


Остановите войну!
for scientists:


default search action
Xiangyu Zhang 0001
Person information

- affiliation: Purdue University, West Lafayette, IN, USA
- affiliation (PhD 2006): University of Arizona, Department of Computer Science, Tucson, AZ, USA
Other persons with the same name
- Xiangyu Zhang — disambiguation page
- Xiangyu Zhang 0002
— Hiroshima University, Graduate School of Engineering, Japan
- Xiangyu Zhang 0003
— Shenyang Pharmaceutical University, MoE Key Laboratory of Structure-Based Drug Design and Discovery, China
- Xiangyu Zhang 0004
— Tsinghua University, Department of Electrical Engineering, Beijing, China
- Xiangyu Zhang 0005
— Megvii Inc., Beijing, China (and 2 more)
- Xiangyu Zhang 0007
— Navy Aeronautical University, Yantai, China
- Xiangyu Zhang 0008
— Southeast University, School of Instrument Science and Engineering, Nanjing, China
- Xiangyu Zhang 0009 — Northwestern Polytechnical University, China
- Xiangyu Zhang 0010
— U. S. National Renewable Energy Laboratory, Computational Science Center, CO, USA (and 2 more)
- Xiangyu Zhang 0011
— Duke University, Department of Electrical and Computer Engineering, Durham, NC, USA
- Xiangyu Zhang 0012 — Cornell University, Department of Operations Research and Information Engineering, Ithaca, NY, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [i20]Siyuan Cheng, Guanhong Tao, Yingqi Liu, Shengwei An, Xiangzhe Xu, Shiwei Feng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Shiqing Ma, Xiangyu Zhang:
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense. CoRR abs/2301.06241 (2023) - 2022
- [j31]Qiang Zhang
, Lei Xu, Xiangyu Zhang, Baowen Xu:
Quantifying the interpretation overhead of Python. Sci. Comput. Program. 215: 102759 (2022) - [j30]Liqi Yan
, Siqi Ma, Qifan Wang
, Yingjie Victor Chen, Xiangyu Zhang, Andreas E. Savakis
, Dongfang Liu:
Video Captioning Using Global-Local Representation. IEEE Trans. Circuits Syst. Video Technol. 32(10): 6642-6656 (2022) - [j29]Derui Wang
, Chaoran Li
, Sheng Wen
, Qing-Long Han
, Surya Nepal
, Xiangyu Zhang, Yang Xiang
:
Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples. IEEE Trans. Cybern. 52(8): 7427-7440 (2022) - [c190]Xiangzhe Xu, Hongyu Liu, Guanhong Tao, Zhou Xuan, Xiangyu Zhang:
Checkpointing and deterministic training for deep learning. CAIN 2022: 65-76 - [c189]Muslum Ozgur Ozmen, Xuansong Li, Andrew Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang:
Discovering IoT Physical Channel Vulnerabilities. CCS 2022: 2415-2428 - [c188]Guanhong Tao, Guangyu Shen, Yingqi Liu, Shengwei An, Qiuling Xu, Shiqing Ma, Pan Li, Xiangyu Zhang:
Better Trigger Inversion Optimization in Backdoor Scanning. CVPR 2022: 13358-13368 - [c187]Yingqi Liu, Guangyu Shen, Guanhong Tao, Zhenting Wang, Shiqing Ma, Xiangyu Zhang:
Complex Backdoor Detection by Symmetric Feature Differencing. CVPR 2022: 14983-14993 - [c186]Qiuling Xu, Guanhong Tao, Xiangyu Zhang:
Bounded Adversarial Attack on Deep Content Features. CVPR 2022: 15182-15191 - [c185]Zhiyuan Cheng, James Liang, Hongjun Choi, Guanhong Tao, Zhiwen Cao, Dongfang Liu, Xiangyu Zhang:
Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches. ECCV (38) 2022: 514-532 - [c184]Guangyu Shen, Yingqi Liu, Guanhong Tao, Qiuling Xu, Zhuo Zhang, Shengwei An, Shiqing Ma, Xiangyu Zhang:
Constrained Optimization with Dynamic Bound-scaling for Effective NLP Backdoor Defense. ICML 2022: 19879-19892 - [c183]Liqi Yan, Qifan Wang, Yiming Cui, Fuli Feng, Xiaojun Quan, Xiangyu Zhang, Dongfang Liu:
GL-RG: Global-Local Representation Granularity for Video Captioning. IJCAI 2022: 2769-2775 - [c182]Danning Xie, Yitong Li, Mijung Kim, Hung Viet Pham, Lin Tan, Xiangyu Zhang, Michael W. Godfrey:
DocTer: documentation-guided fuzzing for testing deep learning API functions. ISSTA 2022: 176-188 - [c181]Xuwei Liu, Wei You, Zhuo Zhang, Xiangyu Zhang:
TensileFuzz: facilitating seed input generation in fuzzing via string constraint solving. ISSTA 2022: 391-403 - [c180]Hongjun Choi, Zhiyuan Cheng, Xiangyu Zhang:
RVPLAYER: Robotic Vehicle Forensics by Replay with What-if Reasoning. NDSS 2022 - [c179]Guanhong Tao, Qiuling Xu, Yingqi Liu, Guangyu Shen, Shengwei An, Jingwei Xu, Xiangyu Zhang, Yuan Yao:
MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity. NDSS 2022 - [c178]Guanhong Tao, Weisong Sun, Tingxu Han, Chunrong Fang, Xiangyu Zhang:
RULER: discriminative and iterative adversarial training for deep neural network fairness. ESEC/SIGSOFT FSE 2022: 1173-1184 - [c177]Guanhong Tao, Yingqi Liu, Guangyu Shen, Qiuling Xu, Shengwei An, Zhuo Zhang, Xiangyu Zhang:
Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security. IEEE Symposium on Security and Privacy 2022: 1372-1389 - [c176]Yingqi Liu, Guangyu Shen, Guanhong Tao, Shengwei An, Shiqing Ma, Xiangyu Zhang:
Piccolo: Exposing Complex Backdoors in NLP Transformer Models. IEEE Symposium on Security and Privacy 2022: 2025-2042 - [c175]Fei Wang, Jianliang Wu, Yuhong Nan, Yousra Aafer, Xiangyu Zhang, Dongyan Xu, Mathias Payer:
ProFactory: Improving IoT Security via Formalized Protocol Customization. USENIX Security Symposium 2022: 3879-3896 - [i19]Guangyu Shen, Yingqi Liu, Guanhong Tao, Qiuling Xu, Zhuo Zhang, Shengwei An, Shiqing Ma, Xiangyu Zhang:
Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense. CoRR abs/2202.05749 (2022) - [i18]Liqi Yan, Qifan Wang, Yiming Cui, Fuli Feng, Xiaojun Quan, Xiangyu Zhang, Dongfang Liu:
GL-RG: Global-Local Representation Granularity for Video Captioning. CoRR abs/2205.10706 (2022) - [i17]Guanhong Tao, Yingqi Liu, Siyuan Cheng, Shengwei An, Zhuo Zhang, Qiuling Xu, Guangyu Shen, Xiangyu Zhang:
DECK: Model Hardening for Defending Pervasive Backdoors. CoRR abs/2206.09272 (2022) - [i16]Zhiyuan Cheng, James Liang, Hongjun Choi, Guanhong Tao, Zhiwen Cao, Dongfang Liu, Xiangyu Zhang:
Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches. CoRR abs/2207.04718 (2022) - [i15]Kaiyuan Zhang, Guanhong Tao, Qiuling Xu, Siyuan Cheng, Shengwei An, Yingqi Liu, Shiwei Feng, Guangyu Shen, Pin-Yu Chen, Shiqing Ma, Xiangyu Zhang:
FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning. CoRR abs/2210.12873 (2022) - [i14]Guanhong Tao, Zhenting Wang, Siyuan Cheng, Shiqing Ma, Shengwei An, Yingqi Liu, Guangyu Shen, Zhuo Zhang, Yunshu Mao, Xiangyu Zhang:
Backdoor Vulnerabilities in Normally Trained Deep Learning Models. CoRR abs/2211.15929 (2022) - 2021
- [j28]Yongqiang Tian
, Shiqing Ma, Ming Wen
, Yepang Liu
, Shing-Chi Cheung
, Xiangyu Zhang:
To what extent do DNN-based image classification models make unreliable inferences? Empir. Softw. Eng. 26(4): 84 (2021) - [j27]Hassaan Irshad
, Gabriela F. Ciocarlie, Ashish Gehani
, Vinod Yegneswaran, Kyu Hyung Lee, Jignesh M. Patel, Somesh Jha, Yonghwi Kwon
, Dongyan Xu, Xiangyu Zhang:
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection. IEEE Trans. Inf. Forensics Secur. 16: 4363-4376 (2021) - [c174]Siyuan Cheng, Yingqi Liu, Shiqing Ma, Xiangyu Zhang:
Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification. AAAI 2021: 1148-1156 - [c173]Qiuling Xu, Guanhong Tao, Siyuan Cheng, Xiangyu Zhang:
Towards Feature Space Adversarial Attack by Style Perturbation. AAAI 2021: 10523-10531 - [c172]Guangyu Shen, Yingqi Liu, Guanhong Tao, Shengwei An, Qiuling Xu, Siyuan Cheng, Shiqing Ma, Xiangyu Zhang:
Backdoor Scanning for Deep Neural Networks through K-Arm Optimization. ICML 2021: 9525-9536 - [c171]Xincheng He, Lei Xu, Xiangyu Zhang, Rui Hao, Yang Feng, Baowen Xu:
PyART: Python API Recommendation in Real-Time. ICSE (Companion Volume) 2021: 246-247 - [c170]Xincheng He, Lei Xu, Xiangyu Zhang, Rui Hao, Yang Feng, Baowen Xu:
PyART: Python API Recommendation in Real-Time. ICSE 2021: 1634-1645 - [c169]Yapeng Ye, Zhuo Zhang, Fei Wang, Xiangyu Zhang, Dongyan Xu:
NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces. NDSS 2021 - [c168]Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent E. Urias, Han Wei Lin, Gabriela F. Ciocarlie, Vinod Yegneswaran, Ashish Gehani:
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation. NDSS 2021 - [c167]Sayali Kate, Michael Chinn, Hongjun Choi, Xiangyu Zhang, Sebastian G. Elbaum:
PHYSFRAME: type checking physical frames of reference for robotic systems. ESEC/SIGSOFT FSE 2021: 45-56 - [c166]Ming Yan, Junjie Chen
, Xiangyu Zhang, Lin Tan, Gan Wang, Zan Wang:
Exposing numerical bugs in deep learning via gradient back-propagation. ESEC/SIGSOFT FSE 2021: 627-638 - [c165]Zhuo Zhang, Wei You, Guanhong Tao, Yousra Aafer, Xuwei Liu, Xiangyu Zhang:
StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting. IEEE Symposium on Security and Privacy 2021: 659-676 - [c164]Zhuo Zhang, Yapeng Ye, Wei You, Guanhong Tao, Wen-Chuan Lee, Yonghwi Kwon, Yousra Aafer, Xiangyu Zhang:
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary. IEEE Symposium on Security and Privacy 2021: 813-832 - [c163]Yousra Aafer, Wei You, Yi Sun, Yu Shi, Xiangyu Zhang, Heng Yin:
Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing. USENIX Security Symposium 2021: 2759-2776 - [c162]Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu:
ATLAS: A Sequence-based Learning Approach for Attack Investigation. USENIX Security Symposium 2021: 3005-3022 - [e2]Cristian Cadar, Xiangyu Zhang:
ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, Denmark, July 11-17, 2021. ACM 2021, ISBN 978-1-4503-8459-9 [contents] - [i13]Muslum Ozgur Ozmen, Xuansong Li, Andrew Chun-An Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang:
Discovering Physical Interaction Vulnerabilities in IoT Deployments. CoRR abs/2102.01812 (2021) - [i12]Xincheng He, Lei Xu, Xiangyu Zhang, Rui Hao, Yang Feng, Baowen Xu:
PyART: Python API Recommendation in Real-Time. CoRR abs/2102.04706 (2021) - [i11]Guangyu Shen, Yingqi Liu, Guanhong Tao, Shengwei An, Qiuling Xu, Siyuan Cheng, Shiqing Ma, Xiangyu Zhang:
Backdoor Scanning for Deep Neural Networks through K-Arm Optimization. CoRR abs/2102.05123 (2021) - [i10]Yingqi Liu, Guangyu Shen, Guanhong Tao, Zhenting Wang, Shiqing Ma, Xiangyu Zhang:
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry. CoRR abs/2103.08820 (2021) - [i9]Sayali Kate, Michael Chinn, Hongjun Choi, Xiangyu Zhang, Sebastian G. Elbaum:
PHYSFRAME: Type Checking Physical Frames of Reference for Robotic Systems. CoRR abs/2106.11266 (2021) - [i8]Danning Xie, Yitong Li, Mijung Kim, Hung Viet Pham, Lin Tan, Xiangyu Zhang, Michael W. Godfrey:
Leveraging Documentation to Test Deep Learning Library Functions. CoRR abs/2109.01002 (2021) - 2020
- [j26]Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang:
Black-box adversarial sample generation based on differential evolution. J. Syst. Softw. 170: 110767 (2020) - [j25]Hongyu Liu, Sam Silvestro, Xiangyu Zhang, Jian Huang, Tongping Liu:
WATCHER: in-situ failure diagnosis. Proc. ACM Program. Lang. 4(OOPSLA): 143:1-143:27 (2020) - [j24]Wei You
, Bin Liang
, Wenchang Shi
, Peng Wang, Xiangyu Zhang:
TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices. IEEE Trans. Dependable Secur. Comput. 17(1): 209-222 (2020) - [c161]Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang:
Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features. CCS 2020: 113-131 - [c160]Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu:
Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles. CCS 2020: 263-278 - [c159]Wanwangying Ma, Lin Chen, Xiangyu Zhang, Yang Feng, Zhaogui Xu, Zhifei Chen, Yuming Zhou, Baowen Xu
:
Impact analysis of cross-project bugs on software ecosystems. ICSE 2020: 100-111 - [c158]I Luk Kim, Yunhui Zheng, Hogun Park, Weihang Wang, Wei You, Yousra Aafer, Xiangyu Zhang:
Finding client-side business flow tampering vulnerabilities. ICSE 2020: 222-233 - [c157]Hao Xia, Yuan Zhang, Yingtian Zhou, Xiaoting Chen, Yang Wang, Xiangyu Zhang, Shuaishuai Cui, Geng Hong, Xiaohan Zhang, Min Yang, Zhemin Yang:
How Android developers handle evolution-induced API compatibility issues: a large-scale study. ICSE 2020: 886-898 - [c156]Guanhong Tao, Shiqing Ma, Yingqi Liu, Qiuling Xu, Xiangyu Zhang:
TRADER: trace divergence analysis and embedding regulation for debugging recurrent neural networks. ICSE 2020: 986-998 - [c155]Juan Zhai, Xiangzhe Xu, Yu Shi, Guanhong Tao, Minxue Pan, Shiqing Ma, Lei Xu, Weifeng Zhang, Lin Tan, Xiangyu Zhang:
CPC: automatically classifying and propagating natural language comments via program analysis. ICSE 2020: 1359-1371 - [c154]Xuansong Li, Wei Song, Xiangyu Zhang:
