Liwei Song

ORCID: 0000-0003-4176-590X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Antenna Design and Optimization
  • Antenna Design and Analysis
  • Adversarial Robustness in Machine Learning
  • Advanced Antenna and Metasurface Technologies
  • Microwave Engineering and Waveguides
  • Privacy-Preserving Technologies in Data
  • Advanced Malware Detection Techniques
  • Numerical Methods and Algorithms
  • Electromagnetic Scattering and Analysis
  • Energy Harvesting in Wireless Networks
  • Anomaly Detection Techniques and Applications
  • Ethics and Social Impacts of AI
  • Full-Duplex Wireless Communications
  • Metallurgy and Material Forming
  • Network Security and Intrusion Detection
  • Cognitive Radio Networks and Spectrum Sensing
  • Advanced Algorithms and Applications
  • Advanced Measurement and Detection Methods
  • Laser-Matter Interactions and Applications
  • Wireless Networks and Protocols
  • User Authentication and Security Systems
  • Internet Traffic Analysis and Secure E-voting
  • Electric Motor Design and Analysis
  • Security and Verification in Computing
  • Electromagnetic Simulation and Numerical Methods

Xidian University
2015-2024

Shandong Jianzhu University
2023

Shandong University
2023

Princeton University
2017-2022

University of Massachusetts Amherst
2022

Institute of Research of Iron and Steel Shasteel
2021

Peking University
2015-2019

China Academy of Space Technology
2019

Fujian Normal University
2015

Harbin Institute of Technology
2010-2014

The arms race between attacks and defenses for machine learning models has come to a forefront in recent years, both the security community privacy community. However, one big limitation of previous research is that domain have typically been considered separately. It thus unclear whether defense methods will any unexpected impact on other domain. In this paper, we take step towards resolving by combining two domains. particular, measure success membership inference against six...

10.1145/3319535.3354211 article EN public-domain Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2019-11-06

In recent years, the research community has increasingly focused on understanding security and privacy challenges posed by deep learning models. However, domain have typically been considered separately. It is thus unclear whether defense methods in one will any unexpected impact other domain. this paper, we take a step towards enhancing our of models when two domains are combined together. We do measuring success membership inference attacks against state-of-the-art adversarial that...

10.1109/spw.2019.00021 article EN 2019-05-01

Machine learning models are prone to memorizing sensitive data, making them vulnerable membership inference attacks in which an adversary aims guess if input sample was used train the model. In this paper, we show that prior work on may severely underestimate privacy risks by relying solely training custom neural network classifiers perform and focusing only aggregate results over data samples, such as attack accuracy. To overcome these limitations, first propose benchmark improving existing...

10.48550/arxiv.2003.10595 preprint EN other-oa arXiv (Cornell University) 2020-01-01

When deploying machine learning models in real-world applications, an open-world framework is needed to deal with both normal in-distribution inputs and undesired out-of-distribution (OOD) inputs. Open-world frameworks include OOD detectors that aim discard input examples which are not from the same distribution as training data of classifiers. However, our understanding current limited setting benign data, open question whether they robust presence adversaries. In this paper, we present...

10.1145/3338501.3357372 article EN 2019-11-08

Liwei Song, Xinwei Yu, Hsuan-Tung Peng, Karthik Narasimhan. Proceedings of the 2021 Conference North American Chapter Association for Computational Linguistics: Human Language Technologies. 2021.

10.18653/v1/2021.naacl-main.291 article EN cc-by Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies 2021-01-01

This letter describes a synthesis method of uniformly excited, unequally spaced planar array with maximum beam collection efficiency based on the chaotic particle swarm optimization algorithm. Here, multiple constrains include number elements, aperture, minimum element spacing, and sidelobe level outside receiving region. Through this method, feeding network becomes simple compact. Effectiveness proposed is validated by comparing simulation results obtained in to those reported...

10.1109/lawp.2016.2555980 article EN IEEE Antennas and Wireless Propagation Letters 2016-04-21

Voice assistants like Siri enable us to control IoT devices conveniently with voice commands, however, they also provide new attack opportunities for adversaries. Previous papers obfuscated commands by leveraging the gap between speech recognition system and human perception. The limitation is that these are audible thus conspicuous device owners. In this paper, we propose a novel mechanism directly microphone used sensing data inaudible commands. We show adversary can exploit microphone's...

10.48550/arxiv.1708.07238 preprint EN other-oa arXiv (Cornell University) 2017-01-01

The right to be forgotten, also known as the erasure, is of individuals have their data erased from an entity storing it. status this long held notion was legally solidified recently by General Data Protection Regulation (GDPR) in European Union. Consequently, there a need for mechanisms whereby users can verify if service providers comply with deletion requests. In work, we take first step proposing formal framework study design such verification requests -- machine unlearning context...

10.48550/arxiv.2003.04247 preprint EN other-oa arXiv (Cornell University) 2020-01-01

The right to be forgotten, also known as the erasure, is of individuals have their data erased from an entity storing it. status this long held notion was legally solidified recently by General Data Protection Regulation (GDPR) in European Union. As a consequence, there need for mechanisms whereby users can verify if service providers comply with deletion requests. In work, we take first step proposing formal framework, called Athena, study design such verification requests – machine...

10.56553/popets-2022-0072 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2022-07-01

The device in conventional half-duplex (HD) WiFi networks cannot perform carrier sensing while data transmission, thus it suffers from long collision duration. To mitigate this problem, letter presents a new cross-layer protocol design based on CSMA/CD, which facilitates simultaneous and transmission by using the full-duplex (FD) technology. As FD technology introduces residual self-interference (RSI), we study two types of errors caused RSI against FD-WiFi (i.e., false alarm miss...

