Please upload your slides or a introduction (Chinese or English) of your presentation in advance, such as conference, title, abstract,which can be written in the form of markdown. Please add your title in the agenda.
Location:Cao Guangbiao High-tech Building 201
Time: Friday 18:00
Date | Speaker | Title | Publication | |
---|---|---|---|---|
1 | 2025.01.03 | 曾睿 | BAIT: Large Language Model Backdoor Scanning by Inverting Attack Target | IEEE S&P 2025 |
2 | 2025.01.10 | 赵芷茗 | Emulated Disalignment: Safety Alignment for Large Language Models May Backfire! | ACL 2024 |
3 | 2025.01.17 | |||
4 | 2025.01.24 | |||
5 | 2025.01.31 | |||
6 | 2025.02.07 | |||
7 | 2025.02.14 | |||
8 | 2025.02.21 | 冯周 | Towards Backdoor Stealthiness in Model Parameter Space | Preprint 2025 |
9 | 2025.02.28 | 甘雨由 | Systematic review of the development of open-source multimodal large language models | - |
10 | 2025.03.07 | 王异鸣 | Rethinking the Invisible Protection against Unauthorized Image Usage in Stable Diffusion | Usenix Security 2024 |
11 | 2025.03.14 | 李欣迪 | Stealthy Backdoor Attack in Self-Supervised Learning Vision Encoders for Large Vision Language Models | CVPR 2025 |
12 | 2025.03.21 | 李俊豪 | ||
13 | 2025.03.28 | 贺兴 | ||
14 | 2024.04.04 | 陈曦 | ||
15 | 2025.04.11 | 陈佳豪 | ||
16 | 2025.04.18 | 刘家宁 | ||
17 | 2025.04.25 | 张童 | ||
18 | 2025.05.02 | 张铃沛 | ||
19 | 2025.05.09 | 曾睿 | ||
20 | 2025.05.16 | 周豪杰 | ||
21 | 2025.05.23 | 冯周 | ||
22 | 2025.05.30 | 赵芷茗 | ||
23 | 2025.06.06 | 杨勇 | ||
24 | 2025.06.13 | 麻瓯勃 | ||
25 | 2025.06.20 | 王异鸣 | ||
26 | 2025.06.27 | 李俊豪 | ||
27 | 2025.07.04 | 李欣迪 | ||
28 | 2025.07.11 | 贺兴 | ||
29 | 2025.07.18 | 陈佳豪 | ||
30 | 2025.07.25 | 陈曦 | ||
31 | 2025.08.01 | 林瑞潇 | ||
32 | 2025.08.08 | 姜毅 | ||
33 | 2025.08.15 | 甘雨由 | ||
34 | 2025.08.22 | 周豪杰 | ||
35 | 2025.08.29 | 张童 | ||
36 | 2025.09.05 | 曾睿 | ||
37 | 2025.09.12 | 冯周 | ||
38 | 2025.09.19 | 赵芷茗 | ||
39 | 2025.09.26 | 刘家宁 | ||
40 | 2025.10.03 | 王异鸣 | ||
41 | 2025.10.10 | 李欣迪 | ||
42 | 2025.10.17 | 陈佳豪 | ||
43 | 2025.10.24 | 张铃沛 | ||
44 | 2025.10.31 | 陈曦 | ||
45 | 2025.11.07 | 李俊豪 | ||
46 | 2025.11.14 | 贺兴 |
Location:Cao Guangbiao High-tech Building 201
Time: Sunday 18:00
Date | Speaker | Title | Publication | |
---|---|---|---|---|
1 | 2025.01.05 | 李秉政 | SymBisect: Accurate Bisection for Fuzzer-Exposed Vulnerabilities | Usenix Security 2024 |
2 | 2025.01.12 | 黄钢 | Can LLMs Obfuscate Code? A Systematic Analysis of Large Language Models into Assembly Code Obfuscation | AAAI 2025 |
3 | 2025.01.19 | 刘昕鹏 | Unveiling IoT Security in Reality: A Firmware-Centric Journey | Usenix Security 2024 |
4 | 2025.01.26 | |||
5 | 2025.02.02 | |||
6 | 2025.02.09 | |||
7 | 2025.02.16 | |||
8 | 2025.02.23 | 江世昊 | GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards | NDSS 2024 |
9 | 2025.03.02 | 张凌铭 | CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing | Usenix Security 2023 |
10 | 2025.03.09 | 祝遥 | Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection | NDSS 2025 |
11 | 2025.03.16 | 常博宇 | SpecRover: Code Intent Extraction via LLMs | ICSE 2025 |
12 | 2025.03.23 | 杨禹 | ||
13 | 2025.03.30 | 林型双 | ||
14 | 2025.04.06 | 武旗龙 | ||
15 | 2025.04.13 | 李秉政 | ||
16 | 2025.04.20 | 黄钢 | ||
17 | 2025.04.27 | 刘昕鹏 | ||
18 | 2025.05.04 | 江世昊 | ||
19 | 2025.05.11 | 张凌铭 | ||
20 | 2025.05.18 | 祝遥 | ||
21 | 2025.05.25 | 杨禹 | ||
22 | 2025.06.01 | 常博宇 | ||
23 | 2025.06.08 | 林型双 | ||
24 | 2025.06.15 | 黄钢 | ||
25 | 2025.06.22 | 武旗龙 | ||
26 | 2025.06.29 | 祝遥 | ||
27 | 2025.07.06 | 张凌铭 | ||
28 | 2025.07.13 | 林型双 | ||
29 | 2025.07.20 | 江世昊 | ||
30 | 2025.07.27 | 刘昕鹏 | ||
31 | 2025.08.03 | 杨禹 | ||
32 | 2025.08.10 | 常博宇 | ||
33 | 2025.08.17 | 黄钢 | ||
34 | 2025.08.24 | 江世昊 | ||
35 | 2025.08.31 | 张凌铭 | ||
36 | 2025.09.07 | 刘昕鹏 | ||
37 | 2025.09.14 | 祝遥 | ||
38 | 2025.09.21 | 林型双 | ||
39 | 2025.09.28 | 武旗龙 | ||
40 | 2025.10.05 | 常博宇 | ||
41 | 2025.10.12 | 杨禹 |