Towards Programming and Verification for Activity-Oriented Smart Home Systems. ASE 2020: 1270-1272 - [c153]Runqing Yang, Shiqing Ma, Haitao Xu, Xiangyu Zhang, Yan Chen:
UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications. NDSS 2020 - [c152]Hongjun Choi, Sayali Kate, Yousra Aafer, Xiangyu Zhang, Dongyan Xu:
Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles. RAID 2020: 349-364 - [c151]Juan Zhai, Yu Shi, Minxue Pan, Guian Zhou, Yongxiang Liu, Chunrong Fang
, Shiqing Ma, Lin Tan, Xiangyu Zhang:
C2S: translating natural language comments to formal program specifications. ESEC/SIGSOFT FSE 2020: 25-37 - [c150]Shenao Yan, Guanhong Tao, Xuwei Liu, Juan Zhai, Shiqing Ma, Lei Xu, Xiangyu Zhang:
Correlations between deep neural network model coverage criteria and model quality. ESEC/SIGSOFT FSE 2020: 775-787 - [c149]Wei You, Zhuo Zhang
, Yonghwi Kwon, Yousra Aafer, Fei Peng, Yu Shi, Carson Harmon, Xiangyu Zhang:
PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning. IEEE Symposium on Security and Privacy 2020: 1121-1138 - [c148]Taegyu Kim, Chung Hwan Kim, Altay Ozen, Fan Fei, Zhan Tu, Xiangyu Zhang, Xinyan Deng, Dave (Jing) Tian, Dongyan Xu:
From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents with MAYDAY. USENIX Security Symposium 2020: 913-930 - [i7]Qiuling Xu, Guanhong Tao, Siyuan Cheng, Lin Tan, Xiangyu Zhang:
Towards Feature Space Adversarial Attack. CoRR abs/2004.12385 (2020) - [i6]Qiuling Xu, Guanhong Tao, Xiangyu Zhang:
D-square-B: Deep Distribution Bound for Natural-looking Adversarial Attack. CoRR abs/2006.07258 (2020) - [i5]Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang:
Black-box Adversarial Sample Generation Based on Differential Evolution. CoRR abs/2007.15310 (2020) - [i4]Siyuan Cheng, Yingqi Liu, Shiqing Ma, Xiangyu Zhang:
Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification. CoRR abs/2012.11212 (2020)
2010 – 2019
- 2019
- [j23]Yang Zhang
, Shicheng Dong, Xiangyu Zhang, Huan Liu, Dongwen Zhang:
Automated Refactoring for Stampedlock. IEEE Access 7: 104900-104911 (2019) - [j22]Zachary Benavides
, Keval Vora, Rajiv Gupta
, Xiangyu Zhang:
Annotation guided collection of context-sensitive parallel execution profiles. Formal Methods Syst. Des. 54(3): 388-415 (2019) - [j21]Zhuo Zhang
, Wei You, Guanhong Tao, Guannan Wei, Yonghwi Kwon, Xiangyu Zhang:
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation. Proc. ACM Program. Lang. 3(OOPSLA): 137:1-137:31 (2019) - [c147]Yingqi Liu, Wen-Chuan Lee, Guanhong Tao, Shiqing Ma, Yousra Aafer, Xiangyu Zhang:
ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation. CCS 2019: 1265-1282 - [c146]Wen-Chuan Lee, Yingqi Liu, Peng Liu, Shiqing Ma, Hongjun Choi, Xiangyu Zhang, Rajiv Gupta
:
White-Box Program Tuning. CGO 2019: 122-135 - [c145]Wei You, Xuwei Liu, Shiqing Ma, David Mitchel Perry, Xiangyu Zhang, Bin Liang:
SLF: fuzzing without valid seed inputs. ICSE 2019: 712-723 - [c144]Kenneth A. Miller, Yonghwi Kwon, Yi Sun, Zhuo Zhang
, Xiangyu Zhang, Zhiqiang Lin:
