Shiqi Wang
Shiqi Wang
Applied Scientist, Amazon AWS AI Lab
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Formal security analysis of neural networks using symbolic intervals
S Wang, K Pei, J Whitehouse, J Yang, S Jana
USENIX Security 2018, 2018
Efficient formal safety analysis of neural networks
S Wang, K Pei, J Whitehouse, J Yang, S Jana
NeurIPS 2018, 2018
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes, ZM Mao, A Prakash, ...
NDSS 2017, 2017
Hydra: Pruning adversarially robust neural networks
V Sehwag, S Wang, P Mittal, S Jana
NeurIPS 2020, 2020
Beta-crown: Efficient bound propagation with per-neuron split constraints for neural network robustness verification
S Wang, H Zhang, K Xu, X Lin, S Jana, CJ Hsieh, JZ Kolter
NeurIPS 2021, 2021
Mixtrain: Scalable training of verifiably robust neural networks
S Wang, Y Chen, A Abdou, S Jana
arXiv preprint arXiv:1811.02625, 2018
Fast and complete: Enabling complete neural network verification with rapid and massively parallel incomplete verifiers
K Xu, H Zhang, S Wang, Y Wang, S Jana, X Lin, CJ Hsieh
ICLR 2021, 2021
On training robust {PDF} malware classifiers
Y Chen, S Wang, D She, S Jana
USENIX Security 2020, 2020
Towards understanding fast adversarial training
B Li, S Wang, S Jana, L Carin
arXiv preprint arXiv:2006.03089, 2020
Towards compact and robust deep neural networks
V Sehwag, S Wang, P Mittal, S Jana
arXiv preprint arXiv:1906.06110, 2019
Learning Security Classifiers with Verified Global Robustness Properties
Y Chen, S Wang, Y Qin, X Liao, S Jana, D Wagner
CCS 2021, 2021
Towards practical lottery ticket hypothesis for adversarial training
B Li, S Wang, Y Jia, Y Lu, Z Zhong, L Carin, S Jana
arXiv preprint arXiv:2003.05733, 2020
Enhancing gradient-based attacks with symbolic intervals
S Wang, Y Chen, A Abdou, S Jana
ICML Workshop on Security and Privacy of Machine Learning, 2019
Cost-Aware Robust Tree Ensembles for Security Applications
Y Chen, S Wang, W Jiang, A Cidon, S Jana
USENIX Security 2021, 2021
General Cutting Planes for Bound-Propagation-Based Neural Network Verification
H Zhang, S Wang, K Xu, L Li, B Li, S Jana, CJ Hsieh, JZ Kolter
NeurIPS 2022, 2022
Adaptive Verifiable Training Using Pairwise Class Similarity
S Wang, K Eykholt, T Lee, J Jang, I Molloy
AAAI 2021, 2021
Multi-lingual Evaluation of Code Generation Models
B Athiwaratkun, SK Gouda, Z Wang, X Li, Y Tian, M Tan, WU Ahmad, ...
arXiv preprint arXiv:2210.14868, 2022
Efficient Neural Network Verification Using Branch and Bound
S Wang
Columbia University, 2022
Bringing engineering rigor to Deep Learning
K Pei, S Wang, Y Tian, J Whitehouse, C Vondrick, Y Cao, B Ray, S Jana, ...
ACM SIGOPS Operating Systems Review 53 (1), 59-67, 2019
Defense against impersonating attackers: An efficient RFID mutual authentication protocol based on standard
S Wang, L Li, G Chen, T Chen, Z Wang
ICICS 2017, 2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20