关注
Qi Pang
Qi Pang
在 andrew.cmu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Metamorphic testing of deep learning compilers
D Xiao, Z Liu, Y Yuan, Q Pang, S Wang
Proceedings of the ACM on Measurement and Analysis of Computing Systems 6 (1 …, 2022
382022
Byzantine-robust federated learning with optimal statistical rates
B Zhu, L Wang, Q Pang, S Wang, J Jiao, D Song, MI Jordan
International Conference on Artificial Intelligence and Statistics, 3151-3178, 2023
31*2023
{PrivGuard}: Privacy regulation compliance made easier
L Wang, U Khan, J Near, Q Pang, J Subramanian, N Somani, P Gao, ...
31st USENIX Security Symposium (USENIX Security 22), 3753-3770, 2022
242022
MDPFuzz: Testing Models Solving Markov Decision Processes
Q Pang, Y Yuan, S Wang
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2021
18*2021
Automated Side Channel Analysis of Media Software with Manifold Learning
Y Yuan, Q Pang, S Wang
31st USENIX Security Symposium (USENIX Security 22), 4419-4436, 2022
162022
Unveiling hidden dnn defects with decision-based metamorphic testing
Y Yuan, Q Pang, S Wang
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
152022
Revisiting neuron coverage for dnn testing: A layer-wise and distribution-aware criterion
Y Yuan, Q Pang, S Wang
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
142023
Towards practical differentially private causal graph discovery
L Wang, Q Pang, D Song
Advances in Neural Information Processing Systems 33, 5516-5526, 2020
142020
ADI: Adversarial Dominating Inputs in Vertical Federated Learning Systems
Q Pang, Y Yuan, S Wang, W Zheng
arXiv preprint arXiv:2201.02775, 2022
12*2022
{mID}: Tracing screen photos via {Moiré} patterns
Y Cheng, X Ji, L Wang, Q Pang, YC Chen, W Xu
30th USENIX Security Symposium (USENIX Security 21), 2969-2986, 2021
122021
Secure federated correlation test and entropy estimation
Q Pang, L Wang, S Wang, W Zheng, D Song
International Conference on Machine Learning, 26990-27010, 2023
11*2023
Noleaks: Differentially private causal discovery under functional causal model
P Ma, Z Ji, Q Pang, S Wang
IEEE Transactions on Information Forensics and Security 17, 2324-2338, 2022
112022
Bolt: Privacy-preserving, accurate and efficient inference for transformers
Q Pang, J Zhu, H Möllering, W Zheng, T Schneider
2024 IEEE Symposium on Security and Privacy (SP), 4753-4771, 2024
92024
Enhancing deep neural networks testing by traversing data manifold
Y Yuan, Q Pang, S Wang
arXiv preprint arXiv:2112.01956, 2021
82021
Attacking LLM Watermarks by Exploiting Their Strengths
Q Pang, S Hu, W Zheng, V Smith
arXiv preprint arXiv:2402.16187, 2024
32024
MPCDiff: Testing and Repairing MPC-Hardened Deep Learning Models
Q Pang, Y Yuan, S Wang
NDSS, 2024
32024
Provably valid and diverse mutations of real-world media data for dnn testing
Y Yuan, Q Pang, S Wang
IEEE Transactions on Software Engineering, 2024
22024
Metamorphic Testing of Secure Multi-party Computation (MPC) Compilers
Y Li, D Xiao, Z Liu, Q Pang, S Wang
Proceedings of the ACM on Software Engineering 1 (FSE), 1216-1237, 2024
2024
Detecting and Repairing Deviated Outputs of Compressed Models
Y Li, Q Pang, D Xiao, Z Liu, S Wang
Asian Conference on Machine Learning, 707-722, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–19