Page Not Found
Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
This is a page not in th emain menu
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml
and set future: false
.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Short description of portfolio item number 1
Short description of portfolio item number 2
Published in IEEE Transactions on Industry Applications, 2019
This paper is about day-ahead scheduling of hydro and wind power generation system.
Download here
Published in IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2020
This paper is about hardware-based random number generator.
Download here
Published in IEEE Communications Surveys & Tutorials (IEEE COMST), 2021
This paper is about systemization of cyber-physical attacks.
Download here
Published in ACM Conference on Computer and Communications Security (CCS), 2021
This paper is about automatic auditing of privacy regulations.
Download here
Published in IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2022
This paper is about automatic generation of GhostTouch attacks against capacitive touch screen.
Download here
Published in ACM Conference on Computer and Communications Security (CCS), 2022
This paper is about generating and deliverying adversarial audio examples over IP network.
Download here
Published in ACM Conference on Computer and Communications Security (CCS), 2022
This paper is about using machine learning to detect hidden spy cameras within thermal images.
Download here
Published in IEEE Real-Time Systems Symposium (RTSS), 2022
This paper is about generting resource contention attack with primitives across multiple architectural and kernel-based channels.
Download here
Published in IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
This paper is about delaying LiDAR processing via adversarial purterbations on point clouds.
Published in International Conference on Machine Learning, 2023
This paper is about measuring potential intellectual property infringement of code generation models.
Download here
Published in USENIX Security Symposium, 2023
This paper is about generating semantic adversarial audio examples by perturbing prosody attributes.
Download here
Published in USENIX Security Symposium, 2023
This paper is about a defense-in-depth approach for medical 3D printing, leveraging medical CT and computational graphic techniques.
Download here
Published in ACM Conference on Computer and Communications Security (CCS), 2023
This paper is about a proactive defense against unauthorized speech synthesis (DeepFake) attacks.
Download here
Published in IEEE Symposium on Security and Privacy (SP), 2024
This paper is about membership inference attacks with the aid of XAI techniques.
Download here
Published in USENIX Security Symposium, 2024
This paper is about investigating LLM jailbreak threats, from the perspective of empirical evaluation and automatic generation.
Download here
Published in ACM Conference on Computer and Communications Security (CCS), 2024
This paper is about our defense-in-depth system that safeguards autonomous systems against physical realizable adversarial attacks. The defense relies on robust physical rules and holistic reasoning on the perceived scene.
Download here
Published:
This is a description of your talk, which is a markdown files that can be all markdown-ified like any other post. Yay markdown!
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
Graduate course, Washington University in St. Louis, Department of Computer Science and Engineering, 2022
Designed a lab module about physically realizable adversarial machine learning attack against autonomous vehicles (AVs). The students were guided to train and generate adversarial patches to be physically attached on stop sign and human body, such that they would not be recognized by Yolo recognition algorithm equipped on AVs. Real world experiments were conducted on a set-up Adeept Rasptank car in a simulated city.