Cong Wu

Orcid: 0000-0002-0930-0283

Affiliations:
  • Wuhan University, School of Cyber Science and Engineering, China


According to our database1, Cong Wu authored at least 55 papers between 2019 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
CANDICE: An explainable and intelligent framework for network intrusion detection.
Future Gener. Comput. Syst., 2026

2025
CSIPose: Unveiling Human Poses Using Commodity WiFi Devices Through the Wall.
IEEE Trans. Mob. Comput., October, 2025

Fine-Grained Code Clone Detection by Keywords-Based Connection of Program Dependency Graph.
IEEE Trans. Reliab., September, 2025

HeadSonic: Usable Bone Conduction Earphone Authentication via Head-Conducted Sounds.
IEEE Trans. Mob. Comput., September, 2025

HT-Auth: Secure VR Headset Authentication via Subtle Head Tremors.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., September, 2025

EyeAuth: smartphone user authentication via reflexive eye movements.
Frontiers Comput. Sci., September, 2025

Universal and Efficient Adversarial Training Framework With Membership Inference Resistance.
IEEE Internet Things J., June, 2025

Defensive Adversarial CAPTCHA: A Semantics-Driven Framework for Natural Adversarial Example Generation.
CoRR, June, 2025

Towards Effective Detection of Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph.
ACM Trans. Softw. Eng. Methodol., May, 2025

CSI2Dig: Recovering Digit Content from Smartphone Loudspeakers Using Channel State Information.
CoRR, April, 2025

DynaShard: Secure and Adaptive Blockchain Sharding Protocol With Hybrid Consensus and Dynamic Shard Management.
IEEE Internet Things J., March, 2025

Perseus: Tracing the Masterminds Behind Cryptocurrency Pump-and-Dump Schemes.
CoRR, March, 2025

Exploiting Vulnerabilities in Speech Translation Systems through Targeted Adversarial Attacks.
CoRR, March, 2025

WAFBOOSTER: Automatic Boosting of WAF Security Against Mutated Malicious Payloads.
CoRR, January, 2025

LEO-Split: A Semi-Supervised Split Learning Framework over LEO Satellite Networks.
CoRR, January, 2025

$\mathsf{TCG}\text{-}\mathsf{IDS}$ : Robust Network Intrusion Detection via Temporal Contrastive Graph Learning.
IEEE Trans. Inf. Forensics Secur., 2025

Profit or Deceit? Mitigating Pump and Dump in DeFi via Graph and Contrastive Learning.
IEEE Trans. Inf. Forensics Secur., 2025

Forward-Secure Hierarchical Delegable Signature for Smart Homes.
IEEE Trans. Inf. Forensics Secur., 2025

SCR-Auth: Secure Call Receiver Authentication on Smartphones Using Outer Ear Echoes.
IEEE Trans. Inf. Forensics Secur., 2025

Detecting DeFi Fraud With a Graph-Transformer Language Model.
IEEE Trans. Inf. Forensics Secur., 2025

Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing.
IEEE Trans. Inf. Forensics Secur., 2025

Unveiling the Superiority of Unsupervised Learning on GPU Cryptojacking Detection: Practice on Magnetic Side Channel-Based Mechanism.
IEEE Trans. Inf. Forensics Secur., 2025

High Accuracy and Presentation Attack Resistant Hand Authentication via Acoustic Sensing for Commodity Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2025

WAFBooster: Automatic Boosting of WAF Security Against Mutated Malicious Payloads.
IEEE Trans. Dependable Secur. Comput., 2025

Sanitizable Cross-Domain Access Control With Policy-Driven Dynamic Authorization.
IEEE Trans. Dependable Secur. Comput., 2025

SIGFinger: A Subtle and Interactive GNN Fingerprinting Scheme Via Spatial Structure Inference Perturbation.
IEEE Trans. Dependable Secur. Comput., 2025

SmartShot: Hunt Hidden Vulnerabilities in Smart Contracts using Mutable Snapshots.
Proc. ACM Softw. Eng., 2025

HeteroSample: Meta-Path Guided Sampling for Heterogeneous Graph Representation Learning.
IEEE Internet Things J., 2025

ESL-LEO: An Efficient Split Learning Framework over LEO Satellite Networks.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2025

PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage.
Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2025

Prompt as a Double-Edged Sword: A Dynamic Equilibrium Gradient-Assigned Attack against Graph Prompt Learning.
Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining, V.2, 2025

StealthHub: Utxo-Based Stealth Address Protocol.
Proceedings of the IEEE International Conference on Web Services, 2025

2024
An Efficient Privacy-Aware Split Learning Framework for Satellite Communications.
IEEE J. Sel. Areas Commun., December, 2024

HCR-Auth: Reliable Bone Conduction Earphone Authentication with Head Contact Response.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., November, 2024

It's All in the Touch: Authenticating Users With HOST Gestures on Multi-Touch Screen Devices.
IEEE Trans. Mob. Comput., October, 2024

WiFiLeaks: Exposing Stationary Human Presence Through a Wall With Commodity Mobile Devices.
IEEE Trans. Mob. Comput., June, 2024

Rethinking Membership Inference Attacks Against Transfer Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Benchmarking ZK-Friendly Hash Functions and SNARK Proving Systems for EVM-compatible Blockchains.
CoRR, 2024

Privacy-preserving Universal Adversarial Defense for Black-box Models.
CoRR, 2024

Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems.
CoRR, 2024

CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning.
CoRR, 2024

EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing.
CoRR, 2024

MagLive: Near-Field Magnetic Sensing-Based Voice Liveness Detection on Smartphones.
CoRR, 2024

On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder.
CoRR, 2024

Shield-U: Safeguarding Traffic Sign Recognition Against Perturbation Attacks.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024

PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG).
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023

Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors.
IEEE Trans. Dependable Secur. Comput., 2022

EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2020
CaIAuth: Context-Aware Implicit Authentication When the Screen Is Awake.
IEEE Internet Things J., 2020

Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
ICAuth: Implicit and Continuous Authentication When the Screen Is Awake.
Proceedings of the 2019 IEEE International Conference on Communications, 2019


  Loading...