Follow
Jingyi Wang
Jingyi Wang
Assistant Professor, Zhejiang University
Verified email at zju.edu.cn - Homepage
Title
Cited by
Cited by
Year
Adversarial sample detection for deep neural network through model mutation testing
J Wang, G Dong, J Sun, X Wang, P Zhang
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
1162019
Towards Optimal Concolic Testing
X Wang, J Sun, Z Chen, P Zhang, J Wang, Y Lin
2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE), 2018
552018
White-box fairness testing through adversarial sampling
P ZHANG, J WANG, J SUN, G DONG, X WANG, X WANG, JS DONG, ...
2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE), 2020
432020
Detecting adversarial samples for deep neural networks through mutation testing
J Wang, J Sun, P Zhang, X Wang
arXiv preprint arXiv:1805.05010, 2018
432018
An empirical study on correlation between coverage and robustness for deep neural networks
Y Dong, P Zhang, J Wang, S Liu, J Sun, J Hao, X Wang, L Wang, J Dong, ...
2020 25th International Conference on Engineering of Complex Computer …, 2020
23*2020
Robot: Robustness-oriented testing for deep learning systems
J Wang, J Chen, Y Sun, X Ma, D Wang, J Sun, P Cheng
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
202021
Towards interpreting recurrent neural networks through probabilistic abstraction
G Dong, J Wang, J Sun, Y Zhang, X Wang, T Dai, JS Dong, X Wang
2020 35th IEEE/ACM International Conference on Automated Software …, 2020
122020
Automatically ‘Verifying’ Discrete-Time Complex Systems through Learning, Abstraction and Refinement
J Wang, J Sun, S Qin, C Jegourel
IEEE Transactions on Software Engineering, 2018
11*2018
Should we learn probabilistic models for model checking? A new approach and an empirical study
J Wang, J Sun, Q Yuan, J Pang
International Conference on Fundamental Approaches to Software Engineering, 3-21, 2017
112017
Attack as defense: Characterizing adversarial examples using robustness
Z Zhao, G Chen, J Wang, Y Yang, F Song, J Sun
Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021
102021
Improving neural network verification through spurious region guided refinement
P Yang, R Li, J Li, CC Huang, J Wang, J Sun, B Xue, L Zhang
International Conference on Tools and Algorithms for the Construction and …, 2021
92021
Towards concolic testing for hybrid systems
P Kong, Y Li, X Chen, J Sun, M Sun, J Wang
International Symposium on Formal Methods, 460-478, 2016
92016
Learning probabilistic models for model checking: an evolutionary approach and an empirical study
J Wang, J Sun, Q Yuan, J Pang
International Journal on Software Tools for Technology Transfer 20 (6), 689-704, 2018
72018
Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems
Y Jia, J Wang, CM Poskitt, S Chattopadhyay, J Sun, Y Chen
International Journal of Critical Infrastructure Protection 34, 100452, 2021
62021
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models
J Chen, J Wang, T Peng, Y Sun, P Cheng, S Ji, X Ma, B Li, D Song
2022 IEEE Symposium on Security and Privacy (SP), 2022
52022
Towards ‘Verifying’ a Water Treatment System
J Wang, J Sun, Y Jia, S Qin, Z Xu
International Symposium on Formal Methods, 73-92, 2018
52018
Importance Sampling of Interval Markov Chains
C Jegourel, J Wang, J Sun
48th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2018
52018
Towards repairing neural networks correctly
G Dong, J Sun, X Wang, X Wang, T Dai
2021 IEEE 21st International Conference on Software Quality, Reliability and …, 2021
42021
Improving probability estimation through active probabilistic model learning
J Wang, X Chen, J Sun, S Qin
International Conference on Formal Engineering Methods, 379-395, 2017
42017
Automatic Fairness Testing of Neural Classifiers through Adversarial Sampling
P Zhang, J Wang, J Sun, X Wang, G Dong, X Wang, T Dai, JS Dong
IEEE Transactions on Software Engineering, 2021
32021
The system can't perform the operation now. Try again later.
Articles 1–20