Auror defending against poisoning attacks in collaborative deep learning systems S Shen, S Tople, P Saxena Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 402 | 2016 |
Neural nets can learn function type signatures from binaries ZL Chua, S Shen, P Saxena, Z Liang 26th {USENIX} Security Symposium ({USENIX} Security 17), 99-116, 2017 | 202 | 2017 |
Quantitative verification of neural networks and its security applications T Baluta, S Shen, S Shinde, KS Meel, P Saxena Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 121 | 2019 |
Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints. S Shen, S Shinde, S Ramesh, A Roychoudhury, P Saxena NDSS, 2019 | 39 | 2019 |
Localizing Vulnerabilities Statistically From One Exploit S Shen, A Kolluri, Z Dong, P Saxena, A Roychoudhury Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 30 | 2021 |
Refined Grey-Box Fuzzing with SIVO I Nikolic, R Mantu, S Shen, P Saxena arXiv preprint arXiv:2102.02394, 2021 | 6* | 2021 |
Neuro-symbolic execution: The feasibility of an inductive approach to symbolic execution S Shen, S Ramesh, S Shinde, A Roychoudhury, P Saxena arXiv preprint arXiv:1807.00575, 2018 | 4 | 2018 |
Localizing Patch Points From One Exploit S Shen, A Kolluri, Z Dong, P Saxena, A Roychoudhury arXiv preprint arXiv:2008.04516, 2020 | 1 | 2020 |