Publications
2025
2024
- TIFSRethinking Membership Inference Attacks Against Transfer LearningIEEE Transactions on Information Forensics and Security, 2024
- AsiaCCSCommand Hijacking on Voice-Controlled IoT in Amazon Alexa PlatformACM ASIA Conference on Computer and Communications Security, 2024
2023
- ICMLAAn Investigation of Large Language Models for Real-World Hate Speech DetectionIEEE International Conference on Machine Learning and Applications, 2023
- ASONAMUnderstanding and Analyzing COVID-19-related Online Hate Propagation Through Hateful Memes Shared on TwitterIEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2023
- TMCWiFiLeaks: Exposing Stationary Human Presence Through a Wall with Commodity Mobile DevicesIEEE Transactions on Mobile Computing, 2023
- SmartSPExploring Vulnerabilities in Voice Command Skills for Connected VehiclesEAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023
2022
2021
2020
- Book ChapterMitigating the CacheKit AttackFrontiers in Hardware Security and Trust: Theory, Design and Practice, 2020
2019
- US PatentSystems and methods for authenticating caller identity and call request header information for outbound telephony communications2019
2018
2017
2016
2015
2014
2013
- Book ChapterExamining Social Dynamics and Malware Secrets to Mitigate Net-centric AttacksHackers and Hacking: A Reference Handbook, 2013
2012
- ESORICS