2025| +|39|2025.09.26|刘家宁|We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs|USENIX Security 2025| +|40|2025.10.03|赵芷茗|Test-Time Poisoning Attacks Against Test-Time Adaptation Models|SP 2024| +|41|2025.10.10|李欣迪||| +|42|2025.10.17|陈佳豪||| +|43|2025.10.24|张铃沛||| +|44|2025.10.31|陈曦||| +|45|2025.11.07|李俊豪||| +|46|2025.11.14|贺兴||| +|47|2025.11.21|职巳杰|||| +|48|2025.11.28|吴柏祺|||| +|49|2025.12.05|朱富康|||| +|50|2025.12.12|周豪杰|||| +|51|2025.12.19|王露怡|||| +|52|2025.12.26|张童|||| + +## System Security Group Meeting +**Location**:Cao Guangbiao High-tech Building 201 + +**Time**: Sunday 18:00 + +
+ +||Date|Speaker|Title|Publication| +|---|:---:|:---:|:---:|:---:| +|1|2025.01.05|李秉政|SymBisect: Accurate Bisection for Fuzzer-Exposed Vulnerabilities|Usenix Security 2024| +|2|2025.01.12|黄钢|Can LLMs Obfuscate Code? A Systematic Analysis of Large Language Models into Assembly Code Obfuscation|AAAI 2025| +|3|2025.01.19|刘昕鹏|Unveiling IoT Security in Reality: A Firmware-Centric Journey|Usenix Security 2024| +|4|2025.01.26|||| +|5|2025.02.02|||| +|6|2025.02.09|||| +|7|2025.02.16|||| +|8|2025.02.23|江世昊|GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards|NDSS 2024| +|9|2025.03.02|张凌铭|CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing|Usenix Security 2023| +|10|2025.03.09|祝遥|Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection|NDSS 2025| +|11|2025.03.16|常博宇|SpecRover: Code Intent Extraction via LLMs|ICSE 2025| +|12|2025.03.23|杨禹|AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-Service|TIFS 2024| +|13|2025.03.30|林型双|PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation|NDSS 2025| +|14|2025.04.06|武旗龙|Large Language Models for Code Analysis : Do LLMs Really Do Their Job?|USENIX Security 2024| +|15|2025.04.13|李秉政|ARTEMIS: Toward Accurate Detection of Server-Side Request Forgeries through LLM-Assisted Inter-procedural Path-Sensitive Taint Analysis|OOPSLA 2025| +|16|2025.04.20|黄钢|kAPR: LLM-assisted Automated Program Repair on Linux Kernel|Personal Progress Report| +|17|2025.04.27|刘昕鹏|Static Analysis for (RTOS-Based) Firmware|Personal Progress Report| +|18|2025.05.04|江世昊|Inside Your Robot Dog Friend: Architecture and Security Challenges of Embodied AI Intelligent Unmanned Systems|Personal Progress Report| +|19|2025.05.11|张凌铭|The Case for Learned Provenance-based System Behavior Baseline|ICML 2025| +|20|2025.05.18|祝遥|Fuzzing across JavaScript and WebAssembly Language Boundary|Personal Progress Report| +|21|2025.05.25|杨禹|An Empirical Study on EDR Systems’ Robustness against Attack Mutations by LLMs|Personal Progress Report| +|22|2025.06.01|常博宇|Towards Patch Correctness Assessment|Personal Progress Report| +|23|2025.06.08|林型双|CompliGuard: Detecting Reusable Components Usage Logical Noncompliance in Smart Contracts|Personal Progress Report| +|24|2025.06.15|黄钢|HAFE: A Hybrid and Automated PHP WebShell Obfuscation Technique with Branch-Oriented Control and Variable Functions for Detection Evasion|Personal Progress Report| +|25|2025.06.22|武旗龙|FLLMBackdoor : Stealthy Injection and Triggering in Malicious LLM Deployment Frameworks|Personal Progress Report| +|26|2025.06.29|祝遥|What We Talk About When We Talk About Logs: Understanding