


default search action
Xiangyu Zhang 0001
Person information
- affiliation: Purdue University, West Lafayette, IN, USA
- affiliation (PhD 2006): University of Arizona, Department of Computer Science, Tucson, AZ, USA
Other persons with the same name
- Xiangyu Zhang — disambiguation page
- Xiangyu Zhang 0002
— ShanghaiTech University, School of Information Science and Technology, China (and 1 more)
- Xiangyu Zhang 0003
— Shenyang Pharmaceutical University, MoE Key Laboratory of Structure-Based Drug Design and Discovery, China
- Xiangyu Zhang 0004
— Tsinghua University, Department of Electrical Engineering, Beijing, China
- Xiangyu Zhang 0005
— Megvii Inc., Beijing, China (and 2 more)
- Xiangyu Zhang 0007
— Navy Aeronautical University, Yantai, China
- Xiangyu Zhang 0008
— Southeast University, School of Instrument Science and Engineering, Nanjing, China
- Xiangyu Zhang 0009 — Northwestern Polytechnical University, China
- Xiangyu Zhang 0010
— U. S. National Renewable Energy Laboratory, Computational Science Center, CO, USA (and 2 more)
- Xiangyu Zhang 0011
— Duke University, Department of Electrical and Computer Engineering, Durham, NC, USA
- Xiangyu Zhang 0012 — Cornell University, Department of Operations Research and Information Engineering, Ithaca, NY, USA
- Xiangyu Zhang 0013
— Southeast University, Frontiers Science Center for Mobile Information Communication and Security, School of Information Science and Engineering, Nanjing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j39]Rongxin Wu, Zhiling Huang, Zige Tian, Chengpeng Wang, Xiangyu Zhang:
PackHunter: Recovering Missing Packages for C/C++ Projects. IEEE Trans. Software Eng. 51(1): 206-219 (2025) - 2024
- [j38]Mingwei Zheng
, Qingkai Shi, Xuwei Liu
, Xiangzhe Xu
, Le Yu, Congyu Liu, Guannan Wei
, Xiangyu Zhang:
ParDiff: Practical Static Differential Analysis of Network Protocol Parsers. Proc. ACM Program. Lang. 8(OOPSLA1): 1208-1234 (2024) - [j37]Zian Su
, Xiangzhe Xu
, Ziyang Huang
, Zhuo Zhang
, Yapeng Ye
, Jianjun Huang
, Xiangyu Zhang
:
CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking. Proc. ACM Softw. Eng. 1(FSE): 562-585 (2024) - [j36]Zhiyuan Cheng
, Cheng Han
, James Liang
, Qifan Wang
, Xiangyu Zhang
, Dongfang Liu
:
Self-Supervised Adversarial Training of Monocular Depth Estimation Against Physical-World Attacks. IEEE Trans. Pattern Anal. Mach. Intell. 46(12): 9084-9101 (2024) - [j35]Xinmeng Xia
, Yang Feng
, Qingkai Shi
, James A. Jones
, Xiangyu Zhang
, Baowen Xu
:
Enumerating Valid Non-Alpha-Equivalent Programs for Interpreter Testing. ACM Trans. Softw. Eng. Methodol. 33(5): 118:1-118:31 (2024) - [j34]Hepeng Dai
, Chang-Ai Sun
, Huai Liu
, Xiangyu Zhang
:
DFuzzer: Diversity-Driven Seed Queue Construction of Fuzzing for Deep Learning Models. IEEE Trans. Reliab. 73(2): 1075-1089 (2024) - [j33]Yi Sun
, Chengpeng Wang
, Gang Fan
, Qingkai Shi
, Xiangyu Zhang
:
Fast and Precise Static Null Exception Analysis With Synergistic Preprocessing. IEEE Trans. Software Eng. 50(11): 3022-3036 (2024) - [c237]Shengwei An, Sheng-Yen Chou
, Kaiyuan Zhang, Qiuling Xu, Guanhong Tao, Guangyu Shen, Siyuan Cheng, Shiqing Ma, Pin-Yu Chen, Tsung-Yi Ho, Xiangyu Zhang:
Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift. AAAI 2024: 10847-10855 - [c236]Danning Xie
, Zhuo Zhang
, Nan Jiang
, Xiangzhe Xu
, Lin Tan
, Xiangyu Zhang
:
ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries. CCS 2024: 4554-4568 - [c235]Siyuan Cheng, Guanhong Tao, Yingqi Liu, Guangyu Shen, Shengwei An, Shiwei Feng, Xiangzhe Xu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang:
Lotus: Evasive and Resilient Backdoor Attacks through Sub-Partitioning. CVPR 2024: 24798-24809 - [c234]Chanwoo Bae, Guanhong Tao, Zhuo Zhang, Xiangyu Zhang:
Threat Behavior Textual Search by Attention Graph Isomorphism. EACL (1) 2024: 2616-2630 - [c233]Siyuan Cheng, Guangyu Shen, Kaiyuan Zhang, Guanhong Tao, Shengwei An, Hanxi Guo, Shiqing Ma, Xiangyu Zhang:
UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening. ECCV (62) 2024: 262-281 - [c232]Chengpeng Wang, Wuqi Zhang, Zian Su, Xiangzhe Xu, Xiangyu Zhang:
Sanitizing Large Language Models in Bug Detection with Data-Flow. EMNLP (Findings) 2024: 3790-3805 - [c231]Zhiyuan Cheng, Hongjun Choi, Shiwei Feng, James Chenhao Liang, Guanhong Tao, Dongfang Liu, Michael Zuzak, Xiangyu Zhang:
Fusion Is Not Enough: Single Modal Attacks on Fusion Models for 3D Object Detection. ICLR 2024 - [c230]Zhiyuan Cheng, Zhaoyi Liu, Tengda Guo, Shiwei Feng, Dongfang Liu, Mingjie Tang, Xiangyu Zhang:
BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks. ICML 2024 - [c229]Xuwei Liu
, Wei You
, Yapeng Ye
, Zhuo Zhang
, Jianjun Huang
, Xiangyu Zhang
:
FuzzInMem: Fuzzing Programs via In-memory Structures. ICSE 2024: 131:1-131:13 - [c228]Dongnan He
, Dongchen Xie
, Yujie Wang
, Wei You
, Bin Liang
, Jianjun Huang
, Wenchang Shi
, Zhuo Zhang
, Xiangyu Zhang
:
Define-Use Guided Path Exploration for Better Forced Execution. ISSTA 2024: 287-299 - [c227]Shiwei Feng, Yapeng Ye, Qingkai Shi, Zhiyuan Cheng, Xiangzhe Xu, Siyuan Cheng, Hongjun Choi, Xiangyu Zhang:
ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation. ASE 2024: 1620-1632 - [c226]Xuan Chen, Yuzhou Nie, Wenbo Guo, Xiangyu Zhang:
When LLM Meets DRL: Advancing Jailbreaking Efficiency via DRL-guided Search. NeurIPS 2024 - [c225]Hanxi Guo, Siyuan Cheng, Xiaolong Jin, Zhuo Zhang, Kaiyuan Zhang, Guanhong Tao, Guangyu Shen, Xiangyu Zhang:
BiScope: AI-generated Text Detection by Checking Memorization of Preceding Tokens. NeurIPS 2024 - [c224]Zian Su, Xiangzhe Xu, Ziyang Huang, Kaiyuan Zhang, Xiangyu Zhang:
Source Code Foundation Models are Transferable Binary Analysis Knowledge Bases. NeurIPS 2024 - [c223]Chengpeng Wang, Wuqi Zhang, Zian Su, Xiangzhe Xu, Xiaoheng Xie, Xiangyu Zhang:
LLMDFA: Analyzing Dataflow in Code with Large Language Models. NeurIPS 2024 - [c222]Timothy Fraser, Xuwei Liu, Qingkai Shi, Xiangyu Zhang, Mark Wutka, Daniel Balasubramanian, Hao Chen, Zhong Shao:
A NAND Use Case for Cybersecurity Experiments. SecDev 2024: 178-179 - [c221]Zhuo Zhang, Guangyu Shen, Guanhong Tao, Siyuan Cheng, Xiangyu Zhang:
On Large Language Models' Resilience to Coercive Interrogation. SP 2024: 826-844 - [c220]Siyuan Cheng, Guangyu Shen, Guanhong Tao, Kaiyuan Zhang, Zhuo Zhang, Shengwei An, Xiangzhe Xu, Yingqi Li, Shiqing Ma, Xiangyu Zhang:
OdScan: Backdoor Scanning for Object Detection Models. SP 2024: 1703-1721 - [c219]Guanhong Tao, Zhenting Wang, Shiwei Feng, Guangyu Shen, Shiqing Ma, Xiangyu Zhang:
