Follow
Yuanyuan Yuan
Yuanyuan Yuan
CSE, HKUST
Verified email at cse.ust.hk - Homepage
Title
Cited by
Cited by
Year
Perception Matters: Detecting Perception Failures of VQA Models Using Metamorphic Testing
Y Yuan, S Wang, M Jiang, TY Chen
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
402021
Metamorphic Testing of Deep Learning Compilers
D Xiao, Z LIU, Y Yuan, Q Pang, S Wang
Proceedings of the ACM on Measurement and Analysis of Computing Systems 6 (1 …, 2022
332022
MDPFuzz: testing models solving Markov decision processes
Q Pang, Y Yuan, S Wang
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
18*2022
Revisiting neuron coverage for dnn testing: A layer-wise and distribution-aware criterion
Y Yuan, Q Pang, S Wang
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
14*2023
Sok: demystifying binary lifters through the lens of downstream applications
Z Liu, Y Yuan, S Wang, Y Bao
2022 IEEE Symposium on Security and Privacy (SP), 1100-1119, 2022
142022
Unveiling hidden dnn defects with decision-based metamorphic testing
Y Yuan, Q Pang, S Wang
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
132022
Automated Side Channel Analysis of Media Software with Manifold Learning
Y Yuan, Q Pang, S Wang
31st USENIX Security Symposium (USENIX Security 22), 2022
132022
Enhancing DNN-Based Binary Code Function Search With Low-Cost Equivalence Checking
H Wang, P Ma, Y Yuan, Z Liu, S Wang, Q Tang, S Nie, S Wu
IEEE Transactions on Software Engineering 49 (1), 226-250, 2022
122022
Explain any concept: Segment anything meets concept-based explanation
A Sun, P Ma, Y Yuan, S Wang
Advances in Neural Information Processing Systems 36, 2024
112024
Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing
Y Yuan, Q Pang, S Wang
IEEE Transactions on Software Engineering, 2024
9*2024
ADI: Adversarial Dominating Inputs in Vertical Federated Learning Systems
Q Pang, Y Yuan, S Wang, W Zheng
2023 IEEE Symposium on Security and Privacy (SP), 1875-1892, 2023
9*2023
CC: Causality-Aware Coverage Criterion for Deep Neural Networks
Z Ji, P Ma, Y Yuan, S Wang
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
92023
{CacheQL}: Quantifying and Localizing Cache {Side-Channel} Vulnerabilities in Production Software
Y Yuan, Z Liu, S Wang
32nd USENIX Security Symposium (USENIX Security 23), 2009-2026, 2023
92023
Decompiling x86 deep neural network executables
Z Liu, Y Yuan, S Wang, X Xie, L Ma
32nd USENIX Security Symposium (USENIX Security 23), 7357-7374, 2023
7*2023
No Privacy Left Outside: On the (In-) Security of TEE-Shielded DNN Partition for On-Device ML
Z Zhang, C Gong, Y Cai, Y Yuan, B Liu, D Li, Y Guo, X Chen
arXiv preprint arXiv:2310.07152, 2023
52023
Eliminating Information Leakage in Hard Concept Bottleneck Models with Supervised, Hierarchical Concept Learning
A Sun, Y Yuan, P Ma, S Wang
arXiv preprint arXiv:2402.05945, 2024
32024
Private Image Reconstruction from System Side Channels Using Generative Models
Y Yuan, S Wang, J Zhang
International Conference on Learning Representations (ICLR 2021), 2020
32020
MPCDiff: Testing and Repairing MPC-Hardened Deep Learning Models
Q Pang, Y Yuan, S Wang
NDSS, 2024
22024
Precise and generalized robustness certification for neural networks
Y Yuan, S Wang, Z Su
32nd USENIX Security Symposium (USENIX Security 23), 4769-4786, 2023
22023
NeuralD: Detecting Indistinguishability Violations of Oblivious RAM With Neural Distinguishers
P Ma, Z Liu, Y Yuan, S Wang
IEEE Transactions on Information Forensics and Security 17, 982-997, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20