Sitemap
A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.
Pages
Posts
Always Day One
Published:
In 2012, Jeff Bezos wrote in his annual letter to Amazon shareholders: “Day 2 is stasis, followed by irrelevance, followed by excruciating painful decline, followed by death.” He used “Day One” to describe a state of perpetual beginning—curious, disruptive, restless. Years later, ByteDance adopted this philosophy as the first principle of its corporate culture: Always Day One.
Finding My Way
Published:
Today, I’ve decided to start writing blogs again—or perhaps to start properly for the first time. Three years ago, as a freshman at Beijing University of Posts and Telecommunications, I kept a site at momoyeyu.github.io. But those posts were closer to study notes than real writing. So here, on March 31, 2025, I’m starting over.
portfolio
publications
Towards Evaluating the Robustness of Automatic Speech Recognition Systems via Audio Style Transfer
Published in SecTL 2024 (AsiaCCS Workshop), 2024
In the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems (SecTL, AsiaCCS Workshop), 2024, pp. 47–55.
Recommended citation: Weifei Jin, Yuxin Cao, Junjie Su, Qi Shen, Kai Ye, Derui Wang, Jie Hao, and Ziyao Liu. 2024. "Towards Evaluating the Robustness of Automatic Speech Recognition Systems via Audio Style Transfer." In the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems (SecTL, AsiaCCS Workshop), pp. 47–55.
Download Paper
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems
Published in USENIX Security 2025, 2025
In the 34th USENIX Security Symposium (USENIX Security), 2025.
Recommended citation: Weifei Jin, Yuxin Cao, Junjie Su, Derui Wang, Yedi Zhang, Minhui Xue, Jie Hao, Jin Song Dong, and Yixian Yang. 2025. "Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems." In 34th USENIX Security Symposium, to appear.
Download Paper
Boosting the Transferability of Audio Adversarial Examples with Acoustic Representation Optimization
Published in ICME 2025, 2025
In the IEEE International Conference on Multimedia & Expo (ICME), 2025.
Recommended citation: Weifei Jin, Junjie Su, Hejia Wang, Yulin Ye, and Jie Hao. 2025. "Boosting the Transferability of Audio Adversarial Examples with Acoustic Representation Optimization." In IEEE International Conference on Multimedia & Expo (ICME), to appear. Nantes, France.
Download Paper
ALMGuard: Safety Shortcuts and Where to Find Them as Guardrails for Audio–Language Models
Published in NeurIPS 2025, 2025
In the Thirty-ninth Annual Conference on Neural Information Processing Systems (NeurIPS), 2025.
Recommended citation: Weifei Jin, Yuxin Cao, Junjie Su, Minhui Xue, Jie Hao, Ke Xu, Jin Song Dong, and Derui Wang. 2025. "ALMGuard: Safety Shortcuts and Where to Find Them as Guardrails for Audio–Language Models." In the Thirty-ninth Annual Conference on Neural Information Processing Systems (NeurIPS).
Download Paper
Mirage Fools the Ear, Mute Hides the Truth: Precise Targeted Adversarial Attacks on Polyphonic Sound Event Detection Systems
Published in arXiv, 2025
arXiv preprint, 2025.
Recommended citation: Junjie Su, Weifei Jin, Yuxin Cao, Derui Wang, Kai Ye, and Jie Hao. 2025. "Mirage Fools the Ear, Mute Hides the Truth: Precise Targeted Adversarial Attacks on Polyphonic Sound Event Detection Systems." arXiv preprint arXiv:2510.02158.
Download Paper
talks
Conference Proceeding talk 3 on Relevant Topic in Your Field
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.