Distribution Preserving Backdoor Attack in Self-supervised Learning. SP 2024: 2029-2047 - [c218]Kaiyuan Zhang, Siyuan Cheng, Guangyu Shen, Guanhong Tao, Shengwei An, Anuran Makur, Shiqing Ma, Xiangyu Zhang:
Exploring the Orthogonality and Linearity of Backdoor Attacks. SP 2024: 2105-2123 - [c217]Wuqi Zhang, Zhuo Zhang, Qingkai Shi, Lu Liu, Lili Wei, Yepang Liu, Xiangyu Zhang, Shing-Chi Cheung:
Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts. SP 2024: 2198-2216 - [c216]Shengwei An, Lu Yan, Siyuan Cheng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Guanhong Tao, Xiangyu Zhang:
Rethinking the Invisible Protection against Unauthorized Image Usage in Stable Diffusion. USENIX Security Symposium 2024 - [c215]Le Yu, Yapeng Ye, Zhuo Zhang, Xiangyu Zhang:
Cost-effective Attack Forensics by Recording and Correlating File System Changes. USENIX Security Symposium 2024 - [c214]Xiangyu Zhang
:
Runtime Invariant Checking in Robotic Systems and Deep Learning Models (Keynote). VORTEX@ISSTA 2024: 2 - [i57]Guanhong Tao, Siyuan Cheng, Zhuo Zhang, Junmin Zhu, Guangyu Shen, Xiangyu Zhang:
Opening A Pandora's Box: Things You Should Know in the Era of Custom GPTs. CoRR abs/2401.00905 (2024) - [i56]Guangyu Shen, Siyuan Cheng, Kaiyuan Zhang, Guanhong Tao, Shengwei An, Lu Yan, Zhuo Zhang, Shiqing Ma, Xiangyu Zhang:
Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation and Echopraxia. CoRR abs/2402.05467 (2024) - [i55]Chengpeng Wang, Wuqi Zhang, Zian Su, Xiangzhe Xu, Xiaoheng Xie, Xiangyu Zhang:
When Dataflow Analysis Meets Large Language Models. CoRR abs/2402.10754 (2024) - [i54]Zian Su, Xiangzhe Xu, Ziyang Huang, Zhuo Zhang, Yapeng Ye, Jianjun Huang, Xiangyu Zhang:
CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking. CoRR abs/2402.11842 (2024) - [i53]Siyuan Cheng, Guanhong Tao, Yingqi Liu, Guangyu Shen, Shengwei An, Shiwei Feng, Xiangzhe Xu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang:
LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning. CoRR abs/2403.17188 (2024) - [i52]Zhiyuan Cheng, Zhaoyi Liu, Tengda Guo, Shiwei Feng, Dongfang Liu, Mingjie Tang, Xiangyu Zhang:
BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks. CoRR abs/2404.00924 (2024) - [i51]Chanwoo Bae, Guanhong Tao, Zhuo Zhang, Xiangyu Zhang:
Threat Behavior Textual Search by Attention Graph Isomorphism. CoRR abs/2404.10944 (2024) - [i50]Zian Su, Xiangzhe Xu, Ziyang Huang, Kaiyuan Zhang, Xiangyu Zhang:
Source Code Foundation Models are Transferable Binary Analysis Knowledge Bases. CoRR abs/2405.19581 (2024) - [i49]Tingxu Han, Weisong Sun, Ziqi Ding, Chunrong Fang, Hanwei Qian, Jiaxun Li, Zhenyu Chen, Xiangyu Zhang:
Mutual Information Guided Backdoor Mitigation for Pre-trained Encoders. CoRR abs/2406.03508 (2024) - [i48]Zhiyuan Cheng, Cheng Han
, James Liang, Qifan Wang, Xiangyu Zhang, Dongfang Liu:
Self-supervised Adversarial Training of Monocular Depth Estimation against Physical-World Attacks. CoRR abs/2406.05857 (2024) - [i47]Xuan Chen, Yuzhou Nie, Wenbo Guo, Xiangyu Zhang:
When LLM Meets DRL: Advancing Jailbreaking Efficiency via DRL-guided Search. CoRR abs/2406.08705 (2024) - [i46]Xuan Chen, Yuzhou Nie, Lu Yan, Yunshu Mao, Wenbo Guo, Xiangyu Zhang:
