关注
Yuanyuan Yuan
Yuanyuan Yuan
CSE, HKUST
在 cse.ust.hk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Perception Matters: Detecting Perception Failures of VQA Models Using Metamorphic Testing
Y Yuan, S Wang, M Jiang, TY Chen
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
422021
Metamorphic Testing of Deep Learning Compilers
D Xiao, Z LIU, Y Yuan, Q Pang, S Wang
Proceedings of the ACM on Measurement and Analysis of Computing Systems 6 (1 …, 2022
382022
MDPFuzz: testing models solving Markov decision processes
Q Pang, Y Yuan, S Wang
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
18*2022
Revisiting neuron coverage for dnn testing: A layer-wise and distribution-aware criterion
Y Yuan, Q Pang, S Wang
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
17*2023
Explain any concept: Segment anything meets concept-based explanation
A Sun, P Ma, Y Yuan, S Wang
Advances in Neural Information Processing Systems 36, 2024
162024
Sok: demystifying binary lifters through the lens of downstream applications
Z Liu, Y Yuan, S Wang, Y Bao
2022 IEEE Symposium on Security and Privacy (SP), 1100-1119, 2022
162022
Automated Side Channel Analysis of Media Software with Manifold Learning
Y Yuan, Q Pang, S Wang
31st USENIX Security Symposium (USENIX Security 22), 2022
162022
Unveiling hidden dnn defects with decision-based metamorphic testing
Y Yuan, Q Pang, S Wang
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
152022
CC: Causality-Aware Coverage Criterion for Deep Neural Networks
Z Ji, P Ma, Y Yuan, S Wang
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
132023
{CacheQL}: Quantifying and Localizing Cache {Side-Channel} Vulnerabilities in Production Software
Y Yuan, Z Liu, S Wang
32nd USENIX Security Symposium (USENIX Security 23), 2009-2026, 2023
132023
ADI: Adversarial Dominating Inputs in Vertical Federated Learning Systems
Q Pang, Y Yuan, S Wang, W Zheng
2023 IEEE Symposium on Security and Privacy (SP), 1875-1892, 2023
12*2023
Enhancing DNN-Based Binary Code Function Search With Low-Cost Equivalence Checking
H Wang, P Ma, Y Yuan, Z Liu, S Wang, Q Tang, S Nie, S Wu
IEEE Transactions on Software Engineering 49 (1), 226-250, 2022
122022
Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing
Y Yuan, Q Pang, S Wang
IEEE Transactions on Software Engineering, 2024
10*2024
Decompiling x86 deep neural network executables
Z Liu, Y Yuan, S Wang, X Xie, L Ma
32nd USENIX Security Symposium (USENIX Security 23), 7357-7374, 2023
8*2023
No privacy left outside: On the (in-) security of tee-shielded dnn partition for on-device ml
Z Zhang, C Gong, Y Cai, Y Yuan, B Liu, D Li, Y Guo, X Chen
2024 IEEE Symposium on Security and Privacy (SP), 3327-3345, 2024
52024
Eliminating Information Leakage in Hard Concept Bottleneck Models with Supervised, Hierarchical Concept Learning
A Sun, Y Yuan, P Ma, S Wang
arXiv preprint arXiv:2402.05945, 2024
32024
MPCDiff: Testing and Repairing MPC-Hardened Deep Learning Models
Q Pang, Y Yuan, S Wang
NDSS, 2024
32024
NeuralD: Detecting Indistinguishability Violations of Oblivious RAM With Neural Distinguishers
P Ma, Z Liu, Y Yuan, S Wang
IEEE Transactions on Information Forensics and Security 17, 982-997, 2022
32022
Private Image Reconstruction from System Side Channels Using Generative Models
Y Yuan, S Wang, J Zhang
International Conference on Learning Representations (ICLR 2021), 2020
32020
Precise and generalized robustness certification for neural networks
Y Yuan, S Wang, Z Su
32nd USENIX Security Symposium (USENIX Security 23), 4769-4786, 2023
22023
系统目前无法执行此操作,请稍后再试。
文章 1–20