ABOUT ME


I am currently a post-doctoral researcher at Department of Electrical and Electronic Engineering, The University of Hong Kong (HKU). I am working with Prof. Xianhao Chen on security and privacy for edge AI. Before joining HKU, I was a research fellow at Nanyang Technological University (NTU), working with Prof. Yang Liu on Web3 security. I received my Ph.D. degree at School of Cyber Science and Engineering, Wuhan University in 2022, under the joint supervision of Prof. Jing Chen and Prof. Ziming Zhao. I received B.E. degree at Xidian University in 2017. My current research interests focus on security and privacy of distributed intelligent system (SPDIS), including:

  • Blockchain, Web3, and distributed system security. [CCS’24], [ASE’24], [[FSE’25]] [ICSE’24], [TOSEM’24], [TIFS’24]
  • Security and privacy of edge intelligence. [Security’25], [JSAC’24], [TIFS’24], [TIFS’23]
  • Edge device security. [CCS’22], [Security’20], [TMC’24], [TDSC’24], [TDSC’21]

Email: congwu[AT]hku.hk / cong.wu[AT]ntu.edu.sg

NEWS


  • 2025.1. One paper is accepted by USENIX Security 2025: “Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection”.
  • 2025.1. One paper is accepted by USENIX Security 2025: “When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems”.
  • 2025.1. One paper is accepted by TDSC: “SIGFinger: A Subtle and Interactive GNN Fingerprinting Scheme via Spatial Structure Inference Perturbation”.
  • 2025.1. One paper is accepted by TIFS: “TCG-IDS: Robust Network Intrusion Detection via Temporal Contrastive Graph Learning”.
  • 2024.12. One paper is accepted by TIFS: “Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing”.
  • 2024.11. One paper is accepted by TOSEM: “Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph”.
  • 2024.9. One paper is accepted by IMWUT: “HCR-Auth: Reliable Bone Conduction Earphone Authentication with Head Contact Response”.
  • 2024.8. One paper is accepted by CCS 2024: “TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning”.
  • 2024.8. I am awarded HKU-URC Post-doctoral Fellowship at The University of Hong Kong (HKU).
  • 2024.8. One paper is accepted by ASE 2024: “Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models”.
  • 2024.8. One paper is accepted by JSAC: “An Efficient Privacy-aware Split Learning Framework for Satellite Communications”.
  • 2024.7. I will join The University of Hong Kong (HKU), working with Prof. Xianhao Chen.
  • 2024.7. One paper is accepted by TDSC: “WAFBOOSTER: Automatic Boosting of WAF Security Against Mutated Malicious Payloads”.
  • 2024.6. One paper is accepted by TIFS: “Rethinking Membership Inference Attacks Against Transfer Learning”.
  • 2024.2. One paper is accepted by TMC: “It’s All in the Touch: Authenticating Users with HOST Gestures on Multi-Touch Screen Devices”.
  • 2023.11. One paper is accepted by IMWUT: “LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices”.
  • 2023.10. One paper is accepted by TMC: “WiFiLeaks: Exposing Stationary Human Presence Through a Wall with Commodity Mobile Devices”.
  • 2023.08. One paper is accepted by ICSE 2024: “PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph”.
  • 2023.6. One paper is selected as top 10 distinguished conference papers at 2023 China Cybersecurity Conference: “EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices. CCS22”.
  • 2023.6. One paper is accepted by TIFS: “Efficient Privacy-preserving Inference Outsourcing for Convolutional Neural Networks”.
  • 2022.7. I will join Cyber Security Lab, SCSE, Nanyang Technological University as a research fellow, working with Prof. Yang Liu.
  • 2022.7. One paper is accepted by CCS 2022: “EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices”.
  • 2022.5. I passed my doctoral dissertation defense. Now I’m officially Dr. Wu. My deepest gratitude goes to my co-advisors, Prof. Jing Chen and Prof. Ziming Zhao.

