Shiqi Wang
Title
Cited by
Cited by
Year
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes, ZM Mao, A Prakash, ...
NDSS 2 (2), 2.2, 2017
2202017
Formal security analysis of neural networks using symbolic intervals
S Wang, K Pei, J Whitehouse, J Yang, S Jana
27th {USENIX} Security Symposium ({USENIX} Security 18), 1599-1614, 2018
2102018
Efficient formal safety analysis of neural networks
S Wang, K Pei, J Whitehouse, J Yang, S Jana
arXiv preprint arXiv:1809.08098, 2018
1882018
Mixtrain: Scalable training of formally robust neural networks
S Wang, Y Chen, A Abdou, S Jana
arXiv preprint arXiv:1811.02625 14, 2018
662018
Hydra: Pruning adversarially robust neural networks
V Sehwag, S Wang, P Mittal, S Jana
Advances in Neural Information Processing Systems (NeurIPS) 7, 2020
22*2020
On Training Robust {PDF} Malware Classifiers
Y Chen, S Wang, D She, S Jana
29th {USENIX} Security Symposium ({USENIX} Security 20), 2343-2360, 2020
162020
Towards understanding fast adversarial training
B Li, S Wang, S Jana, L Carin
arXiv preprint arXiv:2006.03089, 2020
92020
Towards compact and robust deep neural networks
V Sehwag, S Wang, P Mittal, S Jana
arXiv preprint arXiv:1906.06110, 2019
92019
Enhancing gradient-based attacks with symbolic intervals
S Wang, Y Chen, A Abdou, S Jana
arXiv preprint arXiv:1906.02282, 2019
82019
Beta-crown: Efficient bound propagation with per-neuron split constraints for complete and incomplete neural network verification
S Wang, H Zhang, K Xu, X Lin, S Jana, CJ Hsieh, JZ Kolter
arXiv preprint arXiv:2103.06624, 2021
32021
Fast and complete: Enabling complete neural network verification with rapid and massively parallel incomplete verifiers
K Xu, H Zhang, S Wang, Y Wang, S Jana, X Lin, CJ Hsieh
arXiv preprint arXiv:2011.13824, 2020
32020
Towards Practical Lottery Ticket Hypothesis for Adversarial Training
B Li, S Wang, Y Jia, Y Lu, Z Zhong, L Carin, S Jana
arXiv preprint arXiv:2003.05733, 2020
32020
Bringing Engineering Rigor to Deep Learning
K Pei, S Wang, Y Tian, J Whitehouse, C Vondrick, Y Cao, B Ray, S Jana, ...
ACM SIGOPS Operating Systems Review 53 (1), 59-67, 2019
12019
Defense against impersonating attackers: An efficient RFID mutual authentication protocol based on standard
S Wang, L Li, G Chen, T Chen, Z Wang
2017 8th International Conference on Information and Communication Systems …, 2017
12017
Improved group management protocol of RFID password method
T Chen, L Li, S Wang, G Chen, Z Wang
Proceedings of the Second International Conference on Internet of things …, 2017
12017
Cost-Aware Robust Tree Ensembles for Security Applications
Y Chen, S Wang, W Jiang, A Cidon, S Jana
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
2021
Adaptive Verifiable Training Using Pairwise Class Similarity
S Wang, K Eykholt, T Lee, J Jang, I Molloy
arXiv preprint arXiv:2012.07887, 2020
2020
Training Robust Tree Ensembles for Security.
Y Chen, S Wang, W Jiang, A Cidon, S Jana
CoRR, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–18