Follow
Yuanyuan Yuan
Yuanyuan Yuan
Verified email at inf.ethz.ch - Homepage
Title
Cited by
Cited by
Year
Metamorphic Testing of Deep Learning Compilers
D Xiao, Z LIU, Y Yuan, Q Pang, S Wang
Proceedings of the ACM on Measurement and Analysis of Computing Systems 6 (1 …, 2022
552022
Perception Matters: Detecting Perception Failures of VQA Models Using Metamorphic Testing
Y Yuan, S Wang, M Jiang, TY Chen
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
512021
MDPFuzz: testing models solving Markov decision processes
Q Pang, Y Yuan, S Wang
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
32*2022
Revisiting neuron coverage for dnn testing: A layer-wise and distribution-aware criterion
Y Yuan, Q Pang, S Wang
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
28*2023
Explain any concept: Segment anything meets concept-based explanation
A Sun, P Ma, Y Yuan, S Wang
Advances in Neural Information Processing Systems 36, 2024
262024
Sok: demystifying binary lifters through the lens of downstream applications
Z Liu, Y Yuan, S Wang, Y Bao
2022 IEEE Symposium on Security and Privacy (SP), 1100-1119, 2022
252022
Automated Side Channel Analysis of Media Software with Manifold Learning
Y Yuan, Q Pang, S Wang
31st USENIX Security Symposium (USENIX Security 22), 2022
202022
CC: Causality-Aware Coverage Criterion for Deep Neural Networks
Z Ji, P Ma, Y Yuan, S Wang
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
192023
No privacy left outside: On the (in-) security of tee-shielded dnn partition for on-device ml
Z Zhang, C Gong, Y Cai, Y Yuan, B Liu, D Li, Y Guo, X Chen
2024 IEEE Symposium on Security and Privacy (SP), 3327-3345, 2024
182024
Unveiling hidden dnn defects with decision-based metamorphic testing
Y Yuan, Q Pang, S Wang
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
182022
{CacheQL}: Quantifying and Localizing Cache {Side-Channel} Vulnerabilities in Production Software
Y Yuan, Z Liu, S Wang
32nd USENIX Security Symposium (USENIX Security 23), 2009-2026, 2023
172023
Decompiling x86 deep neural network executables
Z Liu, Y Yuan, S Wang, X Xie, L Ma
32nd USENIX Security Symposium (USENIX Security 23), 7357-7374, 2023
15*2023
Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing
Y Yuan, Q Pang, S Wang
IEEE Transactions on Software Engineering, 2024
14*2024
ADI: Adversarial Dominating Inputs in Vertical Federated Learning Systems
Q Pang, Y Yuan, S Wang, W Zheng
2023 IEEE Symposium on Security and Privacy (SP), 1875-1892, 2023
14*2023
Enhancing DNN-Based Binary Code Function Search With Low-Cost Equivalence Checking
H Wang, P Ma, Y Yuan, Z Liu, S Wang, Q Tang, S Nie, S Wu
IEEE Transactions on Software Engineering 49 (1), 226-250, 2022
142022
MPCDiff: Testing and Repairing MPC-Hardened Deep Learning Models
Q Pang, Y Yuan, S Wang
NDSS, 2024
72024
OBSAN: An Out-Of-Bound Sanitizer to Harden DNN Executables
Y Chen, Y Yuan, S Wang
30th Network and Distributed System Security Symposium, 2023., 0
5*
Eliminating Information Leakage in Hard Concept Bottleneck Models with Supervised, Hierarchical Concept Learning
A Sun, Y Yuan, P Ma, S Wang
arXiv preprint arXiv:2402.05945, 2024
42024
Private Image Reconstruction from System Side Channels Using Generative Models
Y Yuan, S Wang, J Zhang
International Conference on Learning Representations (ICLR 2021), 2020
42020
NeuralD: Detecting Indistinguishability Violations of Oblivious RAM With Neural Distinguishers
P Ma, Z Liu, Y Yuan, S Wang
IEEE Transactions on Information Forensics and Security 17, 982-997, 2022
32022
The system can't perform the operation now. Try again later.
Articles 1–20