SELECTED PUBLICATIONS


  • [Security’25] Haolin Wu, Chang Liu, Jing Chen, Ruiying Du, Kun He, Yu Zhang, Cong Wu, Tianwei Zhang, Qing Guo, Jie Zhang. When Translators Refuse to Translate: A Novel Attack to Speech Translation Systems. USENIX Security Symposium. 2025.
  • [Security’25] Yinyuan Zhang, Cuiying Gao, Yueming Wu, Shihan Dou, Cong Wu, Ying Zhang, Wei Yuan, Yang Liu. Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection. USENIX Security Symposium. 2025.
  • [FSE’25] Ruichao Liang, Jing Chen, Ruochen Cao, Kun He, Ruiying Du, Shuhua Li, Zheng Lin, Cong Wu*. SmartShot: Hunt Hidden Vulnerabilites in Smart Contracts using Mutable Snapshots. ACM International Conference on the Foundations of Software Engineering. 2025.
  • [TDSC] Ju Jia, Renjie Li, Cong Wu, Siqi Ma, Lina Wang, Robert H. Deng. SIGFinger: A Subtle and Interactive GNN Fingerprinting Scheme via Spatial Structure Inference Perturbation. IEEE Transactions on Dependable and Secure Computing. 2025.
  • [TIFS] Cong Wu, Jianfei Sun, Jing Chen, Mamoun Alazab, Yang Liu, Yang Xiang. TCG-IDS: Robust Network Intrusion Detection via Temporal Contrastive Graph Learning. IEEE Transactions on Information Forensics and Security. 2025.
  • [TIFS] Ruichao Liang, Jing Chen, Cong Wu*, Kun He, Yueming Wu, Ruochen Cao, Ruiying Du, Ziming Zhao, Yang Liu. Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing. IEEE Transactions on Information Forensics and Security. 2025.
  • [CCS’24] Cong Wu, Jing Chen, Ziming Zhao, Kun He, Guowen Xu, Yueming Wu, Haijun Wang, Hongwei Li, Yang Liu, Yang Xiang. TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning. ACM SIGSAC Conference on Computer and Communications Security. 2024.
  • [ASE’24] Cong Wu, Jing Chen, Ziwei Wang, Ruichao Liang, Ruiying Du. Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models. IEEE/ACM International Conference on Automated Software Engineering. 2024.
  • [ICSE’24] Ruichao Liang, Jing Chen, Kun He, Yueming Wu, Gelei Deng, Ruiying Du, Cong Wu. PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG). IEEE/ACM International Conference on Software Engineering. 2024.
  • [TIFS] Cong Wu, Jing Chen, Qianru Fang, Kun He, Ziming Zhao, Hao Ren, Guowen Xu, Yang Liu, Yang Xiang. Rethinking Membership Inference Attacks Against Transfer Learning. IEEE Transactions on Information Forensics and Security. 2024.
  • [TDSC] Cong Wu, Jing Chen, Simeng Zhu, Wenqi Feng, Kun He, Ruiying Du, Yang Xiang. WAFBOOSTER: Automatic Boosting of WAF Security Against Mutated Malicious Payloads. IEEE Transactions on Dependable and Secure Computing. 2024.
  • [TMC] Cong Wu, Hangcheng Cao, Guowen Xu, Chenjie Zhou, Jianfei Sun, Ran Yan, Yang Liu, Hongbo Jiang. It’s All in the Touch: Authenticating Users with HOST Gestures on Multi-Touch Screen Devices. IEEE Transactions on Mobile Computing. 2024.
  • [JSAC] Jianfei Sun, Cong Wu*, Shahid Mumtaz, Junyi Tao, Mingsheng Cao, Mei Wang, Valerio Frascolla. An Efficient Privacy-aware Split Learning Framework for Satellite Communications. IEEE Journal on Selected Areas in Communications. 2024.
  • [TOSEM] Ruichao Liang, Jing Chen, Cong Wu, Kun He, Yueming Wu, Weisong Sun, Ruiying Du, Qingchuan Zhao, Yang Liu. Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph. ACM Transactions on Software Engineering and Methodology. 2024.
  • [IMWUT] Zhixiang He, Jing Chen, Cong Wu, Kun He, Ruiying Du, Ju Jia, Yangyang Gu, Xiping Sun. HCR-Auth: Reliable Bone Conduction Earphone Authentication with Head Contact Response. Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 2024.
  • [IMWUT] Yangyang Gu, Jing Chen, Cong Wu, Kun He, Ziming Zhao, and Ruiying Du. LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices. Proceedings of ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 2024.
  • [TIFS] Xuanang Yang, Jing Chen, Kun He, Hao Bai, Cong Wu, Ruiying Du. Efficient Privacy-preserving Inference Outsourcing for Convolutional Neural Networks. IEEE Transactions on Information Forensics and Security. 2023.
  • [TMC] Yangyang Gu, Jing Chen, Kun He, Cong Wu, Ziming Zhao, and Ruiying Du. WiFiLeaks: Exposing Stationary Human Presence Through a Wall with Commodity Mobile Devices. IEEE Transactions on Mobile Computing. 2023.
  • [CCS’22] Cong Wu, Jing Chen, Kun He, Ziming Zhao, Ruiying Du, Chen Zhang. EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices. ACM SIGSAC Conference on Computer and Communications Security. 2022.
  • [TDSC] Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du. Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-touch Behaviors. IEEE Transactions on Dependable and Secure Computing. 2021.
  • [Security’20] Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du. Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks. USENIX Security Symposium. 2020.

