Ye Wang
Logo University of Kansas

I am a final-year PhD candidate in Computer Science at the University of Kansas, advised by Dr. Fengjun Li and Dr. Bo Luo. My research interests include:
• Trustworthy and privacy-preserving ML/AI: Adversarial ML; Prompt injection; AI misinformation and misuse
• CPS/Mobile security and privacy: Covert channels; Side channels; Logic bombs
• Communication security: NFC security; Optical fiber communication security; UAV navigation and control-link security

Before joining KU, I received my B.Eng. and M.Eng. degrees from Beihang University, where I was advised by Prof. Xiaxiao Wang. After graduation, I worked as a full-time research scientist at the Institute of Information Engineering, Chinese Academy of Sciences, under the supervision of Prof. Weiqing Huang and Prof. Meng Zhang.

Curriculum Vitae

News  |  Education  |  Research Experience  |  Honors & Awards  |  Teaching Experience  |  Selected Publications


News
2025
Our Poster 'A novel fully sensor-driven attack chain' has been accepted by ACSAC 2025, see you all in Hawaii!
Oct 01
Our work, 'Agile: An Effective Laser-Based Physical Adversarial Attack against Face Recognition' has been demonstrated in the AI summit 'Falling into AI' with Google!
Oct 01
2024
I am honored to be awarded the ACM CCS Student Travel Grant. See you all in Salt Lake City.
Sep 04
Our paper, 'The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition, ' has been accepted by ACM CCS 2024!
May 24
Our work: 'An Effective Physical Adversarial Attack against Face Recognition' is demonstrated in the FBI and KU Cybersecurity Conference.
Apr 04
2023
Our poster: 'ethics of computer security and privacy research-trends and standards from a data perspective' has been accepted by ACM CCS 2023.
Nov 28
Education
  • University of Kansas
    University of Kansas
    Department of Electrical Engineering and Computer Science
    Ph.D. Candidate in Computer Science
    Jan. 2020 - present
  • Beihang University
    Beihang University
    School of Instrumentation Science and Optoelectronic Engineering
    M.Eng. in Optical Engineering
    Sep. 2011 - Mar. 2014
  • Beihang University
    Beihang University
    School of Instrumentation Science and Optoelectronic Engineering
    B.S. in Electronic Engineering
    Sep. 2007 - Jul. 2011
Research Experience
  • Institute for Information Science (I2S), University of Kansas(KU)
    Institute for Information Science (I2S), University of Kansas(KU)
    Graduate Research Assistant
    Jan. 2020 - present
  • Institute of Information Engineering (IIE), Chinese Academy of Sciences (CAS)
    Institute of Information Engineering (IIE), Chinese Academy of Sciences (CAS)
    Assistant Research Scientist
    Mar. 2014 - Dec. 2019
  • Institute of Optoelectronics Technology, Beihang University
    Institute of Optoelectronics Technology, Beihang University
    Graduate Research Assistant
    Sep. 2011 - Mar. 2014
Selected Honors & Awards
  • DAVID D. and MILDRED H. ROBB AWARD - KU
    2024
  • ACM CCS Travel Grant Award - ACM SIGSAC
    2024
  • Graduate Engineering Association Award - KU
    2024
  • Graduate Student Travel Fund - KU Student Senate
    2024, 2025
  • The second prize of the Science and Technology Award - MIIT (PRC)
    2019
  • Excellent Researcher - IIE, CAS
    2018
  • Excellent Researcher - 4th research department, IIE, CAS
    2016
  • Outstanding Master’s Thesis Award - Beihang University
    2014
  • Science and Technology Award - Ministry of Education (PRC)
    2013
  • Graduate Guanghua Scholarship - Beihang University
    2013
  • Outstanding Undergraduate Thesis Award - Beihang University
    2011
Teaching Experience
  • EECS 569 - Computer Forensics
    Fall 2024
  • EECS 565 - Introduction to Information and Computer Security
    Fall 2025, 2024, 2023
  • EECS 447 - Introduction to Database Systems
    Spring 2024, 2023
  • EECS 268 - Programming II
    Spring 2025
Selected Publications (view all )
The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition
The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition

Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, Fengjun Li

Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS) 2024

In this paper, we propose a novel physical adversarial attack against deep face recognition systems, namely Agile (Adversarial Glasses with Infrared LasEr). It generates adjustable, invisible laser perturbations and emits them into the camera CMOS to launch dodging and impersonation attacks against facial biometrics systems.

The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition

Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, Fengjun Li

Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS) 2024

In this paper, we propose a novel physical adversarial attack against deep face recognition systems, namely Agile (Adversarial Glasses with Infrared LasEr). It generates adjustable, invisible laser perturbations and emits them into the camera CMOS to launch dodging and impersonation attacks against facial biometrics systems.

Poster: Ethics of Computer Security and Privacy Research Current Status and Trends from a Data Perspective
Poster: Ethics of Computer Security and Privacy Research Current Status and Trends from a Data Perspective

Kevin Li, Zhaohui Wang, Ye Wang, Bo Luo, Fengjun Li

Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security 2023

Ethics is an important criterion for security research. This work presents the current status and trends that security researchers have taken to address ethical concerns in their studies from a data perspective.

Poster: Ethics of Computer Security and Privacy Research Current Status and Trends from a Data Perspective

Kevin Li, Zhaohui Wang, Ye Wang, Bo Luo, Fengjun Li

Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security 2023

Ethics is an important criterion for security research. This work presents the current status and trends that security researchers have taken to address ethical concerns in their studies from a data perspective.

All publications