Metamorphic testing of deep learning compilers D Xiao, Z Liu, Y Yuan, Q Pang, S Wang Proceedings of the ACM on Measurement and Analysis of Computing Systems 6 (1 …, 2022 | 38 | 2022 |
Byzantine-robust federated learning with optimal statistical rates B Zhu, L Wang, Q Pang, S Wang, J Jiao, D Song, MI Jordan International Conference on Artificial Intelligence and Statistics, 3151-3178, 2023 | 31* | 2023 |
{PrivGuard}: Privacy regulation compliance made easier L Wang, U Khan, J Near, Q Pang, J Subramanian, N Somani, P Gao, ... 31st USENIX Security Symposium (USENIX Security 22), 3753-3770, 2022 | 24 | 2022 |
MDPFuzz: Testing Models Solving Markov Decision Processes Q Pang, Y Yuan, S Wang Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2021 | 18* | 2021 |
Automated Side Channel Analysis of Media Software with Manifold Learning Y Yuan, Q Pang, S Wang 31st USENIX Security Symposium (USENIX Security 22), 4419-4436, 2022 | 16 | 2022 |
Unveiling hidden dnn defects with decision-based metamorphic testing Y Yuan, Q Pang, S Wang Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022 | 15 | 2022 |
Revisiting neuron coverage for dnn testing: A layer-wise and distribution-aware criterion Y Yuan, Q Pang, S Wang 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023 | 14 | 2023 |
Towards practical differentially private causal graph discovery L Wang, Q Pang, D Song Advances in Neural Information Processing Systems 33, 5516-5526, 2020 | 14 | 2020 |
ADI: Adversarial Dominating Inputs in Vertical Federated Learning Systems Q Pang, Y Yuan, S Wang, W Zheng arXiv preprint arXiv:2201.02775, 2022 | 12* | 2022 |
{mID}: Tracing screen photos via {Moiré} patterns Y Cheng, X Ji, L Wang, Q Pang, YC Chen, W Xu 30th USENIX Security Symposium (USENIX Security 21), 2969-2986, 2021 | 12 | 2021 |
Secure federated correlation test and entropy estimation Q Pang, L Wang, S Wang, W Zheng, D Song International Conference on Machine Learning, 26990-27010, 2023 | 11* | 2023 |
Noleaks: Differentially private causal discovery under functional causal model P Ma, Z Ji, Q Pang, S Wang IEEE Transactions on Information Forensics and Security 17, 2324-2338, 2022 | 11 | 2022 |
Bolt: Privacy-preserving, accurate and efficient inference for transformers Q Pang, J Zhu, H Möllering, W Zheng, T Schneider 2024 IEEE Symposium on Security and Privacy (SP), 4753-4771, 2024 | 9 | 2024 |
Enhancing deep neural networks testing by traversing data manifold Y Yuan, Q Pang, S Wang arXiv preprint arXiv:2112.01956, 2021 | 8 | 2021 |
Attacking LLM Watermarks by Exploiting Their Strengths Q Pang, S Hu, W Zheng, V Smith arXiv preprint arXiv:2402.16187, 2024 | 3 | 2024 |
MPCDiff: Testing and Repairing MPC-Hardened Deep Learning Models Q Pang, Y Yuan, S Wang NDSS, 2024 | 3 | 2024 |
Provably valid and diverse mutations of real-world media data for dnn testing Y Yuan, Q Pang, S Wang IEEE Transactions on Software Engineering, 2024 | 2 | 2024 |
Metamorphic Testing of Secure Multi-party Computation (MPC) Compilers Y Li, D Xiao, Z Liu, Q Pang, S Wang Proceedings of the ACM on Software Engineering 1 (FSE), 1216-1237, 2024 | | 2024 |
Detecting and Repairing Deviated Outputs of Compressed Models Y Li, Q Pang, D Xiao, Z Liu, S Wang Asian Conference on Machine Learning, 707-722, 2024 | | 2024 |