Name
Papers
Collaborators
XIANGYU ZHANG
209
404
Citations 
PageRank 
Referers 
2857
151.00
6779
Referees 
References 
4695
3285
Search Limit
1001000
Title
Citations
PageRank
Year
Piccolo: Exposing Complex Backdoors in NLP Transformer Models00.342022
Turn tree into graph: Automatic code review via simplified AST driven graph convolutional network00.342022
Deep Learning-Based Signal Quality Assessment for Wearable ECGs00.342022
Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches.00.342022
Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security00.342022
Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples10.372022
Quantifying the interpretation overhead of Python10.372022
PyART: Python API recommendation in real-time00.342021
Deep Feature Space Trojan Attack Of Neural Networks By Controlled Detoxification00.342021
Exposing numerical bugs in deep learning via gradient back-propagation30.382021
ATLAS: A Sequence-based Learning Approach for Attack Investigation00.342021
Activate or Not: Learning Customized Activation00.342021
PHYSFRAME: type checking physical frames of reference for robotic systems00.342021
Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing00.342021
WATCHER: in-situ failure diagnosis00.342020
Uiscope: Accurate, Instrumentation-Free, And Visible Attack Investigation For Gui Applications10.342020
Finding client-side business flow tampering vulnerabilities10.342020
TaintMan: an ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices20.632020
C2S: translating natural language comments to formal program specifications40.402020
ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation110.612019
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation00.342019
ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery30.382019
NIC - Detecting Adversarial Samples with Neural Network Invariant Checking.30.382019
AdBudgetKiller: Online Advertising Budget Draining Attack.00.342018
Gemini: Guest-transparent honey files via hypervisor-level access redirection.00.342018
Redundancy-Free UAV Sensor Fault Isolation And Recovery.00.342018
Securing Real-Time Microcontroller Systems through Customized Memory View Switching.10.352018
A Lightweight Program Dependence Based Approach to Concurrent Mutation Analysis00.342018
MODE: automated neural network model debugging via state differential analysis and input selection.221.012018
How do developers fix cross-project correlated bugs?: a case study on the GitHub scientific python ecosystem.110.532017
Accelerating array constraints in symbolic execution.80.472017
Analysis of SEAndroid Policies: Combining MAC and DAC in Android.20.412017
J-Force: Forced Execution on JavaScript.120.582017
Software Numerical Instability Detection and Diagnosis by Combining Stochastic and Infinite-Precision Testing.40.402017
UI driven Android application reduction.30.372017
Introspection-Based Memory Pruning for Live VM Migration.10.352017
PAD: programming third-party web advertisement censorship.10.352017
ReRanz: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks.40.382017
An Empirical Study on Mutation Testing of WS-BPEL Programs.30.372017
Z3str2: an efficient solver for strings, regular expressions, and length constraints.30.412017
Automatic model generation from documentation for Java API functions.110.572016
Detecting sensitive data disclosure via bi-directional text correlation analysis.80.482016
Screen After Previous Screens: Spatial-Temporal Recreation Of Android App Displays From Memory Images60.432016
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic.00.342016
Python probabilistic type inference with natural language support.130.562016
PerfGuard: binary-centric application performance monitoring in production environments.20.362016
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic.40.452016
Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices.90.472016
IntEQ: recognizing benign integer overflows via equivalence checking across multiple precisions.00.342016
LDX: Causality Inference by Lightweight Dual Execution.10.352016
  • 1
  • 2