Ye Wang
Logo University of Kansas

I am a final-year PhD candidate in Computer Science at the University of Kansas, advised by Dr. Fengjun Li and Dr. Bo Luo. My research has been a continuous journey to understand how security connects sensing, communication, and artificial intelligence across the digital and physical worlds. My research interests include:
• Trustworthy and privacy-preserving ML/AI: Adversarial ML; Prompt injection; AI misinformation and misuse.
• CPS/Mobile security and privacy: Covert and side channels; Sensor-driven adversarial perception; Privacy protection.
• Communication security: NFC; Optical fiber communication; UAV navigation and control-link.

Before joining KU, I received my B.Eng. and M.Eng. degrees from Beihang University, where I was advised by Prof. Xiaxiao Wang. After graduation, I worked as a full-time research scientist at the Institute of Information Engineering, Chinese Academy of Sciences, under the supervision of Prof. Weiqing Huang and Prof. Meng Zhang.

Curriculum Vitae

News  |  Education  |  Research Experience  |  Honors & Awards  |  Teaching Experience  |  Selected Publications


News
2026
I am honored to be selected as an Internet Society NDSS Fellow. I look forward to contributing to the community and meeting many of you in San Diego.
Jan 15
2025
Our paper, 'Beyond Conventional Triggers: Auto-Contextualized Covert Triggers for Android Logic Bombs' has been accepted by NDSS 2026!
Dec 04
I am honored to receive KU's highly competitive Doctoral Student Research Fund, awarded to approximately 30 students annually!
Oct 15
Our Poster 'A novel fully sensor-driven attack chain' has been accepted by ACSAC 2025, see you all in Hawaii!
Oct 01
Our work, 'Agile: An Effective Laser-Based Physical Adversarial Attack against Face Recognition' has been demonstrated in the AI summit 'Falling into AI' with Google!
Oct 01
2024
I am honored to be awarded the ACM CCS Student Travel Grant. See you all in Salt Lake City.
Sep 04
Our paper, 'The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition, ' has been accepted by ACM CCS 2024!
May 24
Our work: 'An Effective Physical Adversarial Attack against Face Recognition' is demonstrated in the FBI and KU Cybersecurity Conference.
Apr 04
2023
Our poster: 'ethics of computer security and privacy research-trends and standards from a data perspective' has been accepted by ACM CCS 2023.
Nov 28
Education
  • University of Kansas
    University of Kansas
    Department of Electrical Engineering and Computer Science
    Ph.D. Candidate in Computer Science
    Jan. 2020 - present
  • Beihang University
    Beihang University
    School of Instrumentation Science and Optoelectronic Engineering
    M.Eng. in Optical Engineering
    Sep. 2011 - Mar. 2014
  • Beihang University
    Beihang University
    School of Instrumentation Science and Optoelectronic Engineering
    B.S. in Electronic Engineering
    Sep. 2007 - Jul. 2011
Research Experience
  • Institute for Information Science (I2S), University of Kansas(KU)
    Institute for Information Science (I2S), University of Kansas(KU)
    Graduate Research Assistant
    Jan. 2020 - present
  • Institute of Information Engineering (IIE), Chinese Academy of Sciences (CAS)
    Institute of Information Engineering (IIE), Chinese Academy of Sciences (CAS)
    Assistant Research Fellow
    Mar. 2014 - Dec. 2019
  • Institute of Optoelectronics Technology, Beihang University
    Institute of Optoelectronics Technology, Beihang University
    Graduate Research Assistant
    Sep. 2011 - Mar. 2014
Selected Honors & Awards
  • Internet Society NDSS Fellowship - Internet Society
    2026
  • Doctoral Student Research Fund Award - KU
    2025
  • DAVID D. and MILDRED H. ROBB AWARD - KU
    2024, 2025, 2026
  • ACM CCS Travel Grant Award - ACM SIGSAC
    2024
  • Graduate Engineering Association Award - KU
    2024, 2025
  • Graduate Student Travel Fund - KU Student Senate
    2024, 2025
  • The second prize of the Science and Technology Award - MIIT (PRC)
    2019
  • Excellent Researcher - IIE, CAS
    2018
  • Excellent Researcher - 4th research department, IIE, CAS
    2016
  • Outstanding Master’s Thesis Award - Beihang University
    2014
  • Science and Technology Award - Ministry of Education (PRC)
    2013
  • Graduate Guanghua Scholarship - Beihang University
    2013
  • Outstanding Undergraduate Thesis Award - Beihang University
    2011
Teaching Experience
  • EECS 569 - Computer Forensics
    Fall 2024
  • EECS 565 - Introduction to Information and Computer Security
    Fall 2025, 2024, 2023
  • EECS 447 - Introduction to Database Systems
    Spring 2026, 2024, 2023
  • EECS 268 - Programming II
    Spring 2025
Selected Publications (view all )
Beyond Conventional Triggers: Auto-Contextualized Covert Triggers for Android Logic Bombs
Beyond Conventional Triggers: Auto-Contextualized Covert Triggers for Android Logic Bombs

