ABOUT ME
I am currently a post-doctoral researcher at Department of Electrical and Electronic Engineering, The University of Hong Kong, working with Prof. Xianhao Chen. My current research interests focus on security and privacy of intelligent system, blockchain and web3 security. Before joining HKU, I was a research fellow at Nanyang Technological University, working with Prof. Yang Liu.
Email: congwu [AT] hku [DOT] hk
Address: HW214, The University of Hong Kong
SELECTED PUBLICATIONS
*: corresponding author.
-
[TPAMI] Chang Liu, Haolin Wu, Xi Yang, Kui Zhang, Cong Wu, Weiming Zhang, Nenghai Yu, Tianwei Zhang, Qing Guo, and Jie Zhang. Exploring Security Vulnerabilities in Multilingual Speech Translation Systems via Deceptive Inputs. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2026.
-
[Cybersecurity] Cong Wu, Jing Chen, Yebo Feng, Ju Jia, Tingting Xu, Zijian Zhang, Jiahua Xu, Teng Li, Yang Liu. Fake News Detection with GAN-Augmented Contrastive Learning and Multimodal Attention. Cybersecurity. 2026.
-
[KBS] Haolin Wu, Jing Chen, Ruiying Du, Cong Wu, Kun He, Xingcan Shang, Hao Ren, Guowen Xu. CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning. Knowledge-based Systems. 2025.
-
[TDSC] Yan Wu, Cong Wu, Yebo Feng, Lin Li, Xinyue Zhang, Zhen Li, Jiahang Sun, Zijian Zhang, Jincheng An, Yong Liu, Zhitao Guan, Liehuang Zhu. Unveiling Ethereum Mixing Services Using Enhanced Graph Structure Learning. IEEE Transactions on Dependable and Secure Computing. 2025.
-
[TDSC] Yebo Feng, Baichuan Zheng, Teng Li, Cong Wu, Zhuo Ma, Yulong Shen, Jianfeng Ma. AdaptiveShield: Dynamic Defense Against Decentralized Federated Learning Poisoning Attack. IEEE Transactions on Dependable and Secure Computing. 2025
-
[TIFS] Ju Jia, Renjie Li, Cong Wu, Yebo Feng, Siqi Ma, Lina Wang, Robert H. Deng. Environment-Adaptive Representation Interaction for Privacy-Perturbed Graphs against Deceptive OOD Attacks. IEEE Transactions on Information Forensics and Security. 2025.
-
[CJC] Yuqing Li, Zhuoqun Li, Jing Chen, Kun He, Ruiying Du, Xiping Sun, Cong Wu. An Automated Reverse Engineering Method for Unknown Protocols Based on Traffic Features. Chinese Journal of Computers. 2025.
-
[CJE] Yangyang Gu, Haozhe Xu, Jing Chen, Cong Wu*, Yebo Feng, Jiahua Xu, Teng Li, Ju Jia, Jian Shen, Jianfeng Ma. Hierarchical Security Survey of Voice Control Systems: Vulnerabilities, Countermeasures, and Future Horizons. Chinese Journal of Electronics. 2025.
-
[TIFS] Cong Wu, Hangcheng Cao, Jing Chen, Xiyu Yan, Guowen Xu, Ziming Zhao, Yang Liu, Hongbo Jiang. RUGSCREENER: Leveraging Temporal Graph Neural Network for Rugpull Detection in DeFi. IEEE Transactions on Information Forensics and Security. 2025.
-
[TDSC] Ju Jia, Bo Feng, Wenyi Zhang, Anran Li, Cong Wu, Siqi Ma, and Robert H. Deng. FGRW: Fine-Grained Reversible Watermarking based on Distribution-Adaptive Contrastive Augmentation across Diverse Domains. IEEE Transactions on Dependable and Secure Computing. 2025.
