Perception Matters: Detecting Perception Failures of VQA Models Using Metamorphic Testing Y Yuan, S Wang, M Jiang, TY Chen Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021 | 42 | 2021 |
Metamorphic Testing of Deep Learning Compilers D Xiao, Z LIU, Y Yuan, Q Pang, S Wang Proceedings of the ACM on Measurement and Analysis of Computing Systems 6 (1 …, 2022 | 38 | 2022 |
MDPFuzz: testing models solving Markov decision processes Q Pang, Y Yuan, S Wang Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 18* | 2022 |
Revisiting neuron coverage for dnn testing: A layer-wise and distribution-aware criterion Y Yuan, Q Pang, S Wang 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023 | 17* | 2023 |
Explain any concept: Segment anything meets concept-based explanation A Sun, P Ma, Y Yuan, S Wang Advances in Neural Information Processing Systems 36, 2024 | 16 | 2024 |
Sok: demystifying binary lifters through the lens of downstream applications Z Liu, Y Yuan, S Wang, Y Bao 2022 IEEE Symposium on Security and Privacy (SP), 1100-1119, 2022 | 16 | 2022 |
Automated Side Channel Analysis of Media Software with Manifold Learning Y Yuan, Q Pang, S Wang 31st USENIX Security Symposium (USENIX Security 22), 2022 | 16 | 2022 |
Unveiling hidden dnn defects with decision-based metamorphic testing Y Yuan, Q Pang, S Wang Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022 | 15 | 2022 |
CC: Causality-Aware Coverage Criterion for Deep Neural Networks Z Ji, P Ma, Y Yuan, S Wang 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023 | 13 | 2023 |
{CacheQL}: Quantifying and Localizing Cache {Side-Channel} Vulnerabilities in Production Software Y Yuan, Z Liu, S Wang 32nd USENIX Security Symposium (USENIX Security 23), 2009-2026, 2023 | 13 | 2023 |
ADI: Adversarial Dominating Inputs in Vertical Federated Learning Systems Q Pang, Y Yuan, S Wang, W Zheng 2023 IEEE Symposium on Security and Privacy (SP), 1875-1892, 2023 | 12* | 2023 |
Enhancing DNN-Based Binary Code Function Search With Low-Cost Equivalence Checking H Wang, P Ma, Y Yuan, Z Liu, S Wang, Q Tang, S Nie, S Wu IEEE Transactions on Software Engineering 49 (1), 226-250, 2022 | 12 | 2022 |
Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing Y Yuan, Q Pang, S Wang IEEE Transactions on Software Engineering, 2024 | 10* | 2024 |
Decompiling x86 deep neural network executables Z Liu, Y Yuan, S Wang, X Xie, L Ma 32nd USENIX Security Symposium (USENIX Security 23), 7357-7374, 2023 | 8* | 2023 |
No privacy left outside: On the (in-) security of tee-shielded dnn partition for on-device ml Z Zhang, C Gong, Y Cai, Y Yuan, B Liu, D Li, Y Guo, X Chen 2024 IEEE Symposium on Security and Privacy (SP), 3327-3345, 2024 | 5 | 2024 |
Eliminating Information Leakage in Hard Concept Bottleneck Models with Supervised, Hierarchical Concept Learning A Sun, Y Yuan, P Ma, S Wang arXiv preprint arXiv:2402.05945, 2024 | 3 | 2024 |
MPCDiff: Testing and Repairing MPC-Hardened Deep Learning Models Q Pang, Y Yuan, S Wang NDSS, 2024 | 3 | 2024 |
NeuralD: Detecting Indistinguishability Violations of Oblivious RAM With Neural Distinguishers P Ma, Z Liu, Y Yuan, S Wang IEEE Transactions on Information Forensics and Security 17, 982-997, 2022 | 3 | 2022 |
Private Image Reconstruction from System Side Channels Using Generative Models Y Yuan, S Wang, J Zhang International Conference on Learning Representations (ICLR 2021), 2020 | 3 | 2020 |
Precise and generalized robustness certification for neural networks Y Yuan, S Wang, Z Su 32nd USENIX Security Symposium (USENIX Security 23), 4769-4786, 2023 | 2 | 2023 |