Seguir
Qi Pang
Qi Pang
Dirección de correo verificada de andrew.cmu.edu - Página principal
Título
Citado por
Citado por
Año
Metamorphic testing of deep learning compilers
D Xiao, Z Liu, Y Yuan, Q Pang, S Wang
Proceedings of the ACM on Measurement and Analysis of Computing Systems 6 (1 …, 2022
552022
Bolt: Privacy-preserving, accurate and efficient inference for transformers
Q Pang, J Zhu, H Möllering, W Zheng, T Schneider
2024 IEEE Symposium on Security and Privacy (SP), 4753-4771, 2024
392024
Byzantine-robust federated learning with optimal statistical rates
B Zhu, L Wang, Q Pang, S Wang, J Jiao, D Song, MI Jordan
International Conference on Artificial Intelligence and Statistics, 3151-3178, 2023
37*2023
MDPFuzz: Testing Models Solving Markov Decision Processes
Q Pang, Y Yuan, S Wang
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2021
33*2021
{PrivGuard}: Privacy regulation compliance made easier
L Wang, U Khan, J Near, Q Pang, J Subramanian, N Somani, P Gao, ...
31st USENIX Security Symposium (USENIX Security 22), 3753-3770, 2022
302022
Revisiting neuron coverage for dnn testing: A layer-wise and distribution-aware criterion
Y Yuan, Q Pang, S Wang
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
252023
Automated Side Channel Analysis of Media Software with Manifold Learning
Y Yuan, Q Pang, S Wang
31st USENIX Security Symposium (USENIX Security 22), 4419-4436, 2022
202022
Unveiling hidden dnn defects with decision-based metamorphic testing
Y Yuan, Q Pang, S Wang
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
182022
Towards practical differentially private causal graph discovery
L Wang, Q Pang, D Song
Advances in Neural Information Processing Systems 33, 5516-5526, 2020
172020
Noleaks: Differentially private causal discovery under functional causal model
P Ma, Z Ji, Q Pang, S Wang
IEEE Transactions on Information Forensics and Security 17, 2324-2338, 2022
162022
{mID}: Tracing screen photos via {Moiré} patterns
Y Cheng, X Ji, L Wang, Q Pang, YC Chen, W Xu
30th USENIX Security Symposium (USENIX Security 21), 2969-2986, 2021
152021
ADI: Adversarial Dominating Inputs in Vertical Federated Learning Systems
Q Pang, Y Yuan, S Wang, W Zheng
arXiv preprint arXiv:2201.02775, 2022
14*2022
Attacking llm watermarks by exploiting their strengths
Q Pang, S Hu, W Zheng, V Smith
ICLR 2024 Workshop on Secure and Trustworthy Large Language Models, 2024
112024
Secure federated correlation test and entropy estimation
Q Pang, L Wang, S Wang, W Zheng, D Song
International Conference on Machine Learning, 26990-27010, 2023
11*2023
MPCDiff: Testing and Repairing MPC-Hardened Deep Learning Models
Q Pang, Y Yuan, S Wang
NDSS, 2024
82024
Enhancing deep neural networks testing by traversing data manifold
Y Yuan, Q Pang, S Wang
CoRR, 2021
82021
Provably valid and diverse mutations of real-world media data for dnn testing
Y Yuan, Q Pang, S Wang
IEEE Transactions on Software Engineering, 2024
52024
No free lunch in llm watermarking: Trade-offs in watermarking design choices
Q Pang, S Hu, W Zheng, V Smith
The Thirty-eighth Annual Conference on Neural Information Processing Systems, 2024
32024
Metamorphic testing of secure multi-party computation (mpc) compilers
Y Li, D Xiao, Z Liu, Q Pang, S Wang
Proceedings of the ACM on Software Engineering 1 (FSE), 1216-1237, 2024
22024
Communication Bounds for the Distributed Experts Problem
Z Jia, Q Pang, T Tran, D Woodruff, Z Zhang, W Zheng
arXiv preprint arXiv:2501.03132, 2025
2025
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20