-
[TIFS] Wei Ma, JunJie Shi, Jiaxi Qiu, Cong Wu*, Jing Chen, Lingxiao Jiang, Shangqing Liu, Yang Liu, Xiang Yang. Detecting DeFi Fraud with a Graph-Transformer Language Model. IEEE Transactions on Information Forensics and Security. 2025.
-
[TIFS] Qiao Li, Cong Wu, Jing Chen, Zijun Zhang, Kun He, Ruiying Du, Xinxin Wang, Qingchuang Zhao, Yang Liu. Privacy-preserving Universal Adversarial Defense for Black-box Models. IEEE Transactions on Information Forensics and Security. 2025.
-
[ESWA] Ju Jia, Pengyuan Gao, Meng Luo, Cong Wu, Jiabao Guo. CTEA: Camouflaged Topological Element Attack via Causal Influence Discovery. Expert Systems With Applications. 2025.
-
[TIFS] Cong Wu, Jing Chen, Jiahong Li, Jiahua Xu, Ju Jia, Yutao Hu, Yebo Feng, Yang Liu, Yang Xiang. Profit or Deceit? Mitigating Pump and Dump in DeFi via Graph and Contrastive Learning. IEEE Transactions on Information Forensics and Security. 2025.
-
[Ubicomp’25/IMWUT] Zhixiang He, Fengyuan Ran, Jing Chen, Yangyang Gu, Kun He, Ruiying Du, Ju Jia, Cong Wu. HT-Auth: Unobtrusive VR Headset Authentication via Subtle Head Tremors. Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 2025.
-
[TMC] Zheng Lin, Yuxin Zhang, Zhe Chen, Zihan Fang, Cong Wu, Xianhao Chen, Yue Gao, Jun Luo. LEO-Split: A Semi-Supervised Split Learning Framework over LEO Satellite Networks. IEEE Transactions on Mobile Computing. 2025
-
[TIFS] Xiping Sun, Jing Chen, Kun He, Zhixiang He, Ruiying Du, Yebo Feng, Qingchuan Zhao, Cong Wu. SCR-Auth: Secure Call Receiver Authentication on Smartphones Using Outer Ear Echoes. IEEE Transactions on Information Forensics and Security. 2025.
-
[CJE] Ruiying Du, Jing Chen, Cong Wu*, Xiyu Yan. A Detection Method for Android Repackaged Malware Based on Sensitive Component Function Call Graph. Chinese Journal of Electronics. 2025.
-
[KDD25] Ju Jia, Jingxuan Yu, Di Wu, Cong Wu, Hengjie Zhu, Lina Wang. Prompt as a Double-Edged Sword: A Dynamic Equilibrium Gradient-Assigned Attack against Graph Prompt Learning. SIGKDD Conference on Knowledge Discovery and Data Mining. 2025.
-
[TMC] Yangyang Gu, Jing Chen, Kun He, Ju Jia, Yebo Feng, Congrui Chen, Ruiying Du, Cong Wu*. CSIPose: Unveiling Body Pose Using Commodity WiFi Devices Through the Wall. IEEE Transactions on Mobile Computing. 2025.
-
[SIGIR25] Wenyi Zhang, Ju Jia, Xiaojun Jia, Yihao Huang, Xinfeng Li, Cong Wu, Lina Wang. PATFinger: Prompt-Adapted Transferable Fingerprint against Unauthorized Multimodal Dataset Usage. ACM SIGIR Conference on Research and Development in Information Retrieval. 2025.
-
[TDSC] Cong Wu, Kun He, Jing Chen, Ruiying Du, Ran Yan, Ziming Zhao. High Accuracy and Presentation Attack Resistant Hand Authentication via Acoustic Sensing for Commodity Mobile Devices. IEEE Transactions on Dependable and Secure Computing. 2025.
-
[TIFS] Hangcheng Cao, Guowen Xu, Ziyang He, Shaoqing Shi, Shengmin Xu, Cong Wu, Jianting Ning. Unveiling the Superiority of Unsupervised Learning on GPU Cryptojacking Detection: Practice on Magnetic Side Channelbased Mechanism. IEEE Transactions on Information Forensics and Security. 2025.
-
[FCS] Zhixiang He, Jing Chen, Kun He, Cong Wu, Xiangyu Qu, Yangyang Gu, Xiping Sun, Ruiying Du. EyeAuth: Smartphone User Authentication via Reflexive Eye Movements. Frontiers of Computer Science. 2025.
-
[TMC] Zhixiang He, Jing Chen, Kun He, Yangyang Gu, Qiyi Deng, Zijian Zhang, Ruiying Du, Qingchuan Zhao, Cong Wu. HeadSonic: Usable Bone Conduction Earphone Authentication via Head-conducted Sounds. IEEE Transactions on Mobile Computing. 2025.
-
[TR] Yueming Wu, Wenqi Suo, Siyue Feng, Cong Wu, Deqing Zou, and Hai Jin. Fine-grained Code Clone Detection by Keywords-based Connection of Program Dependency Graph. IEEE Transactions on Reliability. 2025.
-
[TIFS] Jianfei Sun, Guowen Xu, Yang Yang, Xuehuan Yang, Xiaoguo Li, Cong Wu, Zhen Liu, Guomin Yang, Robert H. Deng. Forward-Secure Hierarchical Delegable Signature for Smart Homes. IEEE Transactions on Information Forensics and Security. 2025.
-
[COMST] Yebo Feng, Jun Li, Jelena Mirkovic, Cong Wu, Chong Wang, Hao Ren, Jiahua Xu, Yang Liu. Unmasking the Internet: A Survey of Fine-Grained Network Traffic Analysis. IEEE Communications Surveys and Tutorials. 2025.
-
[TDSC] Jianfei Sun, Guowen Xu, Hongwei Li, Tianwei Zhang, Cong Wu, Xuehuan Yang, Robert H. Deng. Sanitizable Cross-domain Access Control with Policy-driven Dynamic Authorization. IEEE Transactions on Dependable and Secure Computing. 2025.
-
[Security’25] Haolin Wu, Chang Liu, Jing Chen, Ruiying Du, Kun He, Yu Zhang, Cong Wu, Tianwei Zhang, Qing Guo, Jie Zhang. When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems. USENIX Security Symposium. 2025.
-
[Security’25] Yinyuan Zhang, Cuiying Gao, Yueming Wu, Shihan Dou, Cong Wu, Ying Zhang, Wei Yuan, Yang Liu. Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection. USENIX Security Symposium. 2025.
-
[FSE’25] Ruichao Liang, Jing Chen, Ruochen Cao, Kun He, Ruiying Du, Shuhua Li, Zheng Lin, Cong Wu*. SmartShot: Hunt Hidden Vulnerabilites in Smart Contracts using Mutable Snapshots. ACM International Conference on the Foundations of Software Engineering. 2025.
-
[TDSC] Ju Jia, Renjie Li, Cong Wu, Siqi Ma, Lina Wang, Robert H. Deng. SIGFinger: A Subtle and Interactive GNN Fingerprinting Scheme via Spatial Structure Inference Perturbation. IEEE Transactions on Dependable and Secure Computing. 2025.
-
[TIFS] Cong Wu, Jianfei Sun, Jing Chen, Mamoun Alazab, Yang Liu, Yang Xiang. TCG-IDS: Robust Network Intrusion Detection via Temporal Contrastive Graph Learning. IEEE Transactions on Information Forensics and Security. 2025.
-
[TIFS] Ruichao Liang, Jing Chen, Cong Wu*, Kun He, Yueming Wu, Ruochen Cao, Ruiying Du, Ziming Zhao, Yang Liu. Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing. IEEE Transactions on Information Forensics and Security. 2025.
-
[CCS’24] Cong Wu, Jing Chen, Ziming Zhao, Kun He, Guowen Xu, Yueming Wu, Haijun Wang, Hongwei Li, Yang Liu, Yang Xiang. TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning. ACM SIGSAC Conference on Computer and Communications Security. 2024.
-
[ASE’24] Cong Wu, Jing Chen, Ziwei Wang, Ruichao Liang, Ruiying Du. Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models. IEEE/ACM International Conference on Automated Software Engineering. 2024.
-
[ICSE’24] Ruichao Liang, Jing Chen, Kun He, Yueming Wu, Gelei Deng, Ruiying Du, Cong Wu. PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG). IEEE/ACM International Conference on Software Engineering. 2024.
-
[TIFS] Cong Wu, Jing Chen, Qianru Fang, Kun He, Ziming Zhao, Hao Ren, Guowen Xu, Yang Liu, Yang Xiang. Rethinking Membership Inference Attacks Against Transfer Learning. IEEE Transactions on Information Forensics and Security. 2024.
-
[TDSC] Cong Wu, Jing Chen, Simeng Zhu, Wenqi Feng, Kun He, Ruiying Du, Yang Xiang. WAFBOOSTER: Automatic Boosting of WAF Security Against Mutated Malicious Payloads. IEEE Transactions on Dependable and Secure Computing. 2024.
-
[TMC] Cong Wu, Hangcheng Cao, Guowen Xu, Chenjie Zhou, Jianfei Sun, Ran Yan, Yang Liu, Hongbo Jiang. It’s All in the Touch: Authenticating Users with HOST Gestures on Multi-Touch Screen Devices. IEEE Transactions on Mobile Computing. 2024.
-
[JSAC] Jianfei Sun, Cong Wu*, Shahid Mumtaz, Junyi Tao, Mingsheng Cao, Mei Wang, Valerio Frascolla. An Efficient Privacy-aware Split Learning Framework for Satellite Communications. IEEE Journal on Selected Areas in Communications. 2024.
-
[TOSEM] Ruichao Liang, Jing Chen, Cong Wu, Kun He, Yueming Wu, Weisong Sun, Ruiying Du, Qingchuan Zhao, Yang Liu. Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph. ACM Transactions on Software Engineering and Methodology. 2024.
-
[IMWUT] Zhixiang He, Jing Chen, Cong Wu, Kun He, Ruiying Du, Ju Jia, Yangyang Gu, Xiping Sun. HCR-Auth: Reliable Bone Conduction Earphone Authentication with Head Contact Response. Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 2024.
-
[IMWUT] Yangyang Gu, Jing Chen, Cong Wu, Kun He, Ziming Zhao, and Ruiying Du. LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices. Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 2024.
-
[TIFS] Xuanang Yang, Jing Chen, Kun He, Hao Bai, Cong Wu, Ruiying Du. Efficient Privacy-preserving Inference Outsourcing for Convolutional Neural Networks. IEEE Transactions on Information Forensics and Security. 2023.
-
[TMC] Yangyang Gu, Jing Chen, Kun He, Cong Wu, Ziming Zhao, and Ruiying Du. WiFiLeaks: Exposing Stationary Human Presence Through a Wall with Commodity Mobile Devices. IEEE Transactions on Mobile Computing. 2023.
-
[CCS’22] Cong Wu, Jing Chen, Kun He, Ziming Zhao, Ruiying Du, Chen Zhang. EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices. ACM SIGSAC Conference on Computer and Communications Security. 2022.
-
[TDSC] Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du. Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-touch Behaviors. IEEE Transactions on Dependable and Secure Computing. 2021.
-
[Security’20] Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du. Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks. USENIX Security Symposium. 2020.
AWARDS
- Distinguished Youth Editor Award of Journal of Information and Intelligence, 2026
- Exponential Science Pioneers Award, 2025
- IEEE CCPQT Best Paper Award, 2025
- IEEE IWCMC’25 Best Symposium Award, 2025
- WASA’25 Best Paper Award, 2025
- ML4CS’24 Best Paper Award, 2024
- TrustCom’24-SPATI Best Paper Award, 2024
- HKU-URC Post-doctoral Fellowship, The University of Hong Kong, HK SAR. 2024
- Distinguished Paper Award at China Cybersecurity 2023. 2023
- Research Innovation Award, Wuhan University, China. 2023, 2021, 2020
- Distinguished Doctoral Dissertation Award at Hubei Cybersecurity Assocation. 2022
- National Scholarship for Postgraduates, Ministry of Education, China. 2021
SERVICES
Editorship
- Associate Editor, Journal of Security and Privacy (SPY)
- Associate Editor, International Journal of Communication Systems (IJCS)
- Youth Editor, Journal of Information and Intelligence (JII)
Track/Symposium/Workshop Chair and TPC Member
- Workshop Chair, International Conference on AI and Engineering, AI+E 2026
- Track Chair, IEEE International Conference on Parallel and Distributed Systems, ICPADS 2025
- Workshop Chair, International Conference on Sensing, Measurement, Communication and Internet of Things Technologies, SMC-IoT 2025
- Symposium Chair, International Wireless Communications and Mobile Computing Conference, IWCMC 2025
- Workshop Chair, IEEE International Conference on Computing, Communication, Perception and Quantum Technology, IEEE CCPQT 2025
- Workshop Chair, International Conference on Sensing, Measurement, Communication and Internet of Things Technologies, SMC-IoT 2024
- Advisory Committee, International Conference on Advanced Computing Technologies, ICoACT 2025
- TPC, The International Conference of World Wide Web, WWW 2026
- TPC, ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2026
- TPC, International Conference on Computer, Information, and Telecommunication Systems, CITS 2026
- TPC, International Workshop on Cryptoasset Analytics, CAAW 2026
- TPC, International Conference on Intelligent Technology and Advanced Manufacturing, ITAM 2025
- TPC, The International Conference of World Wide Web, WWW 2025
- TPC, IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2025
- TPC, International Workshop on Cryptoasset Analytics, CAAW 2025
- TPC, International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2025
- TPC, International Conference on Computer, Information, and Telecommunication Systems, CITS 2025
- TPC, International Conference on Communications, Computing, Cybersecurity, and Informatics, CCCI 2025
- TPC, International Conference on Software Quality, Reliability, and Security (QRS) 2024 International Workshop on AI Reliability and Security
Journal Reviewer
- Proceedings of the IEEE
- IEEE Transactions on Information Forensics and Security (TIFS)
- ACM Transactions on Software Engineering and Methodology (TOSEM)
- IEEE Journal on Selected Areas in Communications (JSAC)
- IEEE Transactions on Knowledge and Data Engineering (TKDE)
- ACM Transactions on Privacy and Security (TOPS)
- IEEE Transactions on Dependable and Secure Computing (TDSC)
- IEEE Transactions on Mobile Computing (TMC)
- IEEE Transactions on Reliability (TR)
- IEEE Transactions on Network Science and Engineering (TNSE)
- IEEE Transactions on Network and Service Management (TNSM)
- Journal of Security and Communication Networks (JSCN)
- Journal of Computer Security (JCS)
- IEEE Transactions on Industrial Informatics (TII) (External) Conference Reviewer
- USENIX Security Symposium 2025, 2024
- ACM Conference on Computer and Communications Security (CCS) 2025, 2024, 2023, 2022
- ISOC Network and Distributed System Security Symposium (NDSS) 2023, 2022
- ACM Annual Computer Security Applications Conference (ACSAC) 2024
- IEEE European Symposium on Security and Privacy (EuroSP) 2024
- ACM Web Conference 2025, 2024, 2023, 2022
- Financial Cryptography (FC) 2025
- The Annual Privacy Enhancing Technologies Symposium (PETS) 2024
- Internet Measurement Conference (IMC) 2024
Artifact Evaluation Committee (AEC) Member
- USENIX Security Symposium 2025
- ACM Conference on Computer and Communications Security (CCS) 2025