RL-JACK: Reinforcement Learning-powered Black-box Jailbreaking Attack against LLMs. CoRR abs/2406.08725 (2024) - [i45]Siyuan Cheng, Guangyu Shen, Kaiyuan Zhang, Guanhong Tao, Shengwei An, Hanxi Guo, Shiqing Ma, Xiangyu Zhang:
UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening. CoRR abs/2407.11372 (2024) - [i44]Hanxi Guo, Hao Wang, Tao Song, Tianhang Zheng, Yang Hua, Haibing Guan, Xiangyu Zhang:
Poisoning with A Pill: Circumventing Detection in Federated Learning. CoRR abs/2407.15389 (2024) - [i43]Shiwei Feng, Yapeng Ye, Qingkai Shi, Zhiyuan Cheng, Xiangzhe Xu, Siyuan Cheng, Hongjun Choi, Xiangyu Zhang:
ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation. CoRR abs/2409.07774 (2024) - [i42]Shiwei Feng, Xuan Chen, Zhiyuan Cheng, Zikang Xiong, Yifei Gao, Siyuan Cheng, Sayali Kate, Xiangyu Zhang:
DIGIMON: Diagnosis and Mitigation of Sampling Skew for Reinforcement Learning based Meta-Planner in Robot Navigation. CoRR abs/2409.10832 (2024) - [i41]Lu Yan, Siyuan Cheng, Xuan Chen, Kaiyuan Zhang, Guangyu Shen, Zhuo Zhang, Xiangyu Zhang:
ASPIRER: Bypassing System Prompts With Permutation-based Backdoors in LLMs. CoRR abs/2410.04009 (2024) - [i40]Xiangzhe Xu, Zian Su, Jinyao Guo, Kaiyuan Zhang, Zhenting Wang, Xiangyu Zhang:
ProSec: Fortifying Code LLMs with Proactive Security Alignment. CoRR abs/2411.12882 (2024) - [i39]Chengpeng Wang, Yifei Gao, Wuqi Zhang, Xuwei Liu, Qingkai Shi, Xiangyu Zhang:
LLMSA: A Compositional Neuro-Symbolic Approach to Compilation-free and Customizable Static Analysis. CoRR abs/2412.14399 (2024) - 2023
- [j32]Mohannad Alhanahnah
, Shiqing Ma, Ashish Gehani, Gabriela F. Ciocarlie, Vinod Yegneswaran, Somesh Jha, Xiangyu Zhang:
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning. IEEE Trans. Software Eng. 49(4): 2761-2775 (2023) - [c213]Weisong Sun, Yuchen Chen, Guanhong Tao, Chunrong Fang, Xiangyu Zhang, Quanjun Zhang, Bin Luo:
Backdooring Neural Code Search. ACL (1) 2023: 9692-9708 - [c212]Qingkai Shi
, Junyang Shao
, Yapeng Ye
, Mingwei Zheng
, Xiangyu Zhang
:
Lifting Network Protocol Implementation to Precise Format Specification with Security Applications. CCS 2023: 1287-1301 - [c211]Shiwei Feng, Guanhong Tao, Siyuan Cheng, Guangyu Shen, Xiangzhe Xu, Yingqi Liu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang:
Detecting Backdoors in Pre-trained Encoders. CVPR 2023: 16352-16362 - [c210]Qiuling Xu, Guanhong Tao, Jean Honorio
, Yingqi Liu, Shengwei An, Guangyu Shen, Siyuan Cheng, Xiangyu Zhang:
MEDIC: Remove Model Backdoors via Importance Driven Cloning. CVPR 2023: 20485-20494 - [c209]Kaiyuan Zhang, Guanhong Tao, Qiuling Xu, Siyuan Cheng, Shengwei An, Yingqi Liu, Shiwei Feng, Guangyu Shen, Pin-Yu Chen, Shiqing Ma, Xiangyu Zhang:
FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning. ICLR 2023 - [c208]Zhiyuan Cheng, James Liang, Guanhong Tao, Dongfang Liu, Xiangyu Zhang:
Adversarial Training of Self-supervised Monocular Depth Estimation against Physical-World Attacks. ICLR 2023 - [c207]I Luk Kim, Weihang Wang, Yonghwi Kwon, Xiangyu Zhang:
BFTDETECTOR: Automatic Detection of Business Flow Tampering for Digital Content Service. ICSE 2023: 448-459 - [c206]Nan Jiang, Thibaud Lutellier, Yiling Lou, Lin Tan, Dan Goldwasser, Xiangyu Zhang:
KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair. ICSE 2023: 1251-1263 - [c205]Xiangzhe Xu, Shiwei Feng, Yapeng Ye, Guangyu Shen, Zian Su, Siyuan Cheng, Guanhong Tao, Qingkai Shi, Zhuo Zhang, Xiangyu Zhang:
Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis. ISSTA 2023: 1106-1118 - [c204]Jingyao Zhou, Lei Xu, Gongzheng Lu, Weifeng Zhang, Xiangyu Zhang:
NodeRT: Detecting Races in Node.js Applications Practically. ISSTA 2023: 1332-1344 - [c203]Zhao Tian, Junjie Chen, Xiangyu Zhang:
On-the-fly Improving Performance of Deep Code Models via Input Denoising. ASE 2023: 560-572 - [c202]Siyuan Cheng, Guanhong Tao, Yingqi Liu, Shengwei An, Xiangzhe Xu, Shiwei Feng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Shiqing Ma, Xiangyu Zhang:
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense. NDSS 2023 - [c201]Xuan Chen, Wenbo Guo, Guanhong Tao, Xiangyu Zhang, Dawn Song:
BIRD: Generalizable Backdoor Detection and Removal for Deep Reinforcement Learning. NeurIPS 2023 - [c200]Guangyu Shen, Siyuan Cheng, Guanhong Tao, Kaiyuan Zhang, Yingqi Liu, Shengwei An, Shiqing Ma, Xiangyu Zhang:
Django: Detecting Trojans in Object Detection Models via Gaussian Focus Calibration. NeurIPS 2023 - [c199]Lu Yan, Zhuo Zhang, Guanhong Tao, Kaiyuan Zhang, Xuan Chen, Guangyu Shen, Xiangyu Zhang:
ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP. NeurIPS 2023 - [c198]Xiangzhe Xu
, Zhou Xuan
, Shiwei Feng
, Siyuan Cheng
, Yapeng Ye
, Qingkai Shi
, Guanhong Tao
, Le Yu
, Zhuo Zhang
, Xiangyu Zhang
:
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model. ESEC/SIGSOFT FSE 2023: 401-412 - [c197]Shengwei An, Yuan Yao, Qiuling Xu, Shiqing Ma, Guanhong Tao, Siyuan Cheng, Kaiyuan Zhang, Yingqi Liu, Guangyu Shen, Ian Kelk, Xiangyu Zhang:
ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes. SP 2023: 899-916 - [c196]Yapeng Ye, Zhuo Zhang, Qingkai Shi, Yousra Aafer, Xiangyu Zhang:
D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling. SP 2023: 2391-2408 - [c195]Guanhong Tao, Shengwei An, Siyuan Cheng, Guangyu Shen, Xiangyu Zhang:
Hard-label Black-box Universal Adversarial Patch Attack. USENIX Security Symposium 2023: 697-714 - [c194]Zhuo Zhang, Zhiqiang Lin, Marcelo Morales, Xiangyu Zhang, Kaiyuan Zhang:
Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract. USENIX Security Symposium 2023: 1757-1774 - [c193]Zhuo Zhang, Guanhong Tao, Guangyu Shen, Shengwei An, Qiuling Xu, Yingqi Liu, Yapeng Ye, Yaoxuan Wu, Xiangyu Zhang:
PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis. USENIX Security Symposium 2023: 2365-2382 - [c192]Qingkai Shi, Xiangzhe Xu, Xiangyu Zhang:
Extracting Protocol Format as State Machine via Controlled Static Loop Analysis. USENIX Security Symposium 2023: 7019-7036 - [i38]Siyuan Cheng, Guanhong Tao, Yingqi Liu, Shengwei An, Xiangzhe Xu, Shiwei Feng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Shiqing Ma, Xiangyu Zhang:
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense. CoRR abs/2301.06241 (2023) - [i37]Zhiyuan Cheng, James Liang, Guanhong Tao, Dongfang Liu
, Xiangyu Zhang:
Adversarial Training of Self-supervised Monocular Depth Estimation against Physical-World Attacks. CoRR abs/2301.13487 (2023) - [i36]Nan Jiang, Thibaud Lutellier
