Author of the publication

AUTOTRAINER: An Automatic DNN Training Problem Detection and Repair System.

, , , and . ICSE, page 359-371. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Training with More Confidence: Mitigating Injected and Natural Backdoors During Training., , , and . NeurIPS, (2022)Assertion-Directed Precondition Synthesis for Loops over Data Structures., , and . SETTA, volume 9409 of Lecture Notes in Computer Science, page 258-274. Springer, (2015)Post-condition-Directed Invariant Inference for Loops over Data Structures., , and . SERE (Companion), page 204-212. IEEE, (2014)A Critical Review of Large Language Model on Software Engineering: An Example from ChatGPT and Automated Program Repair., , , , , , and . CoRR, (2023)Extracting Mapping Relations for Mobile User Interface Transformation., , , , , and . Internetware, page 2:1-2:10. ACM, (2019)ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning., , , and . USENIX Security Symposium, page 3023-3040. USENIX Association, (2021)The Case for Learned Provenance Graph Storage Systems., , , and . USENIX Security Symposium, page 3277-3294. USENIX Association, (2023)Machine Translation Testing via Syntactic Tree Pruning., , , , , , and . ACM Trans. Softw. Eng. Methodol., 33 (5): 125:1-125:39 (June 2024)Towards General Robustness Verification of MaxPool-based Convolutional Neural Networks via Tightening Linear Approximation., , , , , and . CoRR, (2024)BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning., , and . CVPR, page 15054-15063. IEEE, (2022)