Seguir
Shiqi Shen
Shiqi Shen
Dirección de correo verificada de comp.nus.edu.sg
Título
Citado por
Citado por
Año
Auror defending against poisoning attacks in collaborative deep learning systems
S Shen, S Tople, P Saxena
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
1612016
Neural nets can learn function type signatures from binaries
ZL Chua, S Shen, P Saxena, Z Liang
26th {USENIX} Security Symposium ({USENIX} Security 17), 99-116, 2017
1112017
Quantitative verification of neural networks and its security applications
T Baluta, S Shen, S Shinde, KS Meel, P Saxena
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
492019
Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints.
S Shen, S Shinde, S Ramesh, A Roychoudhury, P Saxena
NDSS, 2019
232019
Neuro-symbolic execution: The feasibility of an inductive approach to symbolic execution
S Shen, S Ramesh, S Shinde, A Roychoudhury, P Saxena
arXiv preprint arXiv:1807.00575, 2018
22018
Refined Grey-Box Fuzzing with SIVO
I Nikolic, R Mantu, S Shen, P Saxena
arXiv preprint arXiv:2102.02394, 2021
1*2021
Localizing Patch Points From One Exploit
S Shen, A Kolluri, Z Dong, P Saxena, A Roychoudhury
arXiv preprint arXiv:2008.04516, 2020
12020
Localizing Vulnerabilities Statistically From One Exploit
S Shen, A Kolluri, Z Dong, P Saxena, A Roychoudhury
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
2021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–8