Folgen
Shiqi Shen
Shiqi Shen
Bestätigte E-Mail-Adresse bei comp.nus.edu.sg
Titel
Zitiert von
Zitiert von
Jahr
Auror defending against poisoning attacks in collaborative deep learning systems
S Shen, S Tople, P Saxena
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
3382016
Neural nets can learn function type signatures from binaries
ZL Chua, S Shen, P Saxena, Z Liang
26th {USENIX} Security Symposium ({USENIX} Security 17), 99-116, 2017
1842017
Quantitative verification of neural networks and its security applications
T Baluta, S Shen, S Shinde, KS Meel, P Saxena
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1062019
Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints.
S Shen, S Shinde, S Ramesh, A Roychoudhury, P Saxena
NDSS, 2019
362019
Localizing Vulnerabilities Statistically From One Exploit
S Shen, A Kolluri, Z Dong, P Saxena, A Roychoudhury
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
232021
Refined Grey-Box Fuzzing with SIVO
I Nikolic, R Mantu, S Shen, P Saxena
arXiv preprint arXiv:2102.02394, 2021
4*2021
Neuro-symbolic execution: The feasibility of an inductive approach to symbolic execution
S Shen, S Ramesh, S Shinde, A Roychoudhury, P Saxena
arXiv preprint arXiv:1807.00575, 2018
32018
Localizing Patch Points From One Exploit
S Shen, A Kolluri, Z Dong, P Saxena, A Roychoudhury
arXiv preprint arXiv:2008.04516, 2020
12020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–8