Deepxplore: Automated whitebox testing of deep learning systems K Pei, Y Cao, J Yang, S Jana proceedings of the 26th Symposium on Operating Systems Principles, 1-18, 2017 | 1529 | 2017 |
An empirical study of operating systems errors A Chou, J Yang, B Chelf, S Hallem, D Engler Proceedings of the eighteenth ACM symposium on Operating systems principles …, 2001 | 1123 | 2001 |
Formal security analysis of neural networks using symbolic intervals S Wang, K Pei, J Whitehouse, J Yang, S Jana 27th USENIX Security Symposium (USENIX Security 18), 1599-1614, 2018 | 536 | 2018 |
Towards making systems forget with machine unlearning Y Cao, J Yang 2015 IEEE symposium on security and privacy, 463-480, 2015 | 515 | 2015 |
Efficient formal safety analysis of neural networks S Wang, K Pei, J Whitehouse, J Yang, S Jana Advances in neural information processing systems 31, 2018 | 479 | 2018 |
Using model checking to find serious file system errors J Yang, P Twohey, D Engler, M Musuvathi ACM Transactions on Computer Systems (TOCS) 24 (4), 393-423, 2006 | 428 | 2006 |
MODIST: Transparent model checking of unmodified distributed systems J Yang, T Chen, M Wu, Z Xu, X Liu, H Lin, M Yang, F Long, L Zhang, ... Proceedings of the 6th USENIX symposium on Networked systems design and …, 2009 | 319 | 2009 |
Neuzz: Efficient fuzzing with neural program smoothing D She, K Pei, D Epstein, J Yang, B Ray, S Jana 2019 IEEE Symposium on Security and Privacy (SP), 803-817, 2019 | 269 | 2019 |
Explode: a lightweight, general system for finding serious storage system errors J Yang, C Sar, D Engler Proceedings of the 7th symposium on Operating systems design and …, 2006 | 223 | 2006 |
Metric learning for adversarial robustness C Mao, Z Zhong, J Yang, C Vondrick, B Ray Advances in neural information processing systems 32, 2019 | 216 | 2019 |
Shuffler: fast and deployable continuous code {re-randomization} D Williams-King, G Gobieski, K Williams-King, JP Blake, X Yuan, P Colp, ... 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2016 | 187 | 2016 |
Correlation exploitation in error ranking T Kremenek, K Ashcraft, J Yang, D Engler ACM SIGSOFT Software Engineering Notes 29 (6), 83-93, 2004 | 183 | 2004 |
Stable deterministic multithreading through schedule memoization H Cui, J Wu, C Tsai, J Yang 9th OSDI, 2010 | 154 | 2010 |
Automatically generating malicious disks using symbolic execution J Yang, C Sar, P Twohey, C Cadar, D Engler 2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-257, 2006 | 148 | 2006 |
Efficiently, effectively detecting mobile app bugs with appdoctor G Hu, X Yuan, Y Tang, J Yang Proceedings of the Ninth European Conference on Computer Systems, 1-15, 2014 | 142 | 2014 |
Fingerprinting event logs for system management troubleshooting R Panigrahy, C Verbowski, Y Xie, J Yang, D Yuan US Patent 8,069,374, 2011 | 133 | 2011 |
Practical software model checking via dynamic interface reduction H Guo, M Wu, L Zhou, G Hu, J Yang, L Zhang Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011 | 129 | 2011 |
Towards practical verification of machine learning: The case of computer vision systems K Pei, L Zhu, Y Cao, J Yang, C Vondrick, S Jana arXiv preprint arXiv:1712.01785, 2017 | 128 | 2017 |
Overload control for scaling wechat microservices H Zhou, M Chen, Q Lin, Y Wang, X She, S Liu, R Gu, BC Ooi, J Yang Proceedings of the ACM Symposium on Cloud Computing, 149-161, 2018 | 109 | 2018 |
Parrot: A practical runtime for deterministic, stable, and reliable threads H Cui, J Simsa, YH Lin, H Li, B Blum, X Xu, J Yang, GA Gibson, RE Bryant Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems …, 2013 | 108 | 2013 |