Ye Wang, Bo Luo, Fengjun Li

Network and Distributed System Security Symposium (NDSS)Accepted. 2026

In this paper, we present SensorBomb, a logic-bomb framework that violates this assumption by auto-contextualizing triggers within an app’s legitimate sensor usage, actuator behaviors, and functional context, using onboard sensor–actuator covert channels and dynamically adapted trigger patterns to evade analysis, fuzzing, anomaly detection, and user suspicion.

Beyond Conventional Triggers: Auto-Contextualized Covert Triggers for Android Logic Bombs

Ye Wang, Bo Luo, Fengjun Li

Network and Distributed System Security Symposium (NDSS)Accepted. 2026

In this paper, we present SensorBomb, a logic-bomb framework that violates this assumption by auto-contextualizing triggers within an app’s legitimate sensor usage, actuator behaviors, and functional context, using onboard sensor–actuator covert channels and dynamically adapted trigger patterns to evade analysis, fuzzing, anomaly detection, and user suspicion.

Poster: A Novel Fully Sensor-driven Attack Chain.
Poster: A Novel Fully Sensor-driven Attack Chain.

Ye Wang, Bo Luo, Fengjun Li

Annual Computer Security Applications Conference (ACSAC). 2025

In this paper, we highlight the renewed feasibility of motion sensor-based side- and covert-channel attacks under modern Android restrictions.

Poster: A Novel Fully Sensor-driven Attack Chain.

Ye Wang, Bo Luo, Fengjun Li

Annual Computer Security Applications Conference (ACSAC). 2025

In this paper, we highlight the renewed feasibility of motion sensor-based side- and covert-channel attacks under modern Android restrictions.

The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition
The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition

Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, Fengjun Li

Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS) 2024

In this paper, we propose a novel physical adversarial attack against deep face recognition systems, namely Agile (Adversarial Glasses with Infrared LasEr). It generates adjustable, invisible laser perturbations and emits them into the camera CMOS to launch dodging and impersonation attacks against facial biometrics systems.

The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition

Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, Fengjun Li

Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS) 2024

In this paper, we propose a novel physical adversarial attack against deep face recognition systems, namely Agile (Adversarial Glasses with Infrared LasEr). It generates adjustable, invisible laser perturbations and emits them into the camera CMOS to launch dodging and impersonation attacks against facial biometrics systems.

Poster: Ethics of Computer Security and Privacy Research Current Status and Trends from a Data Perspective
Poster: Ethics of Computer Security and Privacy Research Current Status and Trends from a Data Perspective

Kevin Li, Zhaohui Wang, Ye Wang, Bo Luo, Fengjun Li

Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security 2023

Ethics is an important criterion for security research. This work presents the current status and trends that security researchers have taken to address ethical concerns in their studies from a data perspective.

Poster: Ethics of Computer Security and Privacy Research Current Status and Trends from a Data Perspective

Kevin Li, Zhaohui Wang, Ye Wang, Bo Luo, Fengjun Li

Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security 2023

Ethics is an important criterion for security research. This work presents the current status and trends that security researchers have taken to address ethical concerns in their studies from a data perspective.

All publications