default search action
Shiqing Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Weipeng Jiang, Juan Zhai, Shiqing Ma, Xiaoyu Zhang, Chao Shen:
COSTELLO: Contrastive Testing for Embedding-Based Large Language Model as a Service Embeddings. Proc. ACM Softw. Eng. 1(FSE): 906-928 (2024) - [c70]Shengwei An, Sheng-Yen Chou, Kaiyuan Zhang, Qiuling Xu, Guanhong Tao, Guangyu Shen, Siyuan Cheng, Shiqing Ma, Pin-Yu Chen, Tsung-Yi Ho, Xiangyu Zhang:
Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift. AAAI 2024: 10847-10855 - [c69]Jinsong Mao, Hailun Ding, Juan Zhai, Shiqing Ma:
Merlin: Multi-tier Optimization of eBPF Code for Performance and Compactness. ASPLOS (3) 2024: 639-653 - [c68]Yuan Xiao, Shiqing Ma, Juan Zhai, Chunrong Fang, Jinyuan Jia, Zhenyu Chen:
Towards General Robustness Verification of MaxPool-Based Convolutional Neural Networks via Tightening Linear Approximation. CVPR 2024: 24766-24775 - [c67]Siyuan Cheng, Guanhong Tao, Yingqi Liu, Guangyu Shen, Shengwei An, Shiwei Feng, Xiangzhe Xu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang:
Lotus: Evasive and Resilient Backdoor Attacks through Sub-Partitioning. CVPR 2024: 24798-24809 - [c66]Siyuan Cheng, Guangyu Shen, Kaiyuan Zhang, Guanhong Tao, Shengwei An, Hanxi Guo, Shiqing Ma, Xiangyu Zhang:
UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening. ECCV (62) 2024: 262-281 - [c65]Zhenting Wang, Chen Chen, Lingjuan Lyu, Dimitris N. Metaxas, Shiqing Ma:
DIAGNOSIS: Detecting Unauthorized Data Usages in Text-to-image Diffusion Models. ICLR 2024 - [c64]Zhenting Wang, Vikash Sehwag, Chen Chen, Lingjuan Lyu, Dimitris N. Metaxas, Shiqing Ma:
How to Trace Latent Generative Model Generated Images without Artificial Watermark? ICML 2024 - [c63]Xuanqi Gao, Weipeng Jiang, Juan Zhai, Shiqing Ma, Xiaoyu Zhang, Chao Shen:
Efficient DNN-Powered Software with Fair Sparse Models. ISSTA 2024: 983-995 - [c62]Rui Zhu, Di Tang, Siyuan Tang, Zihao Wang, Guanhong Tao, Shiqing Ma, XiaoFeng Wang, Haixu Tang:
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering. NDSS 2024 - [c61]Siyuan Cheng, Guangyu Shen, Guanhong Tao, Kaiyuan Zhang, Zhuo Zhang, Shengwei An, Xiangzhe Xu, Yingqi Li, Shiqing Ma, Xiangyu Zhang:
OdScan: Backdoor Scanning for Object Detection Models. SP 2024: 1703-1721 - [c60]Guanhong Tao, Zhenting Wang, Shiwei Feng, Guangyu Shen, Shiqing Ma, Xiangyu Zhang:
Distribution Preserving Backdoor Attack in Self-supervised Learning. SP 2024: 2029-2047 - [c59]Kaiyuan Zhang, Siyuan Cheng, Guangyu Shen, Guanhong Tao, Shengwei An, Anuran Makur, Shiqing Ma, Xiangyu Zhang:
Exploring the Orthogonality and Linearity of Backdoor Attacks. SP 2024: 2105-2123 - [i44]Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Chao Shen:
DREAM: Debugging and Repairing AutoML Pipelines. CoRR abs/2401.00379 (2024) - [i43]Guangyu Shen, Siyuan Cheng, Kaiyuan Zhang, Guanhong Tao, Shengwei An, Lu Yan, Zhuo Zhang, Shiqing Ma, Xiangyu Zhang:
Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation and Echopraxia. CoRR abs/2402.05467 (2024) - [i42]Hyejun Jeong, Shiqing Ma, Amir Houmansadr:
