Reludiff: Differential verification of deep neural networks B Paulsen, J Wang, C Wang Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 60 | 2020 |
Neurodiff: scalable differential verification of neural networks using fine-grained approximation B Paulsen, J Wang, J Wang, C Wang Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020 | 40 | 2020 |
Mitigating power side channels during compilation J Wang, C Sung, C Wang Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019 | 37 | 2019 |
Shield synthesis for real: Enforcing safety in cyber-physical systems M Wu, J Wang, J Deshmukh, C Wang 2019 Formal Methods in Computer Aided Design (FMCAD), 129-137, 2019 | 30 | 2019 |
Synthesizing fair decision trees via iterative constraint solving J Wang, Y Li, C Wang International Conference on Computer Aided Verification, 364-385, 2022 | 15 | 2022 |
Data-driven synthesis of provably sound side channel analyses J Wang, C Sung, M Raghothaman, C Wang 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 12 | 2021 |
Understanding deep representations through random weights Y Shu, M Zhu, K He, J Hopcroft, P Zhou arXiv preprint arXiv:1704.00330 8, 2017 | 7 | 2017 |
Systematic testing of the data-poisoning robustness of KNN Y Li, J Wang, C Wang Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 6 | 2023 |
Learning to synthesize relational invariants J Wang, C Wang Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022 | 5 | 2022 |
Reludiff: Differential verification of deep neural networks. In 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE) B Paulsen, J Wang, C Wang IEEE, 2020 | 5 | 2020 |
Proving Robustness of KNN Against Adversarial Data Poisoning. Y Li, J Wang, C Wang FMCAD, 7-16, 2022 | 4 | 2022 |
Certifying the Fairness of KNN in the Presence of Dataset Bias Y Li, J Wang, C Wang International Conference on Computer Aided Verification, 335-357, 2023 | 3 | 2023 |
Compositional taint analysis for enforcing security policies at scale S Banerjee, S Cui, M Emmi, A Filieri, L Hadarean, P Li, L Luo, ... Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 2 | 2023 |
Synthesizing MILP Constraints for Efficient and Robust Optimization J Wang, A Gupta, C Wang Proceedings of the ACM on Programming Languages 7 (PLDI), 1896-1919, 2023 | | 2023 |
Randomness in Deconvolutional Networks for Visual Representation K He, J Wang, H Li, Y Shu, M Zhang, M Zhu, L Wang, JE Hopcroft arXiv preprint arXiv:1704.00330, 2017 | | 2017 |