Agenda 2018

Please upload your slides or a introduction (Chinese or English) of your presentation in advance, such as conference, title, abstract,which can be written in the form of markdown. Please add your title in the agenda.

Location: Caoguangbiao-201

Time: 18:00-20:00 Welcome to attend the seminar!

Date Speaker Title
1 2018.1.5 施程辉
唐凯宇
DANCin SEQ2SEQ: Fooling Text Classifiers with Adversarial Text Example Generation
ADVERSARIAL EXAMPLES IN THE PHYSICAL WORLD
2 2018.1.12 徐晓刚
王博
Adversarial Attacks on Neural Network Policies
Meltdown & Spectre
3 2018.1.19 刘沛宇
陈源
Broken Fingers: On the Usage of the Fingerprint API in Android
Didn’t You Hear Me? — Towards More Successful Web Vulnerability Notifications
4 2018.1.26 卢令令
李长江
BLOCKBENCH: A Framework for Analyzing Private Blockchains
Feature Squeezing:Detecting Adversarial Examples in Deep Neural Networks
5 2018.2.2 杜天宇
李进锋
Trojaning Attack on Neural Networks
Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data
6 2018.2.9
Report
7 2018.2.24 李宇薇
刘倩君
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection(CCS-17).
8 2018.3.2 凌祥
李旭嵘
Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong
WHITENING BLACK-BOX NEURAL NETWORKS
9 2018.3.9 伍一鸣
刘倩君
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations
When coding style survives compilation: de-anonymizing programmers from executable binaries.
10 2018.3.16 翁海琴
贺思睿

Machine Learning Models that Remember Too Much
11 2018.3.23 周骏丰
魏成坤
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection
IKP: Turning a PKI Around with Decentralized Automated Incentives
12 2018.3.30 唐凯宇
吕晨阳
Knock Knock, Who’s There? Membership Inference on Aggregate Location Data
13 2018.4.6 段辅正
肖特嗣
14 2018.4.13 刘栩威
陈源
15 2018.4.20 周安妮
付丽嫆
16 2018.4.27 冯依南
刘丁豪
17 2018.5.4 王博
李长江
18 2018.5.11 杜天宇
李进锋
19 2018.5.18 施程辉
刘沛宇
20 2018.5.25 伍一鸣
李宇薇
21 2018.6.1 刘倩君
魏成坤
22 2018.6.8 陈源
吕晨阳
23 2018.6.15 王博
唐凯宇
24 2018.6.22
贺思睿