University of Kansas
I am a final-year PhD candidate in Computer Science at the University of Kansas, advised by Dr. Fengjun Li and Dr. Bo Luo.
My research primarily focuses on Physical AI systems and their security. Specifically, I investigate both offensive and defensive techniques for mobile, CPS, and AI-enabled systems.
My research interests include:
• Trustworthy ML/AI: Adversarial ML; Prompt injection; AI misinformation and misuse.
• Physical AI: IoT/CPS; Mobile; Wireless Systems; Side and Covert channels
• Communication security: NFC; Optical fiber communication; GPS spoofing.
Before joining KU, I received my B.S. and M.Eng. degrees from Beihang University. After graduation, I worked as a full-time research scientist at the Institute of Information Engineering, Chinese Academy of Sciences.
News | Education | Research Experience | Honors & Awards | Teaching Experience | Selected Publications
") does not match the recommended repository name for your site ("").
", so that your site can be accessed directly at "http://".
However, if the current repository name is intended, you can ignore this message by removing "{% include widgets/debug_repo_name.html %}" in index.html.
",
which does not match the baseurl ("") configured in _config.yml.
baseurl in _config.yml to "".

Ye Wang, Yuying Li, Bo Luo, Fengjun Li
International Conference on Information and Communications Security (ICICS)Accepted. 2026
In this paper, we first explore the control plane of sensor-based attacks and leverage a lightweight control protocol to demonstrate the practical feasibility of side-channel and covert-channel attacks on smartphones.
Ye Wang, Yuying Li, Bo Luo, Fengjun Li
International Conference on Information and Communications Security (ICICS)Accepted. 2026
In this paper, we first explore the control plane of sensor-based attacks and leverage a lightweight control protocol to demonstrate the practical feasibility of side-channel and covert-channel attacks on smartphones.

Ye Wang, Bo Luo, Fengjun Li
Network and Distributed System Security Symposium (NDSS) 2026
In this paper, we present SensorBomb, a logic-bomb framework that violates this assumption by auto-contextualizing triggers within an app’s legitimate sensor usage, actuator behaviors, and functional context, using onboard sensor–actuator covert channels and dynamically adapted trigger patterns to evade analysis, fuzzing, anomaly detection, and user suspicion.
Ye Wang, Bo Luo, Fengjun Li
Network and Distributed System Security Symposium (NDSS) 2026
In this paper, we present SensorBomb, a logic-bomb framework that violates this assumption by auto-contextualizing triggers within an app’s legitimate sensor usage, actuator behaviors, and functional context, using onboard sensor–actuator covert channels and dynamically adapted trigger patterns to evade analysis, fuzzing, anomaly detection, and user suspicion.

Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, Fengjun Li
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS) 2024
In this paper, we propose a novel physical adversarial attack against deep face recognition systems, namely Agile (Adversarial Glasses with Infrared LasEr). It generates adjustable, invisible laser perturbations and emits them into the camera CMOS to launch dodging and impersonation attacks against facial biometrics systems.
Ye Wang, Zeyan Liu, Bo Luo, Rongqing Hui, Fengjun Li
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS) 2024
In this paper, we propose a novel physical adversarial attack against deep face recognition systems, namely Agile (Adversarial Glasses with Infrared LasEr). It generates adjustable, invisible laser perturbations and emits them into the camera CMOS to launch dodging and impersonation attacks against facial biometrics systems.