Probabilistic disassembly. ICSE 2019: 1187-1198 - [c143]Shiqing Ma, Yingqi Liu, Guanhong Tao, Wen-Chuan Lee, Xiangyu Zhang:
NIC: Detecting Adversarial Samples with Neural Network Invariant Checking. NDSS 2019 - [c142]Wen-Chuan Lee, Peng Liu, Yingqi Liu, Shiqing Ma, Xiangyu Zhang:
Programming support for autonomizing software. PLDI 2019: 702-716 - [c141]David Mitchel Perry, Dohyeong Kim, Roopsha Samanta, Xiangyu Zhang:
SemCluster: clustering of imperative programming assignments based on quantitative semantic features. PLDI 2019: 860-873 - [c140]Wei You, Xueqiang Wang, Shiqing Ma, Jianjun Huang, Xiangyu Zhang, XiaoFeng Wang, Bin Liang:
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery. IEEE Symposium on Security and Privacy 2019: 769-786 - [c139]Taegyu Kim, Chung Hwan Kim, Junghwan Rhee, Fan Fei, Zhan Tu, Gregory Walkup, Xiangyu Zhang, Xinyan Deng, Dongyan Xu:
RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing. USENIX Security Symposium 2019: 425-442 - [i3]Yongqiang Tian, Shiqing Ma, Ming Wen, Yepang Liu, Shing-Chi Cheung, Xiangyu Zhang:
Testing Deep Learning Models for Image Analysis Using Object-Relevant Metamorphic Relations. CoRR abs/1909.03824 (2019) - 2018
- [j20]Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
Gemini: Guest-transparent honey files via hypervisor-level access redirection. Comput. Secur. 77: 737-744 (2018) - [j19]Chang-Ai Sun, Yufeng Ran, Caiyun Zheng, Huai Liu, Dave Towey, Xiangyu Zhang:
Fault localisation for WS-BPEL programs based on predicate switching and program slicing. J. Syst. Softw. 135: 191-204 (2018) - [c138]Fei Wang, Yonghwi Kwon, Shiqing Ma, Xiangyu Zhang, Dongyan Xu:
Lprov: Practical Library-aware Provenance Tracing. ACSAC 2018: 605-617 - [c137]Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu
, Xiangyu Zhang, Dongyan Xu, Xinyan Deng:
Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach. CCS 2018: 801-816 - [c136]Yousra Aafer, Guanhong Tao, Jianjun Huang, Xiangyu Zhang, Ninghui Li:
Precise Android API Protection Mapping Derivation and Reasoning. CCS 2018: 1151-1164 - [c135]Chang-Ai Sun, Jingting Jia, Huai Liu, Xiangyu Zhang:
A Lightweight Program Dependence Based Approach to Concurrent Mutation Analysis. COMPSAC (1) 2018: 116-125 - [c134]Fan Fei, Zhan Tu
, Ruikun Yu, Taegyu Kim, Xiangyu Zhang, Dongyan Xu, Xinyan Deng:
Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks. ICRA 2018: 550-557 - [c133]Zhaogui Xu, Shiqing Ma, Xiangyu Zhang, Shuofei Zhu, Baowen Xu
:
Debugging with intelligence via probabilistic inference. ICSE 2018: 1171-1181 - [c132]Zhenhao Tang, Juan Zhai, Minxue Pan, Yousra Aafer, Shiqing Ma, Xiangyu Zhang, Jianhua Zhao:
Dual-force: understanding WebView malware via cross-language forced execution. ASE 2018: 714-725 - [c131]Yousra Aafer, Jianjun Huang, Yi Sun, Xiangyu Zhang, Ninghui Li, Chen Tian:
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection. NDSS 2018 - [c130]Rohit Bhatia, Brendan Saltaformaggio, Seung Jei Yang, Aisha I. Ali-Gombe, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III:
Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images. NDSS 2018 - [c129]Chung Hwan Kim, Taegyu Kim, Hongjun Choi, Zhongshu Gu, Byoungyoung Lee, Xiangyu Zhang, Dongyan Xu:
Securing Real-Time Microcontroller Systems through Customized Memory View Switching. NDSS 2018 - [c128]Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran:
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation. NDSS 2018 - [c127]Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, Xiangyu Zhang:
Trojaning Attack on Neural Networks. NDSS 2018 - [c126]Guanhong Tao, Shiqing Ma, Yingqi Liu, Xiangyu Zhang:
Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples. NeurIPS 2018: 7728-7739 - [c125]Shiqing Ma, Yingqi Liu, Wen-Chuan Lee, Xiangyu Zhang, Ananth Grama:
MODE: automated neural network model debugging via state differential analysis and input selection. ESEC/SIGSOFT FSE 2018: 175-186 - [c124]Sayali Kate, John-Paul Ore
, Xiangyu Zhang, Sebastian G. Elbaum, Zhaogui Xu:
Phys: probabilistic physical unit assignment and inconsistency detection. ESEC/SIGSOFT FSE 2018: 563-573 - [c123]Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee, Xiangyu Zhang, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, Somesh Jha:
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking. USENIX Annual Technical Conference 2018: 241-254 - [c122]I Luk Kim, Weihang Wang, Yonghwi Kwon, Yunhui Zheng, Yousra Aafer, Weijie Meng, Xiangyu Zhang:
AdBudgetKiller: Online Advertising Budget Draining Attack. WWW 2018: 297-307 - [i2]Guanhong Tao, Shiqing Ma, Yingqi Liu, Xiangyu Zhang:
Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples. CoRR abs/1810.11580 (2018) - [i1]Zhan Tu, Fan Fei, Matthew Eagon, Xiangyu Zhang, Dongyan Xu, Xinyan Deng:
Redundancy-Free UAV Sensor Fault Isolation And Recovery. CoRR abs/1812.00063 (2018) - 2017
- [j18]Chang-Ai Sun, Lin Pan, Qiaoling Wang, Huai Liu, Xiangyu Zhang:
An Empirical Study on Mutation Testing of WS-BPEL Programs. Comput. J. 60(1): 143-158 (2017) - [j17]Yunhui Zheng
, Vijay Ganesh
, Sanu Subramanian, Omer Tripp, Murphy Berzish, Julian Dolby, Xiangyu Zhang:
Z3str2: an efficient solver for strings, regular expressions, and length constraints. Formal Methods Syst. Des. 50(2-3): 249-288 (2017) - [j16]Chonghua Wang, Zhiyu Hao, Lei Cui, Xiangyu Zhang, Xiaochun Yun:
Introspection-Based Memory Pruning for Live VM Migration. Int. J. Parallel Program. 45(6): 1298-1309 (2017) - [j15]Chang-Ai Sun, Feifei Xue, Huai Liu
, Xiangyu Zhang:
A path-aware approach to mutant reduction in mutation testing. Inf. Softw. Technol. 81: 65-81 (2017) - [j14]Enyi Tang
, Xiangyu Zhang, Norbert Th. Müller, Zhenyu Chen, Xuandong Li:
Software Numerical Instability Detection and Diagnosis by Combining Stochastic and Infinite-Precision Testing. IEEE Trans. Software Eng. 43(10): 975-994 (2017) - [c121]Taegyu Kim, Chung Hwan Kim
, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications. ACSAC 2017: 412-424 - [c120]Haining Chen, Ninghui Li, William Enck, Yousra Aafer, Xiangyu Zhang:
Analysis of SEAndroid Policies: Combining MAC and DAC in Android. ACSAC 2017: 553-565 - [c119]