Formal security analysis of neural networks using symbolic intervals S Wang, K Pei, J Whitehouse, J Yang, S Jana USENIX Security 2018, 2018 | 546 | 2018 |
Efficient formal safety analysis of neural networks S Wang, K Pei, J Whitehouse, J Yang, S Jana NeurIPS 2018, 2018 | 479 | 2018 |
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms. YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes, ZM Mao, A Prakash, ... NDSS 2017, 2017 | 410 | 2017 |
Beta-crown: Efficient bound propagation with per-neuron split constraints for neural network robustness verification S Wang, H Zhang, K Xu, X Lin, S Jana, CJ Hsieh, JZ Kolter NeurIPS 2021, 2021 | 329* | 2021 |
Hydra: Pruning adversarially robust neural networks V Sehwag, S Wang, P Mittal, S Jana NeurIPS 2020, 2020 | 206 | 2020 |
Fast and complete: Enabling complete neural network verification with rapid and massively parallel incomplete verifiers K Xu, H Zhang, S Wang, Y Wang, S Jana, X Lin, CJ Hsieh ICLR 2021, 2021 | 162 | 2021 |
Mixtrain: Scalable training of verifiably robust neural networks S Wang, Y Chen, A Abdou, S Jana arXiv preprint arXiv:1811.02625, 2018 | 98 | 2018 |
On training robust {PDF} malware classifiers Y Chen, S Wang, D She, S Jana USENIX Security 2020, 2020 | 87 | 2020 |
Multi-lingual Evaluation of Code Generation Models B Athiwaratkun, SK Gouda, Z Wang, X Li, Y Tian, M Tan, WU Ahmad, ... ICLR 2023, 2023 | 86* | 2023 |
General Cutting Planes for Bound-Propagation-Based Neural Network Verification H Zhang, S Wang, K Xu, L Li, B Li, S Jana, CJ Hsieh, JZ Kolter NeurIPS 2022, 2022 | 85 | 2022 |
Are diffusion models vulnerable to membership inference attacks? J Duan, F Kong, S Wang, X Shi, K Xu ICML 2023, 2023 | 59 | 2023 |
Towards understanding fast adversarial training B Li, S Wang, S Jana, L Carin arXiv preprint arXiv:2006.03089, 2020 | 49 | 2020 |
Towards compact and robust deep neural networks V Sehwag, S Wang, P Mittal, S Jana arXiv preprint arXiv:1906.06110, 2019 | 36 | 2019 |
Learning Security Classifiers with Verified Global Robustness Properties Y Chen, S Wang, Y Qin, X Liao, S Jana, D Wagner CCS 2021, 2021 | 33 | 2021 |
Shifting attention to relevance: Towards the uncertainty estimation of large language models J Duan, H Cheng, S Wang, C Wang, A Zavalny, R Xu, B Kailkhura, K Xu ACL 2024, 2023 | 31 | 2023 |
ReCode: Robustness Evaluation of Code Generation Models S Wang, Z Li, H Qian, C Yang, Z Wang, M Shang, V Kumar, S Tan, B Ray, ... ACL 2023, 2022 | 31* | 2022 |
Cost-Aware Robust Tree Ensembles for Security Applications Y Chen, S Wang, W Jiang, A Cidon, S Jana USENIX Security 2021, 2021 | 25 | 2021 |
A Branch and Bound Framework for Stronger Adversarial Attacks of ReLU Networks H Zhang, S Wang, K Xu, Y Wang, S Jana, CJ Hsieh, Z Kolter ICML 2022, 2022 | 21 | 2022 |
Towards practical lottery ticket hypothesis for adversarial training B Li, S Wang, Y Jia, Y Lu, Z Zhong, L Carin, S Jana arXiv preprint arXiv:2003.05733, 2020 | 14 | 2020 |
Enhancing gradient-based attacks with symbolic intervals S Wang, Y Chen, A Abdou, S Jana ICML Workshop on Security and Privacy of Machine Learning, 2019 | 11 | 2019 |