UCLA Security Lab
UCLA Security Lab
Tour
News
People
Events
Publications
Contact
Publications
Type
Conference paper
Date
2025
2024
2023
2022
2021
2020
2019
(2025).
SoK: Towards Effective Automated Vulnerability Repair
. In
USENIX Security
.
Cite
Code
Dataset
Video
Source Document
(2024).
Where have you been? A Study of Privacy Risk for Point-of-Interest Recommendation
. In
SIGKDD 2024
.
Cite
Code
Dataset
Video
Source Document
(2024).
Towards Real-time Voice Interaction Data Collection Monitoring and Ambient Light Privacy Notification for Voice-controlled Services
. In
USEC 2024
.
Cite
Code
Dataset
Video
Source Document
(2024).
BadMerging: Backdoor Attacks Against Model Merging
. In
CCS
.
Cite
Code
Dataset
Video
Source Document
(2024).
AuthSaber: Automated Safety Verification of OpenID Connect Programs
. In
CCS
.
Cite
Code
Dataset
Video
Source Document
(2024).
Alexa, is the skill always safe? Uncover Lenient Skill Vetting Process and Protect User Privacy at Run Time
. In
ICSE 2024
.
Cite
Code
Dataset
Video
Source Document
(2023).
Towards Usable Security Analysis Tools for Trigger-Action Programming
. In
SOUPS 2023
.
Cite
Code
Dataset
Video
Source Document
(2023).
SenRev: Measurement of Personal Information Disclosure in Online Health Communities
. In
PoPETs/PETS 2023
.
Cite
Code
Dataset
Video
Source Document
(2023).
Exploring Smart Commercial Building Occupants Perceptions and Notification Preferences of IoT Data Collection
. In
EuroSP 2023
.
Cite
Code
Dataset
Video
Source Document
(2023).
CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph
. In
NDSS 2023
.
Cite
Code
Dataset
Video
Source Document
(2022).
Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers
. In
USENIX Security 2022
.
Cite
Code
Dataset
Video
Source Document
(2022).
SkillBot: Identifying Risky Content for Children in Alexa Skills
. In
ACM TOIT
.
Cite
Code
Dataset
Video
Source Document
(2022).
Conditional Supervised Contrastive Learning for Fair Text Classification
. In
EMNLP Findings
.
Cite
Code
Dataset
Video
Source Document
(2021).
VerHealth: Vetting Medical Voice Applications through Policy Enforcement
. In
Ubicomp 2021
.
Cite
Code
Dataset
Video
Source Document
(2021).
Model-Targeted Poisoning Attacks with Provable Convergence
. In
ICML 2021
.
Cite
Code
Dataset
Video
Source Document
(2020).
TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications
. In
NDSS 2020
.
Cite
Code
Dataset
Video
Source Document
(2020).
Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems
. In
WWW 2020
.
Cite
Code
Dataset
Video
Source Document
(2020).
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries
. In
USENIX Security 2020
.
Cite
Code
Dataset
Video
Source Document
(2019).
Side Channel Attacks in GPU-Virtualization-Based Computation-Offload Systems
. In
SafeThings 2019
.
Code
Dataset
Video
Source Document
(2019).
Poster: Attack the Dedicated Short-Range Communication for Connected Vehicles
. In
Oakland 2019
.
Code
Dataset
Video
Source Document
(2019).
OAuthLint: An Empirical Study on OAuth Bugs in Android Applications
. In
ASE 2019
.
Code
Dataset
Video
Source Document
(2019).
Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users
. In
USENIX Security 2019
.
Code
Dataset
Video
Source Document
Cite
×