10.1109/lcomm.2016.2519518 article EN IEEE Communications Letters 2016-01-19

A novel stepped amplitude distribution (SAD) taper for microwave power transmission space solar satellite is proposed in this paper. The SAD described by the summation of Heaviside step functions. Through optimizing "height" and "radius" each descriptive function, maximal beam collection efficiency (BCE) with without constraints on radiation levels can be obtained. large set numerical experiments continuous apertures discrete antenna arrays are carried out. results show that obtained BCEs...

10.1109/tap.2017.2734061 article EN IEEE Transactions on Antennas and Propagation 2017-07-31

This article presents a low radar cross section (RCS) single-layer multifunctional shared aperture (MSA) with tunable manipulation of radiation and bistatic scattering patterns over the same wide frequency band. A low-cost positive-intrinsic-negative (p-i-n) diode is used in unit cell to evoke <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$180^{\circ } \pm 20^{\circ }$ </tex-math></inline-formula>...

10.1109/tap.2022.3225588 article EN IEEE Transactions on Antennas and Propagation 2022-12-05

As the geometry thickness error of composite radome impacts electromagnetic (EM) performance antenna-radome system, a novel interval arithmetic analytic approach to analysis effect on average power pattern system with in radome-based is proposed. The radome's material modeled as interval-valued errors. link between and along some main EM characteristics (sidelobe level, peak power, half-power beamwidth) expressed intervals are efficiently constructed. Some comparisons measured simulated...

10.1109/tap.2017.2670319 article EN IEEE Transactions on Antennas and Propagation 2017-02-16

Voice assistants like Siri enable us to control IoT devices conveniently with voice commands, however, they also provide new attack opportunities for adversaries. Previous papers obfuscated commands by leveraging the gap between speech recognition system and human perception. The limitation is that these are audible thus conspicuous device owners. In this poster, we propose a novel mechanism directly microphone used sensing data inaudible commands. We show adversary can exploit microphone's...

10.1145/3133956.3138836 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2017-10-27

The design of microwave wireless power transmission systems sometimes requires the synthesis large phased arrays, and objective is to obtain maximum beam collection efficiency (BCE). To reduce feeding network complexity as well system costs, subarray partition usually indispensable, which especially essential for arrays in context long-range high-power applications. Through minimizing difference between subarrayed BCE reference one, problem can be reduced an excitation matching one. Toward...

10.1109/tap.2018.2876192 article EN IEEE Transactions on Antennas and Propagation 2018-10-16

10.1007/s00170-012-4432-5 article EN The International Journal of Advanced Manufacturing Technology 2012-08-17

Membership inference attacks are a key measure to evaluate privacy leakage in machine learning (ML) models. These aim distinguish training members from non-members by exploiting differential behavior of the models on member and non-member inputs. The goal this work is train ML that have high membership while largely preserving their utility; we therefore for an empirical guarantee as opposed provable guarantees provided techniques like privacy, such shown deteriorate model utility....

10.48550/arxiv.2110.08324 preprint EN other-oa arXiv (Cornell University) 2021-01-01

Label differential privacy is a relaxation of for machine learning scenarios where the labels are only sensitive information that needs to be protected in training data. For example, imagine survey from participant university class about their vaccination status. Some attributes students publicly available but status and must remain private. Now if we want train model predicts whether student has received using public information, can use label-DP. Recent works on label-DP different ways...

10.56553/popets-2022-0112 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2022-08-31

Bridging concepts from information security and resonance theory, we propose a novel denial of service attack against hard disk drives (HDDs). In this attack, acoustic signals are used to cause rotational vibrations in HDD platters an attempt create failures read/write operations, ultimately halting the correct operation HDDs. We perform comprehensive examination multiple HDDs characterize show feasibility two real-world systems, namely, surveillance devices personal computers. Our...

10.1145/3266444.3266448 article EN 2018-01-15

Panel-setting errors associated with a segmented primary reflector limit the electrical performance of antenna. This paper addresses influence panel-setting on performance, in order to determine realistic error budgets, and adjust reflector-surface accuracy for such antennas. From viewpoint electromechanical coupling, an approximate expression error-transformation matrix (ETM) between aperture is derived. By comparing numerical simulations experimental results, it found that less than 11%....

10.1109/map.2010.5586577 article EN IEEE Antennas and Propagation Magazine 2010-06-01

A low-profile, wideband, and high-gain antenna array, based on a novel double-H-shaped slot microstrip patch radiating element robust against high temperature variations, is proposed in this work. The was designed to operate the frequency range between 12 GHz 18.25 GHz, with 41.3% fractional bandwidth (FBW) an obtained peak gain equal 10.2 dBi. planar characterized by feed network flexible 1 16 power divider, comprised 4 × elements generated pattern of 19.1 dBi at 15.5 GHz. An array...

10.3390/s23083821 article EN cc-by Sensors 2023-04-08

The digital model of airborne frequency selective surface radomes (AFSSRs) is the basis design, simulation analysis, manufacturing, and other related research AFSSRs. This paper proposes a rapid modeling method AFSSRs based on dynamic customizable primitives. Firstly, layered construction scheme AFSSR presented typical radome wall structure. Then, according to characteristics various configurations complex wireframe information AFSSRs, primitives are raised express boundary contour all kinds...

10.20944/preprints202405.0721.v1 preprint EN 2024-05-10
Coming Soon ...