AWARDS


  • ML4CS Best Paper Award, Dec-2024.
  • TrustCom’24-SPATI Best Paper Award, Dec-2024.
  • HKU-URC Post-doctoral Fellowship, The University of Hong Kong (HKU), HK SAR. Aug-2024.
  • Academic Innovation Award, second prize, Wuhan University, China. Dec-2023.
  • Distinguished Conference Paper Award at China Cybersecurity 2023. Jun-2023.
  • Distinguished Doctoral Dissertation Award at Wuhan University. Oct-2022
  • Distinguished Ph.D. Graduate, Wuhan University, China. Jun-2022.
  • National Scholarship for Postgraduates, Ministry of Education, China. Dec-2021.
  • Distinguished Postgraduates Scholarship, Wuhan University, China. Dec-2021.
  • Distinguished Academic Scholarship, first prize, Wuhan University, China. Dec-2021.
  • Distinguished Academic Scholarship, second prize, Wuhan University, China. Dec-2020.
  • Distinguished Fresh Postgraduates Scholarship, second prize, Wuhan University, China. Sep-2017.

SERVICES


Editorship

  • Associate Editor, Journal of Security and Privacy Journal (SPY)
  • Associate Editor, International Journal of Communication Systems (IJCS)
  • Youth Editor. Journal of Information and Intelligence (JII)

(External) Conference Reviewer

  • USENIX Security Symposium 2025, 2024
  • ACM Conference on Computer and Communications Security (CCS) 2025, 2024, 2023, 2022
  • ACM Web Conference 2025, 2024, 2023, 2022
  • USENIX Security Symposium 2024
  • ISOC Network and Distributed System Security Symposium (NDSS) 2023, 2022
  • IEEE European Symposium on Security and Privacy (EuroSP) 2024
  • ACM Annual Computer Security Applications Conference (ACSAC) 2024
  • Financial Cryptography (FC) 2025
  • The Annual Privacy Enhancing Technologies Symposium (PETS) 2024
  • Internet Measurement Conference (IMC) 2024

Artifact Evaluation Committee (AEC) Member

  • USENIX Security Symposium 2025

Journal Reviewer

  • Proceedings of the IEEE
  • IEEE Transactions on Information Forensics and Security (TIFS)
  • ACM Transactions on Software Engineering and Methodology (TOSEM)
  • IEEE Journal on Selected Areas in Communications (JSAC)
  • IEEE Transactions on Knowledge and Data Engineering (TKDE)
  • ACM Transactions on Privacy and Security (TOPS)
  • IEEE Transactions on Dependable and Secure Computing (TDSC)
  • IEEE Transactions on Mobile Computing (TMC)
  • IEEE Transactions on Reliability (TR)
  • IEEE Transactions on Network Science and Engineering (TNSE)
  • IEEE Transactions on Network and Service Management (TNSM)
  • Journal of Security and Communication Networks (JSCN)
  • Journal of Computer Security (JCS)
  • IEEE Transactions on Industrial Informatics (TII)