Cong Wu
Orcid: 0000-0002-0930-0283Affiliations:
- Wuhan University, School of Cyber Science and Engineering, China
According to our database1,
Cong Wu
authored at least 46 papers
between 2019 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IEEE Trans. Mob. Comput., September, 2025
Frontiers Comput. Sci., September, 2025
Universal and Efficient Adversarial Training Framework With Membership Inference Resistance.
IEEE Internet Things J., June, 2025
Defensive Adversarial CAPTCHA: A Semantics-Driven Framework for Natural Adversarial Example Generation.
CoRR, June, 2025
Towards Effective Detection of Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph.
ACM Trans. Softw. Eng. Methodol., May, 2025
CSI2Dig: Recovering Digit Content from Smartphone Loudspeakers Using Channel State Information.
CoRR, April, 2025
DynaShard: Secure and Adaptive Blockchain Sharding Protocol With Hybrid Consensus and Dynamic Shard Management.
IEEE Internet Things J., March, 2025
CoRR, March, 2025
Exploiting Vulnerabilities in Speech Translation Systems through Targeted Adversarial Attacks.
CoRR, March, 2025
CoRR, January, 2025
CoRR, January, 2025
$\mathsf{TCG}\text{-}\mathsf{IDS}$ : Robust Network Intrusion Detection via Temporal Contrastive Graph Learning.
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Inf. Forensics Secur., 2025
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing.
IEEE Trans. Inf. Forensics Secur., 2025
Unveiling the Superiority of Unsupervised Learning on GPU Cryptojacking Detection: Practice on Magnetic Side Channel-Based Mechanism.
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Dependable Secur. Comput., 2025
IEEE Trans. Dependable Secur. Comput., 2025
SIGFinger: A Subtle and Interactive GNN Fingerprinting Scheme Via Spatial Structure Inference Perturbation.
IEEE Trans. Dependable Secur. Comput., 2025
Proc. ACM Softw. Eng., 2025
HeteroSample: Meta-Path Guided Sampling for Heterogeneous Graph Representation Learning.
IEEE Internet Things J., 2025
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2025
PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage.
Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2025
2024
IEEE J. Sel. Areas Commun., December, 2024
HCR-Auth: Reliable Bone Conduction Earphone Authentication with Head Contact Response.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., November, 2024
It's All in the Touch: Authenticating Users With HOST Gestures on Multi-Touch Screen Devices.
IEEE Trans. Mob. Comput., October, 2024
WiFiLeaks: Exposing Stationary Human Presence Through a Wall With Commodity Mobile Devices.
IEEE Trans. Mob. Comput., June, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Benchmarking ZK-Friendly Hash Functions and SNARK Proving Systems for EVM-compatible Blockchains.
CoRR, 2024
Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems.
CoRR, 2024
CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning.
CoRR, 2024
EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Proceedings of the 23rd IEEE International Conference on Trust, 2024
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024
PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG).
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023
Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2023
2022
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors.
IEEE Trans. Dependable Secur. Comput., 2022
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2020
IEEE Internet Things J., 2020
Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020
2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019