DeepXplore: Automated Whitebox Testing of Deep Learning Systems K Pei, Y Cao, J Yang, S Jana Proceedings of the 26th Symposium on Operating Systems Principles, 1--18, 2017 | 1563 | 2017 |
Deeptest: Automated testing of deep-neural-network-driven autonomous cars Y Tian, K Pei, S Jana, B Ray Proceedings of the 40th international conference on software engineering …, 2018 | 1559 | 2018 |
Formal security analysis of neural networks using symbolic intervals S Wang, K Pei, J Whitehouse, J Yang, S Jana 27th USENIX Security Symposium (USENIX Security 18), 1599-1614, 2018 | 542 | 2018 |
Efficient formal safety analysis of neural networks S Wang, K Pei, J Whitehouse, J Yang, S Jana Advances in Neural Information Processing Systems 31, 2018 | 485 | 2018 |
Neuzz: Efficient fuzzing with neural program smoothing D She, K Pei, D Epstein, J Yang, B Ray, S Jana 2019 IEEE Symposium on Security and Privacy (SP), 803-817, 2019 | 271 | 2019 |
Hercule: Attack story reconstruction via community discovery on correlated log graph K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang, L Si, X Zhang, ... Proceedings of the 32Nd Annual Conference on Computer Security Applications …, 2016 | 187 | 2016 |
Towards practical verification of machine learning: The case of computer vision systems K Pei, L Zhu, Y Cao, J Yang, C Vondrick, S Jana ICSE 2019 Workshop on Testing for Deep Learning and Deep Learning for …, 2019 | 128 | 2019 |
HVLearn: Automated black-box analysis of hostname verification in SSL/TLS implementations S Sivakorn, G Argyros, K Pei, AD Keromytis, S Jana 2017 IEEE Symposium on Security and Privacy (SP), 521-538, 2017 | 106 | 2017 |
Python probabilistic type inference with natural language support Z Xu, X Zhang, L Chen, K Pei, B Xu Proceedings of the 2016 24th ACM SIGSOFT international symposium on …, 2016 | 104 | 2016 |
TREX: Learning Execution Semantics from Micro-Traces for Binary Similarity K Pei, Z Xuan, J Yang, S Jana, B Ray IEEE Transactions on Software Engineering, 2020 | 102* | 2020 |
Swe-bench: Can language models resolve real-world github issues? CE Jimenez, J Yang, A Wettig, S Yao, K Pei, O Press, K Narasimhan arXiv preprint arXiv:2310.06770, 2023 | 96 | 2023 |
XDA: Accurate, Robust Disassembly with Transfer Learning K Pei, J Guan, D Williams-King, J Yang, S Jana 2021 Network and Distributed System Security Symposium (NDSS 2021), 2020 | 60 | 2020 |
Leaps: Detecting camouflaged attacks with statistical learning guided by program analysis Z Gu, K Pei, Q Wang, L Si, X Zhang, D Xu Proceedings of the 2015 45th Annual IEEE/IFIP International Conference on …, 2015 | 54 | 2015 |
Symlm: Predicting function names in stripped binaries via context-sensitive execution-aware code embeddings X Jin, K Pei, JY Won, Z Lin Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 52 | 2022 |
StateFormer: Fine-Grained Type Recovery from Binaries Using Generative State Modeling K Pei, J Guan, M Broughton, Z Chen, S Yao, D Williams-King, ... Proceedings of the 29th ACM Joint European Software Engineering Conference …, 2021 | 51 | 2021 |
Private search on key-value stores with hierarchical indexes H Hu, J Xu, X Xu, K Pei, B Choi, S Zhou Proceedings of the 2014 IEEE 30th International Conference on Data …, 2014 | 41 | 2014 |
Can Large Language Models Reason about Program Invariants? K Pei, D Bieber, K Shi, C Sutton, P Yin Fortieth International Conference on Machine Learning (ICML), 2023 | 35 | 2023 |
Traced: Execution-aware pre-training for source code Y Ding, B Steenhoek, K Pei, G Kaiser, W Le, B Ray Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024 | 18 | 2024 |
Language agents as hackers: Evaluating cybersecurity skills with capture the flag J Yang, A Prabhakar, S Yao, K Pei, KR Narasimhan Multi-Agent Security Workshop@ NeurIPS'23, 2023 | 5 | 2023 |
NeuDep: neural binary memory dependence analysis K Pei, D She, M Wang, S Geng, Z Xuan, Y David, J Yang, S Jana, B Ray Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022 | 5 | 2022 |