SoK: Challenges and Opportunities in Federated Unlearning. CoRR abs/2403.02437 (2024) - [i41]Siyuan Cheng, Guanhong Tao, Yingqi Liu, Guangyu Shen, Shengwei An, Shiwei Feng, Xiangzhe Xu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang:
LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning. CoRR abs/2403.17188 (2024) - [i40]Zhenting Wang, Vikash Sehwag, Chen Chen, Lingjuan Lyu, Dimitris N. Metaxas, Shiqing Ma:
How to Trace Latent Generative Model Generated Images without Artificial Watermark? CoRR abs/2405.13360 (2024) - [i39]Hanrong Zhang, Zhenting Wang, Tingxu Han, Mingyu Jin, Chenlu Zhan, Mengnan Du, Hongwei Wang, Shiqing Ma:
Towards Imperceptible Backdoor Attack in Self-supervised Learning. CoRR abs/2405.14672 (2024) - [i38]Weipeng Jiang, Xuanqi Gao, Juan Zhai, Shiqing Ma, Xiaoyu Zhang, Chao Shen:
From Effectiveness to Efficiency: Comparative Evaluation of Code Generated by LCGMs for Bilingual Programming Questions. CoRR abs/2406.00602 (2024) - [i37]Yuan Xiao, Shiqing Ma, Juan Zhai, Chunrong Fang, Jinyuan Jia, Zhenyu Chen:
Towards General Robustness Verification of MaxPool-based Convolutional Neural Networks via Tightening Linear Approximation. CoRR abs/2406.00699 (2024) - [i36]Sajjad Amini, Mohammadreza Teymoorianfard, Shiqing Ma, Amir Houmansadr:
MeanSparse: Post-Training Robustness Enhancement Through Mean-Centered Feature Sparsification. CoRR abs/2406.05927 (2024) - [i35]Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Shiwei Wang, Chao Shen:
CITADEL: Context Similarity Based Deep Learning Framework Bug Finding. CoRR abs/2406.12196 (2024) - [i34]Xuanqi Gao, Weipeng Jiang, Juan Zhai, Shiqing Ma, Xiaoyu Zhang, Chao Shen:
Efficient DNN-Powered Software with Fair Sparse Models. CoRR abs/2407.02805 (2024) - [i33]Qingcheng Zeng, Mingyu Jin, Qinkai Yu, Zhenting Wang, Wenyue Hua, Zihao Zhou, Guangyan Sun, Yanda Meng, Shiqing Ma, Qifan Wang, Felix Juefei-Xu, Kaize Ding, Fan Yang, Ruixiang Tang, Yongfeng Zhang:
Uncertainty is Fragile: Manipulating Uncertainty in Large Language Models. CoRR abs/2407.11282 (2024) - [i32]Siyuan Cheng, Guangyu Shen, Kaiyuan Zhang, Guanhong Tao, Shengwei An, Hanxi Guo, Shiqing Ma, Xiangyu Zhang:
UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening. CoRR abs/2407.11372 (2024) - [i31]Weipeng Jiang, Zhenting Wang, Juan Zhai, Shiqing Ma, Zhengyu Zhao, Chao Shen:
Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer. CoRR abs/2408.11313 (2024) - [i30]Zhenting Wang, Zhizhi Wang, Mingyu Jin, Mengnan Du, Juan Zhai, Shiqing Ma:
Data-centric NLP Backdoor Defense from the Lens of Memorization. CoRR abs/2409.14200 (2024) - [i29]Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Chao Shen, Tianlin Li, Weipeng Jiang, Yang Liu:
Speculative Coreset Selection for Task-Specific Fine-tuning. CoRR abs/2410.01296 (2024) - [i28]Hyejun Jeong, Shiqing Ma, Amir Houmansadr:
Bias Similarity Across Large Language Models. CoRR abs/2410.12010 (2024) - 2023
- [j4]Yongqiang Tian, Wuqi Zhang, Ming Wen, Shing-Chi Cheung, Chengnian Sun, Shiqing Ma, Yu Jiang:
Finding Deviated Behaviors of the Compressed DNN Models for Image Classifications. ACM Trans. Softw. Eng. Methodol. 32(5): 128:1-128:32 (2023) - [j3]Mohannad Alhanahnah, Shiqing Ma, Ashish Gehani, Gabriela F. Ciocarlie, Vinod Yegneswaran, Somesh Jha, Xiangyu Zhang:
