Guangjing Wang Ph.D. Candidate

Conference Notes

2022-10-31

I find it engaging to document the topics covered in conference sessions as it provides us with a fundamental understanding of the prevailing trends in research areas.

ACM SenSys’2022

  • RF Sensing
  • New Applications
  • Low-power Systems
  • Lighting and Acoustic Sensing
  • Machine Learning for Mobile Systems
  • System for Voice, Speech and Video Processing

ACM CCS’2022

  • Applied Crypto
    • Digital Signatures
    • Digital Currencies and Blockchains
    • Zero-Knowledge
    • Cryptographic Protocols
    • Advanced Public-Key Encryption Schemes
    • Key Exchange
    • Security Multiparty Computation
    • Private-Set Intersection
    • Symmetric-Key Encryption and Attacks
  • Software Security
    • Fuzzing
    • Analysis
    • Information Leakage and Access Control
    • Hardware-Assisted Defense
    • Vulnerability Detection
    • Defenses and Virtualization-based Security
  • Web Security
    • Client Side Security
    • Server Side Security
    • Users Under Attack
  • Network Security
    • Internet Security
    • Cloud and IoT Security
    • Network Vulnerabilities
  • Cyber-Physical System
    • CPS and IoT Security
    • General Attacks and Defense
    • Side Channel Attacks
      • Hardware and Microarchitecture
  • Machine Learning
    • Poisoning and Backdooring ML
    • Inference Attacks to ML
    • ML for Network Security
    • Federated Learning Security
    • General Attacks to ML
    • Adversarial Examples in ML
  • Privacy and Anonymity
    • Secure Query Answering
    • Ads and Location Privacy
    • Online, Mobile, Multimedia Privacy
    • Privacy Attacks in ML
    • Privacy Preserving Machine Learning
    • Federated Analytics and Learning
    • Differential Privacy
    • Privacy in Graphs
  • Usability and Measurement
    • Finding Violations
    • Attacks
    • Security and Privacy Practices
  • Blockchain and Distributed System
  • Hardware Security

Content