Sitemap
A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.
Pages
Posts
Future Blog Post
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml
and set future: false
.
Blog Post number 4
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 3
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 2
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 1
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
portfolio
Portfolio item number 1
Short description of portfolio item number 1
Portfolio item number 2
Short description of portfolio item number 2
publications
Paper Title Number 1
Published in Journal 1, 2009
This paper is about the number 1. The number 2 is left for future work.
Recommended citation: Your Name, You. (2009). "Paper Title Number 1." Journal 1. 1(1).
Download Paper | Download Slides
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models
Published in In the proceedings of Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Use Google Scholar for full citation
Recommended citation: Jiawei Liu, Yangyang Kang, Di Tang, Kaisong Song, Changlong Sun, Xiaofeng Wang, Wei Lu, Xiaozhong Liu, "Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models." In the proceedings of Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022.
Seeing the Forest for the Trees: Understanding Security Hazards in the \(3GPP\) Ecosystem through Intelligent Analysis on Change Requests
Published in In the proceedings of 31st USENIX Security Symposium (USENIX Security 22), 2022
Use Google Scholar for full citation
Recommended citation: Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao, "Seeing the Forest for the Trees: Understanding Security Hazards in the $$3GPP$$ Ecosystem through Intelligent Analysis on Change Requests." In the proceedings of 31st USENIX Security Symposium (USENIX Security 22), 2022.
Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models
Published in In the proceedings of 2022 IEEE Symposium on Security and Privacy (SP), 2022
Use Google Scholar for full citation
Recommended citation: Di Tang, Rui Zhu, Siyuan Tang, XiaoFeng Wang, Haixu Tang, "Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models." In the proceedings of 2022 IEEE Symposium on Security and Privacy (SP), 2022.
Gradient Shaping: Enhancing Backdoor Attack against Reverse Engineering
Published in In the proceedings of Network and Distributed Systems Security (NDSS) Symposium 2024, 2023
Use Google Scholar for full citation
Recommended citation: Rui Zhu, Di Tang, Siyuan Tang, Guanhong Tao, Shiqing Ma, XiaoFeng Wang, Haixu Tang, "Gradient Shaping: Enhancing Backdoor Attack against Reverse Engineering." In the proceedings of Network and Distributed Systems Security (NDSS) Symposium 2024, 2023.
\(HOMESPY\): The Invisible Sniffer of Infrared Remote Control of Smart \(TVs\)
Published in In the proceedings of 32nd USENIX Security Symposium (USENIX Security 23), 2023
Use Google Scholar for full citation
Recommended citation: Kong Huang, YuTong Zhou, Ke Zhang, Jiacen Xu, Jiongyi Chen, Di Tang, Kehuan Zhang, "$$HOMESPY$$: The Invisible Sniffer of Infrared Remote Control of Smart $$TVs$$." In the proceedings of 32nd USENIX Security Symposium (USENIX Security 23), 2023.
Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning
Published in In the proceedings of 32th USENIX Security Symposium (USENIX Security 23), 2023
Use Google Scholar for full citation
Recommended citation: Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, XiaoFeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu, "Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning." In the proceedings of 32th USENIX Security Symposium (USENIX Security 23), 2023.
Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples
Published in In the proceedings of 33th USENIX Security Symposium (USENIX Security 24), 2024
Use Google Scholar for full citation
Recommended citation: Dandan Xu, Di Tang, Yi Chen, XiaoFeng Wang, Kai Chen, Haixu Tang, Longxing Li, "Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples." In the proceedings of 33th USENIX Security Symposium (USENIX Security 24), 2024.
Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection
Published in In the proceedings of 33th USENIX Security Symposium (USENIX Security 24), 2024
Use Google Scholar for full citation
Recommended citation: Zihao Wang, Di Tang, XiaoFeng Wang, Wei He, Zhaoyang Geng, Wenhao Wang, "Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection." In the proceedings of 33th USENIX Security Symposium (USENIX Security 24), 2024.
talks
Talk 1 on Relevant Topic in Your Field
Published:
This is a description of your talk, which is a markdown file that can be all markdown-ified like any other post. Yay markdown!
Conference Proceeding talk 3 on Relevant Topic in Your Field
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
teaching
Teaching experience 1
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Teaching experience 2
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.