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning. IEEE Trans. Software Eng. 49(4): 2761-2775 (2023) - [c58]Kai Mei, Zheng Li, Zhenting Wang, Yang Zhang, Shiqing Ma:
NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models. ACL (1) 2023: 15551-15565 - [c57]Shiwei Feng, Guanhong Tao, Siyuan Cheng, Guangyu Shen, Xiangzhe Xu, Yingqi Liu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang:
Detecting Backdoors in Pre-trained Encoders. CVPR 2023: 16352-16362 - [c56]Aolin Ding, Matthew Chan, Amin Hass, Nils Ole Tippenhauer, Shiqing Ma, Saman A. Zonouz:
Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Aerial Vehicles. DSN 2023: 67-80 - [c55]Kaiyuan Zhang, Guanhong Tao, Qiuling Xu, Siyuan Cheng, Shengwei An, Yingqi Liu, Shiwei Feng, Guangyu Shen, Pin-Yu Chen, Shiqing Ma, Xiangyu Zhang:
FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning. ICLR 2023 - [c54]Zhenting Wang, Kai Mei, Juan Zhai, Shiqing Ma:
UNICORN: A Unified Backdoor Trigger Inversion Framework. ICLR 2023 - [c53]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Shiwei Wang:
CILIATE: Towards Fairer Class-Based Incremental Learning by Dataset and Training Refinement. ISSTA 2023: 475-487 - [c52]Siyuan Cheng, Guanhong Tao, Yingqi Liu, Shengwei An, Xiangzhe Xu, Shiwei Feng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Shiqing Ma, Xiangyu Zhang:
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense. NDSS 2023 - [c51]Guangyu Shen, Siyuan Cheng, Guanhong Tao, Kaiyuan Zhang, Yingqi Liu, Shengwei An, Shiqing Ma, Xiangyu Zhang:
Django: Detecting Trojans in Object Detection Models via Gaussian Focus Calibration. NeurIPS 2023 - [c50]Zhenting Wang, Chen Chen, Yi Zeng, Lingjuan Lyu, Shiqing Ma:
Where Did I Come From? Origin Attribution of AI-Generated Images. NeurIPS 2023 - [c49]Shengwei An, Yuan Yao, Qiuling Xu, Shiqing Ma, Guanhong Tao, Siyuan Cheng, Kaiyuan Zhang, Yingqi Liu, Guangyu Shen, Ian Kelk, Xiangyu Zhang:
ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes. SP 2023: 899-916 - [c48]Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang, Qi Li, Yuan Rao:
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems. USENIX Security Symposium 2023: 247-264 - [c47]Hailun Ding, Juan Zhai, Yuhong Nan, Shiqing Ma:
AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts. USENIX Security Symposium 2023: 373-390 - [c46]Hailun Ding, Juan Zhai, Dong Deng, Shiqing Ma:
The Case for Learned Provenance Graph Storage Systems. USENIX Security Symposium 2023: 3277-3294 - [i27]Siyuan Cheng, Guanhong Tao, Yingqi Liu, Shengwei An, Xiangzhe Xu, Shiwei Feng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Shiqing Ma, Xiangyu Zhang:
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense. CoRR abs/2301.06241 (2023) - [i26]Rui Zhu, Di Tang, Siyuan Tang, Guanhong Tao, Shiqing Ma, XiaoFeng Wang, Haixu Tang:
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering. CoRR abs/2301.12318 (2023) - [i25]Shiwei Feng, Guanhong Tao, Siyuan Cheng, Guangyu Shen, Xiangzhe Xu, Yingqi Liu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang:
