Learning normality is enough: a software-based mitigation against inaudible voice attacks X Li, X Ji, C Yan, C Li, Y Li, Z Zhang, W Xu 32nd USENIX Security Symposium (USENIX Security 23), 2455-2472, 2023 | 16 | 2023 |
An empirical study on large language models in accuracy and robustness under chinese industrial scenarios Z Li, W Qiu, P Ma, Y Li, Y Li, S He, B Jiang, S Wang, W Gu arXiv preprint arXiv:2402.01723, 2024 | 3 | 2024 |
Metamorphic testing of secure multi-party computation (mpc) compilers Y Li, D Xiao, Z Liu, Q Pang, S Wang Proceedings of the ACM on Software Engineering 1 (FSE), 1216-1237, 2024 | 2 | 2024 |
Detecting and Repairing Deviated Outputs of Compressed Models Y Li, Q Pang, D Xiao, Z Liu, S Wang Asian Conference on Machine Learning, 707-722, 2024 | | 2024 |