Follow
Yuanyuan Yuan
Yuanyuan Yuan
CSE, HKUST
Verified email at cse.ust.hk - Homepage
Title
Cited by
Cited by
Year
Perception Matters: Detecting Perception Failures of VQA Models Using Metamorphic Testing
Y Yuan, S Wang, M Jiang, TY Chen
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
392021
Metamorphic Testing of Deep Learning Compilers
D Xiao, Z LIU, Y Yuan, Q Pang, S Wang
Proceedings of the ACM on Measurement and Analysis of Computing Systems 6 (1 …, 2022
302022
MDPFuzz: testing models solving Markov decision processes
Q Pang, Y Yuan, S Wang
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
19*2022
Revisiting neuron coverage for dnn testing: A layer-wise and distribution-aware criterion
Y Yuan, Q Pang, S Wang
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
13*2023
Sok: demystifying binary lifters through the lens of downstream applications
Z Liu, Y Yuan, S Wang, Y Bao
2022 IEEE Symposium on Security and Privacy (SP), 1100-1119, 2022
132022
Automated Side Channel Analysis of Media Software with Manifold Learning
Y Yuan, Q Pang, S Wang
31st USENIX Security Symposium (USENIX Security 22), 2022
132022
Unveiling hidden dnn defects with decision-based metamorphic testing
Y Yuan, Q Pang, S Wang
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
122022
Explain any concept: Segment anything meets concept-based explanation
A Sun, P Ma, Y Yuan, S Wang
Advances in Neural Information Processing Systems 36, 2024
102024
Enhancing DNN-Based Binary Code Function Search With Low-Cost Equivalence Checking
H Wang, P Ma, Y Yuan, Z Liu, S Wang, Q Tang, S Nie, S Wu
IEEE Transactions on Software Engineering 49 (1), 226-250, 2022
102022
{CacheQL}: Quantifying and Localizing Cache {Side-Channel} Vulnerabilities in Production Software
Y Yuan, Z Liu, S Wang
32nd USENIX Security Symposium (USENIX Security 23), 2009-2026, 2023
92023
Provably Valid and Diverse Mutations of Real-World Media Data for DNN Testing
Y Yuan, Q Pang, S Wang
IEEE Transactions on Software Engineering, 2024
8*2024
ADI: Adversarial Dominating Inputs in Vertical Federated Learning Systems
Q Pang, Y Yuan, S Wang, W Zheng
2023 IEEE Symposium on Security and Privacy (SP), 1875-1892, 2023
8*2023
CC: Causality-Aware Coverage Criterion for Deep Neural Networks
Z Ji, P Ma, Y Yuan, S Wang
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
42023
Decompiling x86 deep neural network executables
Z Liu, Y Yuan, S Wang, X Xie, L Ma
32nd USENIX Security Symposium (USENIX Security 23), 7357-7374, 2023
42023
No Privacy Left Outside: On the (In-) Security of TEE-Shielded DNN Partition for On-Device ML
Z Zhang, C Gong, Y Cai, Y Yuan, B Liu, D Li, Y Guo, X Chen
arXiv preprint arXiv:2310.07152, 2023
32023
Private Image Reconstruction from System Side Channels Using Generative Models
Y Yuan, S Wang, J Zhang
International Conference on Learning Representations (ICLR 2021), 2020
32020
Eliminating Information Leakage in Hard Concept Bottleneck Models with Supervised, Hierarchical Concept Learning
A Sun, Y Yuan, P Ma, S Wang
arXiv preprint arXiv:2402.05945, 2024
22024
Precise and generalized robustness certification for neural networks
Y Yuan, S Wang, Z Su
32nd USENIX Security Symposium (USENIX Security 23), 4769-4786, 2023
22023
NeuralD: Detecting Indistinguishability Violations of Oblivious RAM With Neural Distinguishers
P Ma, Z Liu, Y Yuan, S Wang
IEEE Transactions on Information Forensics and Security 17, 982-997, 2022
22022
MPCDiff: Testing and Repairing MPC-Hardened Deep Learning Models
Q Pang, Y Yuan, S Wang
NDSS, 2024
12024
The system can't perform the operation now. Try again later.
Articles 1–20