ติดตาม
Xiangyu Zhang
Xiangyu Zhang
Samuel Conte Professor of Computer Science, Purdue University
ยืนยันอีเมลแล้วที่ cs.purdue.edu - หน้าแรก
ชื่อ
อ้างโดย
อ้างโดย
ปี
Trojaning attack on neural networks
Y Liu, S Ma, Y Aafer, WC Lee, J Zhai, W Wang, X Zhang
14902017
ABS: Scanning neural networks for back-doors by artificial brain stimulation
Y Liu, WC Lee, G Tao, S Ma, Y Aafer, X Zhang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
5182019
Locating faults through automated predicate switching
X Zhang, N Gupta, R Gupta
Proceedings of the 28th international conference on Software engineering …, 2006
4042006
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Z Lin, X Jiang, D Xu, X Zhang
NDSS 8, 1-15, 2008
3612008
NIC: Detecting Adversarial Samples with Neural Network Invariant Checking
S Ma, Y Liu, G Tao, WC Lee, X Zhang
26th Annual Network and Distributed System Security Symposium, NDSS, 24-27, 2019
3262019
Automatic reverse engineering of data structures from binary execution
Z Lin, X Zhang, D Xu
Proceedings of the 11th Annual Information Security Symposium, 5, 2010
3262010
Precise dynamic slicing algorithms
X Zhang, R Gupta, Y Zhang
Software Engineering, 2003. Proceedings. 25th International Conference on …, 2003
3082003
AsDroid: Detecting stealthy behaviors in android applications by user interface and program behavior contradiction
J Huang, X Zhang, L Tan, P Wang, B Liang
Proceedings of the 36th International Conference on Software Engineering …, 2014
2922014
Z3-str: A z3-based string solver for web application analysis
Y Zheng, X Zhang, V Ganesh
Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013
2752013
ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting
S Ma, X Zhang, D Xu
2632016
High Accuracy Attack Provenance via Binary-based Execution Partition.
KH Lee, X Zhang, D Xu
NDSS, 2013
2632013
Locating faulty code using failure-inducing chops
N Gupta, H He, X Zhang, R Gupta
Proceedings of the 20th IEEE/ACM international Conference on Automated …, 2005
2612005
Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features
J Lin, L Xu, Y Liu, X Zhang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
2492020
MODE: automated neural network model debugging via state differential analysis and input selection
S Ma, Y Liu, WC Lee, X Zhang, A Grama
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
2302018
Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach
H Choi, WC Lee, Y Aafer, F Fei, Z Tu, X Zhang, D Xu, X Xinyan
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2252018
ATLAS: A Sequence-based Learning Approach for Attack Investigation
A Alsaheel, Y Nan, S Ma, L Yu, G Walkup, ZB Celik, X Zhang, D Xu
219*
Pruning dynamic slices with confidence
X Zhang, N Gupta, R Gupta
ACM SIGPLAN Notices 41 (6), 169-180, 2006
2162006
Experimental evaluation of using dynamic slices for fault location
X Zhang, H He, N Gupta, R Gupta
Proceedings of the sixth international symposium on Automated analysis …, 2005
2132005
Hercule: Attack story reconstruction via community discovery on correlated log graph
K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang, L Si, X Zhang, ...
Proceedings of the 32Nd Annual Conference on Computer Security Applications …, 2016
2082016
Loggc: Garbage collecting audit log
KH Lee, X Zhang, D Xu
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2052013
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20