Cong Wu

Orcid: 0000-0002-0930-0283

Affiliations:
  • Wuhan University, School of Cyber Science and Engineering, China


According to our database1, Cong Wu authored at least 46 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
HeadSonic: Usable Bone Conduction Earphone Authentication via Head-Conducted Sounds.
IEEE Trans. Mob. Comput., September, 2025

EyeAuth: smartphone user authentication via reflexive eye movements.
Frontiers Comput. Sci., September, 2025

Universal and Efficient Adversarial Training Framework With Membership Inference Resistance.
IEEE Internet Things J., June, 2025

Defensive Adversarial CAPTCHA: A Semantics-Driven Framework for Natural Adversarial Example Generation.
CoRR, June, 2025

Towards Effective Detection of Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph.
ACM Trans. Softw. Eng. Methodol., May, 2025

CSI2Dig: Recovering Digit Content from Smartphone Loudspeakers Using Channel State Information.
CoRR, April, 2025

DynaShard: Secure and Adaptive Blockchain Sharding Protocol With Hybrid Consensus and Dynamic Shard Management.
IEEE Internet Things J., March, 2025

Perseus: Tracing the Masterminds Behind Cryptocurrency Pump-and-Dump Schemes.
CoRR, March, 2025

Exploiting Vulnerabilities in Speech Translation Systems through Targeted Adversarial Attacks.
CoRR, March, 2025

WAFBOOSTER: Automatic Boosting of WAF Security Against Mutated Malicious Payloads.
CoRR, January, 2025

LEO-Split: A Semi-Supervised Split Learning Framework over LEO Satellite Networks.
CoRR, January, 2025

$\mathsf{TCG}\text{-}\mathsf{IDS}$ : Robust Network Intrusion Detection via Temporal Contrastive Graph Learning.
IEEE Trans. Inf. Forensics Secur., 2025

Forward-Secure Hierarchical Delegable Signature for Smart Homes.
IEEE Trans. Inf. Forensics Secur., 2025

SCR-Auth: Secure Call Receiver Authentication on Smartphones Using Outer Ear Echoes.
IEEE Trans. Inf. Forensics Secur., 2025

Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing.
IEEE Trans. Inf. Forensics Secur., 2025

Unveiling the Superiority of Unsupervised Learning on GPU Cryptojacking Detection: Practice on Magnetic Side Channel-Based Mechanism.
IEEE Trans. Inf. Forensics Secur., 2025

WAFBooster: Automatic Boosting of WAF Security Against Mutated Malicious Payloads.
IEEE Trans. Dependable Secur. Comput., 2025

Sanitizable Cross-Domain Access Control With Policy-Driven Dynamic Authorization.
IEEE Trans. Dependable Secur. Comput., 2025

SIGFinger: A Subtle and Interactive GNN Fingerprinting Scheme Via Spatial Structure Inference Perturbation.
IEEE Trans. Dependable Secur. Comput., 2025

SmartShot: Hunt Hidden Vulnerabilities in Smart Contracts using Mutable Snapshots.
Proc. ACM Softw. Eng., 2025

HeteroSample: Meta-Path Guided Sampling for Heterogeneous Graph Representation Learning.
IEEE Internet Things J., 2025

ESL-LEO: An Efficient Split Learning Framework over LEO Satellite Networks.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2025

PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage.
Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2025

2024
An Efficient Privacy-Aware Split Learning Framework for Satellite Communications.
IEEE J. Sel. Areas Commun., December, 2024

HCR-Auth: Reliable Bone Conduction Earphone Authentication with Head Contact Response.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., November, 2024

It's All in the Touch: Authenticating Users With HOST Gestures on Multi-Touch Screen Devices.
IEEE Trans. Mob. Comput., October, 2024

WiFiLeaks: Exposing Stationary Human Presence Through a Wall With Commodity Mobile Devices.
IEEE Trans. Mob. Comput., June, 2024

Rethinking Membership Inference Attacks Against Transfer Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Benchmarking ZK-Friendly Hash Functions and SNARK Proving Systems for EVM-compatible Blockchains.
CoRR, 2024

Privacy-preserving Universal Adversarial Defense for Black-box Models.
CoRR, 2024

Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems.
CoRR, 2024

CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning.
CoRR, 2024

EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing.
CoRR, 2024

MagLive: Near-Field Magnetic Sensing-Based Voice Liveness Detection on Smartphones.
CoRR, 2024

On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder.
CoRR, 2024

Shield-U: Safeguarding Traffic Sign Recognition Against Perturbation Attacks.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024

PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG).
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023

Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors.
IEEE Trans. Dependable Secur. Comput., 2022

EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2020
CaIAuth: Context-Aware Implicit Authentication When the Screen Is Awake.
IEEE Internet Things J., 2020

Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
ICAuth: Implicit and Continuous Authentication When the Screen Is Awake.
Proceedings of the 2019 IEEE International Conference on Communications, 2019


  Loading...