Follow
Qi Pang
Qi Pang
Verified email at andrew.cmu.edu - Homepage
Title
Cited by
Cited by
Year
Metamorphic testing of deep learning compilers
D Xiao, Z Liu, Y Yuan, Q Pang, S Wang
Proceedings of the ACM on Measurement and Analysis of Computing Systems 6 (1 …, 2022
492022
Byzantine-robust federated learning with optimal statistical rates
B Zhu, L Wang, Q Pang, S Wang, J Jiao, D Song, MI Jordan
International Conference on Artificial Intelligence and Statistics, 3151-3178, 2023
35*2023
MDPFuzz: Testing Models Solving Markov Decision Processes
Q Pang, Y Yuan, S Wang
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2021
31*2021
{PrivGuard}: Privacy regulation compliance made easier
L Wang, U Khan, J Near, Q Pang, J Subramanian, N Somani, P Gao, ...
31st USENIX Security Symposium (USENIX Security 22), 3753-3770, 2022
262022
Bolt: Privacy-preserving, accurate and efficient inference for transformers
Q Pang, J Zhu, H Möllering, W Zheng, T Schneider
2024 IEEE Symposium on Security and Privacy (SP), 4753-4771, 2024
232024
Revisiting neuron coverage for dnn testing: A layer-wise and distribution-aware criterion
Y Yuan, Q Pang, S Wang
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
192023
Unveiling hidden dnn defects with decision-based metamorphic testing
Y Yuan, Q Pang, S Wang
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
182022
Automated Side Channel Analysis of Media Software with Manifold Learning
Y Yuan, Q Pang, S Wang
31st USENIX Security Symposium (USENIX Security 22), 4419-4436, 2022
182022
Towards practical differentially private causal graph discovery
L Wang, Q Pang, D Song
Advances in Neural Information Processing Systems 33, 5516-5526, 2020
162020
Noleaks: Differentially private causal discovery under functional causal model
P Ma, Z Ji, Q Pang, S Wang
IEEE Transactions on Information Forensics and Security 17, 2324-2338, 2022
132022
{mID}: Tracing screen photos via {Moiré} patterns
Y Cheng, X Ji, L Wang, Q Pang, YC Chen, W Xu
30th USENIX Security Symposium (USENIX Security 21), 2969-2986, 2021
132021
ADI: Adversarial Dominating Inputs in Vertical Federated Learning Systems
Q Pang, Y Yuan, S Wang, W Zheng
arXiv preprint arXiv:2201.02775, 2022
12*2022
Secure federated correlation test and entropy estimation
Q Pang, L Wang, S Wang, W Zheng, D Song
International Conference on Machine Learning, 26990-27010, 2023
11*2023
Attacking LLM Watermarks by Exploiting Their Strengths
Q Pang, S Hu, W Zheng, V Smith
arXiv preprint arXiv:2402.16187, 2024
82024
Enhancing deep neural networks testing by traversing data manifold
Y Yuan, Q Pang, S Wang
CoRR, 2021
82021
MPCDiff: Testing and Repairing MPC-Hardened Deep Learning Models
Q Pang, Y Yuan, S Wang
NDSS, 2024
52024
Provably valid and diverse mutations of real-world media data for dnn testing
Y Yuan, Q Pang, S Wang
IEEE Transactions on Software Engineering, 2024
42024
No free lunch in llm watermarking: Trade-offs in watermarking design choices
Q Pang, S Hu, W Zheng, V Smith
The Thirty-eighth Annual Conference on Neural Information Processing Systems, 2024
32024
Metamorphic Testing of Secure Multi-party Computation (MPC) Compilers
Y Li, D Xiao, Z Liu, Q Pang, S Wang
Proceedings of the ACM on Software Engineering 1 (FSE), 1216-1237, 2024
12024
Detecting and Repairing Deviated Outputs of Compressed Models
Y Li, Q Pang, D Xiao, Z Liu, S Wang
Asian Conference on Machine Learning, 707-722, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20