Detecting Backdoors in Pre-trained Encoders. CoRR abs/2303.15180 (2023) - [i24]Zhenting Wang, Kai Mei, Juan Zhai, Shiqing Ma:
UNICORN: A Unified Backdoor Trigger Inversion Framework. CoRR abs/2304.02786 (2023) - [i23]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Shiwei Wang:
CILIATE: Towards Fairer Class-based Incremental Learning by Dataset and Training Refinement. CoRR abs/2304.04222 (2023) - [i22]Kai Mei, Zheng Li, Zhenting Wang, Yang Zhang, Shiqing Ma:
NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models. CoRR abs/2305.17826 (2023) - [i21]Zhenting Wang, Chen Chen, Yi Zeng, Lingjuan Lyu, Shiqing Ma:
Alteration-free and Model-agnostic Origin Attribution of Generated Images. CoRR abs/2305.18439 (2023) - [i20]Zhenting Wang, Chen Chen, Yuchen Liu, Lingjuan Lyu, Dimitris N. Metaxas, Shiqing Ma:
How to Detect Unauthorized Data Usages in Text-to-image Diffusion Models. CoRR abs/2307.03108 (2023) - [i19]Shengwei An, Sheng-Yen Chou, Kaiyuan Zhang, Qiuling Xu, Guanhong Tao, Guangyu Shen, Siyuan Cheng, Shiqing Ma, Pin-Yu Chen, Tsung-Yi Ho, Xiangyu Zhang:
Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift. CoRR abs/2312.00050 (2023) - 2022
- [j2]Bao Gia Doan, Minhui Xue, Shiqing Ma, Ehsan Abbasnejad, Damith C. Ranasinghe:
TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems. IEEE Trans. Inf. Forensics Secur. 17: 3816-3830 (2022) - [c45]Guanhong Tao, Guangyu Shen, Yingqi Liu, Shengwei An, Qiuling Xu, Shiqing Ma, Pan Li, Xiangyu Zhang:
Better Trigger Inversion Optimization in Backdoor Scanning. CVPR 2022: 13358-13368 - [c44]Yingqi Liu, Guangyu Shen, Guanhong Tao, Zhenting Wang, Shiqing Ma, Xiangyu Zhang:
Complex Backdoor Detection by Symmetric Feature Differencing. CVPR 2022: 14983-14993 - [c43]Zhenting Wang, Juan Zhai, Shiqing Ma:
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning. CVPR 2022: 15054-15063 - [c42]Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang:
Dynamic Backdoor Attacks Against Machine Learning Models. EuroS&P 2022: 703-718 - [c41]Guangyu Shen, Yingqi Liu, Guanhong Tao, Qiuling Xu, Zhuo Zhang, Shengwei An, Shiqing Ma, Xiangyu Zhang:
Constrained Optimization with Dynamic Bound-scaling for Effective NLP Backdoor Defense. ICML 2022: 19879-19892 - [c40]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Qian Wang:
Fairneuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons. ICSE 2022: 921-933 - [c39]Brian Zhang, Shiqing Ma:
Achieving Both Model Accuracy and Robustness by Adversarial Training with Batch Norm Shaping. ICTAI 2022: 591-598 - [c38]Zhenting Wang, Hailun Ding, Juan Zhai, Shiqing Ma:
Training with More Confidence: Mitigating Injected and Natural Backdoors During Training. NeurIPS 2022 - [c37]Zhenting Wang, Kai Mei, Hailun Ding, Juan Zhai, Shiqing Ma:
Rethinking the Reverse-engineering of Trojan Triggers. NeurIPS 2022 - [c36]Yingqi Liu, Guangyu Shen, Guanhong Tao, Shengwei An, Shiqing Ma, Xiangyu Zhang:
Piccolo: Exposing Complex Backdoors in NLP Transformer Models. SP 2022: 2025-2042 - [p1]Shaofeng Li, Shiqing Ma, Minhui Xue, Benjamin Zi Hao Zhao:
Deep Learning Backdoors. Security and Artificial Intelligence 2022: 313-334 - [i18]Guangyu Shen, Yingqi Liu, Guanhong Tao, Qiuling Xu, Zhuo Zhang, Shengwei An, Shiqing Ma, Xiangyu Zhang:
Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense. CoRR abs/2202.05749 (2022) - [i17]Zhenting Wang, Hailun Ding, Juan Zhai, Shiqing Ma:
Neural Network Trojans Analysis and Mitigation from the Input Domain. CoRR abs/2202.06382 (2022) - [i16]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Qian Wang:
FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons. CoRR abs/2204.02567 (2022) - [i15]Zhenting Wang, Juan Zhai, Shiqing Ma:
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning. CoRR abs/2205.13383 (2022) - [i14]Xiaoyi Chen, Baisong Xin, Shengfang Zhai, Shiqing Ma, Qingni Shen, Zhonghai Wu:
Apple of Sodom: Hidden Backdoors in Superior Sentence Embeddings via Contrastive Learning. CoRR abs/2210.11082 (2022) - [i13]Kaiyuan Zhang, Guanhong Tao, Qiuling Xu, Siyuan Cheng, Shengwei An, Yingqi Liu, Shiwei Feng, Guangyu Shen, Pin-Yu Chen, Shiqing Ma, Xiangyu Zhang:
FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning. CoRR abs/2210.12873 (2022) - [i12]Zhenting Wang, Kai Mei, Hailun Ding, Juan Zhai, Shiqing Ma:
Rethinking the Reverse-engineering of Trojan Triggers. CoRR abs/2210.15127 (2022) - [i11]Guanhong Tao, Zhenting Wang, Siyuan Cheng, Shiqing Ma, Shengwei An, Yingqi Liu, Guangyu Shen, Zhuo Zhang, Yunshu Mao, Xiangyu Zhang:
Backdoor Vulnerabilities in Normally Trained Deep Learning Models. CoRR abs/2211.15929 (2022) - 2021
- [j1]Yongqiang Tian, Shiqing Ma, Ming Wen, Yepang Liu, Shing-Chi Cheung, Xiangyu Zhang:
To what extent do DNN-based image classification models make unreliable inferences? Empir. Softw. Eng. 26(4): 84 (2021) - [c35]Siyuan Cheng, Yingqi Liu, Shiqing Ma, Xiangyu Zhang:
Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification. AAAI 2021: 1148-1156 - [c34]Xiaoyi Chen, Ahmed Salem, Dingfan Chen, Michael Backes, Shiqing Ma, Qingni Shen, Zhonghai Wu, Yang Zhang:
BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements. ACSAC 2021: 554-569 - [c33]Guangyu Shen, Yingqi Liu, Guanhong Tao, Shengwei An, Qiuling Xu, Siyuan Cheng, Shiqing Ma, Xiangyu Zhang:
Backdoor Scanning for Deep Neural Networks through K-Arm Optimization. ICML 2021: 9525-9536 - [c32]Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Chao Shen:
AUTOTRAINER: An Automatic DNN Training Problem Detection and Repair System. ICSE 2021: 359-371 - [c31]Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent E. Urias, Han Wei Lin, Gabriela F. Ciocarlie, Vinod Yegneswaran, Ashish Gehani:
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation. NDSS 2021 - [c30]Mohammad Kavousi, Runqing Yang, Shiqing Ma, Yan Chen:
SemFlow: Accurate Semantic Identification from Low-Level System Data. SecureComm (1) 2021: 513-535 - [c29]Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu:
ATLAS: A Sequence-based Learning Approach for Attack Investigation. USENIX Security Symposium 2021: 3005-3022 - [c28]Hailun Ding, Shenao Yan, Juan Zhai, Shiqing Ma:
ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning. USENIX Security Symposium 2021: 3023-3040 - [i10]Guangyu Shen, Yingqi Liu, Guanhong Tao, Shengwei An, Qiuling Xu, Siyuan Cheng, Shiqing Ma, Xiangyu Zhang:
Backdoor Scanning for Deep Neural Networks through K-Arm Optimization. CoRR abs/2102.05123 (2021) - [i9]Yingqi Liu, Guangyu Shen, Guanhong Tao, Zhenting Wang, Shiqing Ma, Xiangyu Zhang:
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry. CoRR abs/2103.08820 (2021) - [i8]Bao Gia Doan, Minhui Xue, Shiqing Ma, Ehsan Abbasnejad, Damith C. Ranasinghe:
TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems. CoRR abs/2111.09999 (2021) - [i7]Yongqiang Tian, Wuqi Zhang, Ming Wen, Shing-Chi Cheung, Chengnian Sun, Shiqing Ma, Yu Jiang:
Fast Test Input Generation for Finding Deviated Behaviors in Compressed Deep Neural Network. CoRR abs/2112.02819 (2021) - 2020
- [c27]Guanhong Tao, Shiqing Ma, Yingqi Liu, Qiuling Xu, Xiangyu Zhang:
TRADER: trace divergence analysis and embedding regulation for debugging recurrent neural networks. ICSE 2020: 986-998 - [c26]Juan Zhai, Xiangzhe Xu, Yu Shi, Guanhong Tao, Minxue Pan, Shiqing Ma, Lei Xu, Weifeng Zhang, Lin Tan, Xiangyu Zhang:
CPC: automatically classifying and propagating natural language comments via program analysis. ICSE 2020: 1359-1371 - [c25]Yang Zhang, Shuai Shao, Juan Zhai, Shiqing Ma:
FineLock: automatically refactoring coarse-grained locks into fine-grained locks. ISSTA 2020: 565-568 - [c24]Runqing Yang, Shiqing Ma, Haitao Xu, Xiangyu Zhang, Yan Chen:
UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications. NDSS 2020 - [c23]Juan Zhai, Yu Shi, Minxue Pan, Guian Zhou, Yongxiang Liu, Chunrong Fang, Shiqing Ma, Lin Tan, Xiangyu Zhang:
C2S: translating natural language comments to formal program specifications. ESEC/SIGSOFT FSE 2020: 25-37 - [c22]Shenao Yan, Guanhong Tao, Xuwei Liu, Juan Zhai, Shiqing Ma, Lei Xu, Xiangyu Zhang:
Correlations between deep neural network model coverage criteria and model quality. ESEC/SIGSOFT FSE 2020: 775-787 - [i6]Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang:
Dynamic Backdoor Attacks Against Machine Learning Models. CoRR abs/2003.03675 (2020) - [i5]Xiaoyi Chen, Ahmed Salem, Michael Backes, Shiqing Ma, Yang Zhang:
BadNL: Backdoor Attacks Against NLP Models. CoRR abs/2006.01043 (2020) - [i4]Shaofeng Li, Shiqing Ma, Minhui Xue, Benjamin Zi Hao Zhao:
Deep Learning Backdoors. CoRR abs/2007.08273 (2020) - [i3]Siyuan Cheng, Yingqi Liu, Shiqing Ma, Xiangyu Zhang:
Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification. CoRR abs/2012.11212 (2020)
2010 – 2019
- 2019
- [c21]Yingqi Liu, Wen-Chuan Lee, Guanhong Tao, Shiqing Ma, Yousra Aafer, Xiangyu Zhang:
ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation. CCS 2019: 1265-1282 - [c20]Wen-Chuan Lee, Yingqi Liu, Peng Liu, Shiqing Ma, Hongjun Choi, Xiangyu Zhang, Rajiv Gupta:
White-Box Program Tuning. CGO 2019: 122-135 - [c19]Wei You, Xuwei Liu, Shiqing Ma, David Mitchel Perry, Xiangyu Zhang, Bin Liang:
SLF: fuzzing without valid seed inputs. ICSE 2019: 712-723 - [c18]Shiqing Ma, Yingqi Liu, Guanhong Tao, Wen-Chuan Lee, Xiangyu Zhang:
NIC: Detecting Adversarial Samples with Neural Network Invariant Checking. NDSS 2019 - [c17]Wen-Chuan Lee, Peng Liu, Yingqi Liu, Shiqing Ma, Xiangyu Zhang:
Programming support for autonomizing software. PLDI 2019: 702-716 - [c16]Wei You, Xueqiang Wang, Shiqing Ma, Jianjun Huang, Xiangyu Zhang, XiaoFeng Wang, Bin Liang:
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery. IEEE Symposium on Security and Privacy 2019: 769-786 - [i2]Yongqiang Tian, Shiqing Ma, Ming Wen, Yepang Liu, Shing-Chi Cheung, Xiangyu Zhang:
Testing Deep Learning Models for Image Analysis Using Object-Relevant Metamorphic Relations. CoRR abs/1909.03824 (2019) - 2018
- [c15]Fei Wang, Yonghwi Kwon, Shiqing Ma, Xiangyu Zhang, Dongyan Xu:
Lprov: Practical Library-aware Provenance Tracing. ACSAC 2018: 605-617 - [c14]Zhaogui Xu, Shiqing Ma, Xiangyu Zhang, Shuofei Zhu, Baowen Xu:
Debugging with intelligence via probabilistic inference. ICSE 2018: 1171-1181 - [c13]Zhenhao Tang, Juan Zhai, Minxue Pan, Yousra Aafer, Shiqing Ma, Xiangyu Zhang, Jianhua Zhao:
Dual-force: understanding WebView malware via cross-language forced execution. ASE 2018: 714-725 - [c12]Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran:
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation. NDSS 2018 - [c11]Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, Xiangyu Zhang:
Trojaning Attack on Neural Networks. NDSS 2018 - [c10]Guanhong Tao, Shiqing Ma, Yingqi Liu, Xiangyu Zhang:
Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples. NeurIPS 2018: 7728-7739 - [c9]Shiqing Ma, Yingqi Liu, Wen-Chuan Lee, Xiangyu Zhang, Ananth Grama:
MODE: automated neural network model debugging via state differential analysis and input selection. ESEC/SIGSOFT FSE 2018: 175-186 - [c8]Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee, Xiangyu Zhang, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, Somesh Jha:
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking. USENIX ATC 2018: 241-254 - [i1]Guanhong Tao, Shiqing Ma, Yingqi Liu, Xiangyu Zhang:
Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples. CoRR abs/1810.11580 (2018) - 2017
- [c7]Chonghua Wang, Shiqing Ma, Xiangyu Zhang, Junghwan Rhee, Xiaochun Yun, Zhiyu Hao:
A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware. SecureComm 2017: 778-792 - [c6]Shiqing Ma, Yousra Aafer, Zhaogui Xu, Wen-Chuan Lee, Juan Zhai, Yingqi Liu, Xiangyu Zhang:
LAMP: data provenance for graph based machine learning algorithms through derivative computation. ESEC/SIGSOFT FSE 2017: 786-797 - [c5]Shiqing Ma, Juan Zhai, Fei Wang, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning. USENIX Security Symposium 2017: 1111-1128 - 2016
- [c4]Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo Si, Xiangyu Zhang, Dongyan Xu:
HERCULE: attack story reconstruction via community discovery on correlated log graph. ACSAC 2016: 583-595 - [c3]Juan Zhai, Jianjun Huang, Shiqing Ma, Xiangyu Zhang, Lin Tan, Jianhua Zhao, Feng Qin:
Automatic model generation from documentation for Java API functions. ICSE 2016: 380-391 - [c2]Shiqing Ma, Xiangyu Zhang, Dongyan Xu:
ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting. NDSS 2016 - 2015
- [c1]Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu:
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows. ACSAC 2015: 401-410
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 23:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint