Complex Backdoor Detection by Symmetric Feature Differencing | 0 | 0.34 | 2022 |
Constrained Optimization with Dynamic Bound-scaling for Effective NLP Backdoor Defense. | 0 | 0.34 | 2022 |
Better Trigger Inversion Optimization in Backdoor Scanning | 0 | 0.34 | 2022 |
Deep Feature Space Trojan Attack Of Neural Networks By Controlled Detoxification | 0 | 0.34 | 2021 |
ATLAS: A Sequence-based Learning Approach for Attack Investigation | 0 | 0.34 | 2021 |
SEMFLOW: Accurate Semantic Identification from Low-Level System Data | 0 | 0.34 | 2021 |
To What Extent Do Dnn-Based Image Classification Models Make Unreliable Inferences? | 0 | 0.34 | 2021 |
AUTOTRAINER: An Automatic DNN Training Problem Detection and Repair System | 2 | 0.38 | 2021 |
Backdoor Scanning for Deep Neural Networks through K-Arm Optimization | 0 | 0.34 | 2021 |
ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning | 0 | 0.34 | 2021 |
Uiscope: Accurate, Instrumentation-Free, And Visible Attack Investigation For Gui Applications | 1 | 0.34 | 2020 |
C2S: translating natural language comments to formal program specifications | 4 | 0.40 | 2020 |
Correlations between deep neural network model coverage criteria and model quality | 7 | 0.42 | 2020 |
CPC: automatically classifying and propagating natural language comments via program analysis | 1 | 0.35 | 2020 |
ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation | 11 | 0.61 | 2019 |
NIC - Detecting Adversarial Samples with Neural Network Invariant Checking. | 3 | 0.38 | 2019 |
Programming support for autonomizing software | 0 | 0.34 | 2019 |
White-box program tuning | 0 | 0.34 | 2019 |
Trojaning Attack on Neural Networks. | 24 | 0.73 | 2018 |
Dual-force: understanding WebView malware via cross-language forced execution. | 1 | 0.36 | 2018 |
Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples. | 6 | 0.53 | 2018 |
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation. | 2 | 0.37 | 2018 |
Mpi: Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning | 5 | 0.40 | 2017 |