Shiqi Wang
Shiqi Wang
Bestätigte E-Mail-Adresse bei cs.columbia.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes, ZM Mao, A Prakash, ...
NDSS 2 (2), 2.2, 2017
1922017
Formal security analysis of neural networks using symbolic intervals
S Wang, K Pei, J Whitehouse, J Yang, S Jana
27th {USENIX} Security Symposium ({USENIX} Security 18), 1599-1614, 2018
1692018
Efficient formal safety analysis of neural networks
S Wang, K Pei, J Whitehouse, J Yang, S Jana
arXiv preprint arXiv:1809.08098, 2018
1482018
Mixtrain: Scalable training of formally robust neural networks
S Wang, Y Chen, A Abdou, S Jana
arXiv preprint arXiv:1811.02625 14, 2018
562018
Towards compact and robust deep neural networks
V Sehwag, S Wang, P Mittal, S Jana
arXiv preprint arXiv:1906.06110, 2019
82019
On Training Robust {PDF} Malware Classifiers
Y Chen, S Wang, D She, S Jana
29th {USENIX} Security Symposium ({USENIX} Security 20), 2343-2360, 2020
72020
Enhancing gradient-based attacks with symbolic intervals
S Wang, Y Chen, A Abdou, S Jana
arXiv preprint arXiv:1906.02282, 2019
72019
Hydra: Pruning adversarially robust neural networks
V Sehwag, S Wang, P Mittal, S Jana
Advances in Neural Information Processing Systems (NeurIPS) 7, 2020
6*2020
Towards Practical Lottery Ticket Hypothesis for Adversarial Training
B Li, S Wang, Y Jia, Y Lu, Z Zhong, L Carin, S Jana
arXiv preprint arXiv:2003.05733, 2020
32020
Towards understanding fast adversarial training
B Li, S Wang, S Jana, L Carin
arXiv preprint arXiv:2006.03089, 2020
22020
Fast and complete: Enabling complete neural network verification with rapid and massively parallel incomplete verifiers
K Xu, H Zhang, S Wang, Y Wang, S Jana, X Lin, CJ Hsieh
arXiv preprint arXiv:2011.13824, 2020
12020
Defense against impersonating attackers: An efficient RFID mutual authentication protocol based on standard
S Wang, L Li, G Chen, T Chen, Z Wang
2017 8th International Conference on Information and Communication Systems …, 2017
12017
Improved group management protocol of RFID password method
T Chen, L Li, S Wang, G Chen, Z Wang
Proceedings of the Second International Conference on Internet of things …, 2017
12017
Adaptive Verifiable Training Using Pairwise Class Similarity
S Wang, K Eykholt, T Lee, J Jang, I Molloy
arXiv preprint arXiv:2012.07887, 2020
2020
Cost-Aware Robust Tree Ensembles for Security Applications
Y Chen, S Wang, W Jiang, A Cidon, S Jana
arXiv preprint arXiv:1912.01149, 2019
2019
Bringing Engineering Rigor to Deep Learning
K Pei, S Wang, Y Tian, J Whitehouse, C Vondrick, Y Cao, B Ray, S Jana, ...
ACM SIGOPS Operating Systems Review 53 (1), 59-67, 2019
2019
Training Robust Tree Ensembles for Security.
Y Chen, S Wang, W Jiang, A Cidon, S Jana
CoRR, 2019
2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–17