, Yiling Lou, Lin Tan, Dan Goldwasser, Xiangyu Zhang:
KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair. CoRR abs/2302.01857 (2023) - [i35]Shiwei Feng, Guanhong Tao, Siyuan Cheng, Guangyu Shen, Xiangzhe Xu, Yingqi Liu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang:
Detecting Backdoors in Pre-trained Encoders. CoRR abs/2303.15180 (2023) - [i34]Zhiyuan Cheng, Hongjun Choi, James Liang, Shiwei Feng, Guanhong Tao, Dongfang Liu, Michael Zuzak, Xiangyu Zhang:
Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving. CoRR abs/2304.14614 (2023) - [i33]Qingkai Shi, Junyang Shao, Yapeng Ye, Mingwei Zheng, Xiangyu Zhang:
Lifting Network Protocol Implementation to Precise Format Specification with Security Applications. CoRR abs/2305.11781 (2023) - [i32]Qingkai Shi, Xiangzhe Xu, Xiangyu Zhang:
Extracting Protocol Format as State Machine via Controlled Static Loop Analysis. CoRR abs/2305.13483 (2023) - [i31]Weisong Sun, Yuchen Chen, Guanhong Tao, Chunrong Fang, Xiangyu Zhang, Quanjun Zhang, Bin Luo:
Backdooring Neural Code Search. CoRR abs/2305.17506 (2023) - [i30]Xiangzhe Xu, Zhuo Zhang, Shiwei Feng, Yapeng Ye, Zian Su, Nan Jiang, Siyuan Cheng, Lin Tan, Xiangyu Zhang:
LmPa: Improving Decompilation by Synergy of Large Language Model and Program Analysis. CoRR abs/2306.02546 (2023) - [i29]Danning Xie, Byungwoo Yoo, Nan Jiang, Mijung Kim, Lin Tan, Xiangyu Zhang, Judy S. Lee:
Impact of Large Language Models on Generating Software Specifications. CoRR abs/2306.03324 (2023) - [i28]Lu Yan, Zhuo Zhang, Guanhong Tao, Kaiyuan Zhang, Xuan Chen, Guangyu Shen, Xiangyu Zhang:
ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP. CoRR abs/2308.02122 (2023) - [i27]Qiuling Xu, Pannaga Shivaswamy, Xiangyu Zhang:
POSIT: Promotion of Semantic Item Tail via Adversarial Learning. CoRR abs/2308.03366 (2023) - [i26]Zhao Tian, Junjie Chen, Xiangyu Zhang:
On-the-fly Improving Performance of Deep Code Models via Input Denoising. CoRR abs/2308.09969 (2023) - [i25]Xiangzhe Xu, Zhou Xuan, Shiwei Feng, Siyuan Cheng, Yapeng Ye, Qingkai Shi, Guanhong Tao, Le Yu, Zhuo Zhang, Xiangyu Zhang:
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model. CoRR abs/2308.15449 (2023) - [i24]Nan Jiang, Chengxiao Wang, Kevin Liu, Xiangzhe Xu, Lin Tan, Xiangyu Zhang:
Nova+: Generative Language Models for Binaries. CoRR abs/2311.13721 (2023) - [i23]Shengwei An, Sheng-Yen Chou
, Kaiyuan Zhang, Qiuling Xu, Guanhong Tao, Guangyu Shen, Siyuan Cheng, Shiqing Ma, Pin-Yu Chen, Tsung-Yi Ho, Xiangyu Zhang:
Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift. CoRR abs/2312.00050 (2023) - [i22]Zhuo Zhang, Guangyu Shen, Guanhong Tao, Siyuan Cheng, Xiangyu Zhang:
Make Them Spill the Beans! Coercive Knowledge Extraction from (Production) LLMs. CoRR abs/2312.04782 (2023) - 2022
- [j31]Qiang Zhang
, Lei Xu, Xiangyu Zhang, Baowen Xu:
Quantifying the interpretation overhead of Python. Sci. Comput. Program. 215: 102759 (2022) - [j30]Liqi Yan
, Siqi Ma, Qifan Wang
, Yingjie Victor Chen, Xiangyu Zhang, Andreas E. Savakis
, Dongfang Liu:
Video Captioning Using Global-Local Representation. IEEE Trans. Circuits Syst. Video Technol. 32(10): 6642-6656 (2022) - [j29]Derui Wang
, Chaoran Li
, Sheng Wen
, Qing-Long Han
, Surya Nepal
, Xiangyu Zhang, Yang Xiang
:
Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples. IEEE Trans. Cybern. 52(8): 7427-7440 (2022) - [c191]Xiangzhe Xu, Hongyu Liu, Guanhong Tao, Zhou Xuan, Xiangyu Zhang:
Checkpointing and deterministic training for deep learning. CAIN 2022: 65-76 - [c190]Muslum Ozgur Ozmen, Xuansong Li
, Andrew Chu, Z. Berkay Celik, Bardh Hoxha, Xiangyu Zhang:
Discovering IoT Physical Channel Vulnerabilities. CCS 2022: 2415-2428 - [c189]Guanhong Tao, Guangyu Shen, Yingqi Liu, Shengwei An, Qiuling Xu, Shiqing Ma, Pan Li, Xiangyu Zhang:
Better Trigger Inversion Optimization in Backdoor Scanning. CVPR 2022: 13358-13368 - [c188]Yingqi Liu, Guangyu Shen, Guanhong Tao, Zhenting Wang, Shiqing Ma, Xiangyu Zhang:
Complex Backdoor Detection by Symmetric Feature Differencing. CVPR 2022: 14983-14993 - [c187]Qiuling Xu, Guanhong Tao, Xiangyu Zhang:
Bounded Adversarial Attack on Deep Content Features. CVPR 2022: 15182-15191 - [c186]Zhiyuan Cheng, James Liang, Hongjun Choi, Guanhong Tao, Zhiwen Cao, Dongfang Liu, Xiangyu Zhang:
Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches. ECCV (38) 2022: 514-532 - [c185]Guangyu Shen, Yingqi Liu, Guanhong Tao, Qiuling Xu, Zhuo Zhang, Shengwei An, Shiqing Ma, Xiangyu Zhang:
Constrained Optimization with Dynamic Bound-scaling for Effective NLP Backdoor Defense. ICML 2022: 19879-19892 - [c184]Liqi Yan
, Qifan Wang, Yiming Cui, Fuli Feng, Xiaojun Quan, Xiangyu Zhang, Dongfang Liu:
GL-RG: Global-Local Representation Granularity for Video Captioning. IJCAI 2022: 2769-2775 - [c183]Danning Xie, Yitong Li, Mijung Kim, Hung Viet Pham, Lin Tan, Xiangyu Zhang, Michael W. Godfrey:
DocTer: documentation-guided fuzzing for testing deep learning API functions. ISSTA 2022: 176-188 - [c182]Xuwei Liu, Wei You, Zhuo Zhang
, Xiangyu Zhang:
TensileFuzz: facilitating seed input generation in fuzzing via string constraint solving. ISSTA 2022: 391-403 - [c181]Max Taylor, Johnathon Aurand, Feng Qin, Xiaorui Wang, Brandon Henry, Xiangyu Zhang:
SA4U: Practical Static Analysis for Unit Type Error Detection. ASE 2022: 87:1-87:11 - [c180]Hongjun Choi, Zhiyuan Cheng, Xiangyu Zhang:
RVPLAYER: Robotic Vehicle Forensics by Replay with What-if Reasoning. NDSS 2022 - [c179]Guanhong Tao, Qiuling Xu, Yingqi Liu, Guangyu Shen, Shengwei An, Jingwei Xu, Xiangyu Zhang, Yuan Yao:
MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity. NDSS 2022 - [c178]Guanhong Tao, Weisong Sun, Tingxu Han, Chunrong Fang, Xiangyu Zhang:
RULER: discriminative and iterative adversarial training for deep neural network fairness. ESEC/SIGSOFT FSE 2022: 1173-1184 - [c177]Guanhong Tao, Yingqi Liu, Guangyu Shen, Qiuling Xu, Shengwei An, Zhuo Zhang, Xiangyu Zhang:
Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security. SP 2022: 1372-1389 - [c176]Yingqi Liu, Guangyu Shen, Guanhong Tao, Shengwei An, Shiqing Ma, Xiangyu Zhang:
Piccolo: Exposing Complex Backdoors in NLP Transformer Models. SP 2022: 2025-2042 - [c175]Fei Wang, Jianliang Wu, Yuhong Nan, Yousra Aafer, Xiangyu Zhang, Dongyan Xu, Mathias Payer:
ProFactory: Improving IoT Security via Formalized Protocol Customization. USENIX Security Symposium 2022: 3879-3896 - [i21]