Author of the publication

Boosting Few-Pixel Robustness Verification via Covering Verification Designs.

, , , and . CAV (2), volume 14682 of Lecture Notes in Computer Science, page 377-400. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization., , , , and . ACM Conference on Computer and Communications Security, page 508-524. ACM, (2018)DL2: Training and Querying Neural Networks with Logic., , , , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 1931-1941. PMLR, (2019)LCD: Local Combining on Demand., and . OPODIS, volume 8878 of Lecture Notes in Computer Science, page 355-371. Springer, (2014)Config2Spec: Mining Network Specifications from Network Configurations., , , and . NSDI, page 969-984. USENIX Association, (2020)Net2Text: Query-Guided Summarization of Network Forwarding Behaviors., , , and . NSDI, page 609-623. USENIX Association, (2018)Practical concurrent traversals in search trees., , and . PPoPP, page 207-218. ACM, (2018)AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation., , , , , and . IEEE Symposium on Security and Privacy, page 3-18. IEEE Computer Society, (2018)Synthesis with Abstract Examples., , and . CAV (1), volume 10426 of Lecture Notes in Computer Science, page 254-278. Springer, (2017)One Pixel Adversarial Attacks via Sketched Programs., and . Proc. ACM Program. Lang., 7 (PLDI): 1970-1994 (2023)Deep Learning Robustness Verification for Few-Pixel Attacks., , and . Proc. ACM Program. Lang., 7 (OOPSLA1): 434-461 (April 2023)