עקוב אחר
Qi Pang
Qi Pang
כתובת אימייל מאומתת בדומיין andrew.cmu.edu - דף הבית
כותרת
צוטט על ידי
צוטט על ידי
שנה
Metamorphic testing of deep learning compilers
D Xiao, Z Liu, Y Yuan, Q Pang, S Wang
Proceedings of the ACM on Measurement and Analysis of Computing Systems 6 (1 …, 2022
542022
Bolt: Privacy-preserving, accurate and efficient inference for transformers
Q Pang, J Zhu, H Möllering, W Zheng, T Schneider
2024 IEEE Symposium on Security and Privacy (SP), 4753-4771, 2024
452024
Byzantine-robust federated learning with optimal statistical rates
B Zhu, L Wang, Q Pang, S Wang, J Jiao, D Song, MI Jordan
International Conference on Artificial Intelligence and Statistics, 3151-3178, 2023
37*2023
MDPFuzz: Testing Models Solving Markov Decision Processes
Q Pang, Y Yuan, S Wang
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2021
34*2021
{PrivGuard}: Privacy regulation compliance made easier
L Wang, U Khan, J Near, Q Pang, J Subramanian, N Somani, P Gao, ...
31st USENIX Security Symposium (USENIX Security 22), 3753-3770, 2022
302022
Revisiting neuron coverage for dnn testing: A layer-wise and distribution-aware criterion
Y Yuan, Q Pang, S Wang
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
262023
Automated Side Channel Analysis of Media Software with Manifold Learning
Y Yuan, Q Pang, S Wang
31st USENIX Security Symposium (USENIX Security 22), 4419-4436, 2022
202022
{mID}: Tracing screen photos via {Moiré} patterns
Y Cheng, X Ji, L Wang, Q Pang, YC Chen, W Xu
30th USENIX Security Symposium (USENIX Security 21), 2969-2986, 2021
192021
Unveiling hidden dnn defects with decision-based metamorphic testing
Y Yuan, Q Pang, S Wang
Proceedings of the 37th IEEE/ACM international conference on automated …, 2022
182022
Towards practical differentially private causal graph discovery
L Wang, Q Pang, D Song
Advances in Neural Information Processing Systems 33, 5516-5526, 2020
172020
Noleaks: Differentially private causal discovery under functional causal model
P Ma, Z Ji, Q Pang, S Wang
IEEE Transactions on Information Forensics and Security 17, 2324-2338, 2022
162022
ADI: Adversarial dominating inputs in vertical federated learning systems
Q Pang, Y Yuan, S Wang, W Zheng
arXiv preprint arXiv:2201.02775, 2022
14*2022
Attacking llm watermarks by exploiting their strengths
Q Pang, S Hu, W Zheng, V Smith
ICLR 2024 Workshop on Secure and Trustworthy Large Language Models, 2024
112024
Secure federated correlation test and entropy estimation
Q Pang, L Wang, S Wang, W Zheng, D Song
International Conference on Machine Learning, 26990-27010, 2023
11*2023
Mpcdiff: Testing and repairing mpc-hardened deep learning models
Q Pang, Y Yuan, S Wang
NDSS, 2024
82024
Enhancing deep neural networks testing by traversing data manifold
Y Yuan, Q Pang, S Wang
CoRR, 2021
82021
No free lunch in llm watermarking: Trade-offs in watermarking design choices
Q Pang, S Hu, W Zheng, V Smith
Advances in Neural Information Processing Systems 37, 138756-138788, 2025
52025
Provably valid and diverse mutations of real-world media data for dnn testing
Y Yuan, Q Pang, S Wang
IEEE Transactions on Software Engineering, 2024
52024
Metamorphic testing of secure multi-party computation (mpc) compilers
Y Li, D Xiao, Z Liu, Q Pang, S Wang
Proceedings of the ACM on Software Engineering 1 (FSE), 1216-1237, 2024
22024
Communication Bounds for the Distributed Experts Problem
Z Jia, Q Pang, T Tran, D Woodruff, Z Zhang, W Zheng
arXiv preprint arXiv:2501.03132, 2025
2025
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20