the Effects of Dataset Quality on Endpoint Threat Detection Research|IEEE S&P 2025| +|27|2025.07.06|张凌铭|RepairAgent: An Autonomous, LLM-Based Agent for Program Repair|ICSE 2025| +|28|2025.07.13|林型双|Copy-and-Paste? Identifying EVM-Inequivalent Code Smells in Multi-chain Reuse Contracts|ISSTA 2025| +|29|2025.07.20|江世昊|Demystifying RCE Vulnerabilities in LLM-Integrated Apps|CCS 2024| +|30|2025.07.27|刘昕鹏|Stealthy and Persistent Attacks Leveraging AI-IDE|Personal Progress Report| +|31|2025.08.03|杨禹|Generating API Parameter Security Rules with LLM for API Misuse Detection|NDSS 2025| +|32|2025.08.10|常博宇|COMMITSHIELD: Tracking Vulnerability Introduction and Fix in Version Control Systems|ICSE 2025| +|33|2025.08.17|黄钢|An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection|USENIX Security 2024| +|34|2025.08.24|江世昊|BadRobot: Manipulating Embodied LLMs in the Physical World|ICLR 2025| +|35|2025.08.31|张凌铭|Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection|ISSTA 2025| +|36|2025.09.07|刘昕鹏|UntrustIDE: Exploiting Weaknesses in VS Code Extensions|NDSS 2024| +|37|2025.09.14|祝遥|AutoLabel: Automated Fine-Grained Log Labeling for Cyber Attack Dataset Generation|USENIX Security 2025| +|38|2025.09.21|林型双|Forge: An LLM-driven Framework for Large-Scale Smart Contract Vulnerability Dataset Construction|ICSE 2026| +|39|2025.09.28|武旗龙|The philosopher's stone: Trojaning plugins of large language models|NDSS 2025| +|40|2025.10.05|常博宇|PATCHAGENT: A Practical Program Repair Agent Mimicking Human Expertise|USENIX Security 2025| +|41|2025.10.12|杨禹||| +|42|2025.10.19|徐博|||| +|43|2025.10.26|江世昊|||| +|44|2025.11.02|王晋文|||| +|45|2025.11.09|张宁瑞|||| +|46|2025.11.16|林型双|||| +|47|2025.11.23|祝遥|||| +|48|2025.11.30|武旗龙|||| +|49|2025.12.07|黄钢|||| +|50|2025.12.14|张凌铭|||| +|51|2025.12.21|刘昕鹏|||| +|52|2025.12.28|常博宇|||| + diff --git a/Seminar2026/README.md b/Seminar2026/README.md new file mode 100644 index 0000000..a8fe511 --- /dev/null +++ b/Seminar2026/README.md @@ -0,0 +1,51 @@ + + +# Agenda 2026 +Please upload your **slides** or a **introduction (Chinese or English)** of your presentation **in advance**, +such as **conference, title, abstract**,which can be written in the form of [markdown](http://sspai.com/25137). Please add your title in the agenda. + + +## AI Security Group Meeting +**Location**:Cao Guangbiao High-tech Building 201 + +**Time**: Friday 18:00 + +
+ +||Date|Speaker|Title|Sharer| +|---|:---:|:---:|:---:|:---:| +|1|2026.01.02|章琦|||| +|2|2026.01.09|陈佳豪|||| +|3|2026.01.16|刘家宁|||| +|4|2026.01.23|赵芷茗|||| +|5|2026.01.30|曾睿|||| +|6|2026.02.06|王异鸣|||| +|7|2026.02.13||||| +|8|2026.02.20||||| +|9|2026.02.27|张铃沛|||| +|10|2026.03.06|陈曦|||| +|11|2026.03.13|冯周|||| +|12|2026.03.20|丁婉蒙|||| +|13|2026.03.27|贺兴|||| +|14|2026.04.03|李欣迪|||| +|15|2026.04.10|李俊豪|||| + +## System Security Group Meeting +**Location**:Cao Guangbiao High-tech Building 201 + +**Time**: Sunday 18:00 + +
+ +||Date|Speaker|Title|Sharer| +|---|:---:|:---:|:---:|:---:| +|1|2026.01.04|徐博|||| +|2|2026.01.11|江世昊|||| +|3|2026.01.18|王晋文|||| +|4|2026.01.25|张宁瑞|||| +|5|2026.02.01|武旗龙|||| +|6|2026.02.08|黄钢|||| +|7|2026.02.15||||| +|8|2026.02.22||||| +|9|2026.03.01|张凌铭|||| +|10|2026.03.08|常博宇||||