Shiqing Ma
Cited by
Cited by
Trojaning attack on neural networks
Y Liu, S Ma, Y Aafer, WC Lee, J Zhai, W Wang, X Zhang
Protracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting.
S Ma, X Zhang, D Xu
NDSS, 2016
Nic: Detecting adversarial samples with neural network invariant checking
S Ma, Y Liu
Proceedings of the 26th Network and Distributed System Security Symposium …, 2019
Attacks meet interpretability: Attribute-steered detection of adversarial samples
G Tao, S Ma, Y Liu, X Zhang
arXiv preprint arXiv:1810.11580, 2018
Hercule: Attack story reconstruction via community discovery on correlated log graph
K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang, L Si, X Zhang, ...
Proceedings of the 32Nd Annual Conference on Computer Security Applications …, 2016
ABS: Scanning neural networks for back-doors by artificial brain stimulation
Y Liu, WC Lee, G Tao, S Ma, Y Aafer, X Zhang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Colo: Coarse-grained lock-stepping virtual machines for non-stop service
YZ Dong, W Ye, YH Jiang, I Pratt, SQ Ma, J Li, HB Guan
Proceedings of the 4th annual Symposium on Cloud Computing, 1-16, 2013
{MPI}: Multiple perspective attack investigation with semantic aware execution partitioning
S Ma, J Zhai, F Wang, KH Lee, X Zhang, D Xu
26th {USENIX} Security Symposium ({USENIX} Security 17), 1111-1128, 2017
MODE: automated neural network model debugging via state differential analysis and input selection
S Ma, Y Liu, WC Lee, X Zhang, A Grama
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
Accurate, low cost and instrumentation-free security audit logging for windows
S Ma, KH Lee, CH Kim, J Rhee, X Zhang, D Xu
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ...
NDSS, 2018
Profuzzer: On-the-fly input type probing for better zero-day vulnerability discovery
W You, X Wang, S Ma, J Huang, X Zhang, XF Wang, B Liang
2019 IEEE Symposium on Security and Privacy (SP), 769-786, 2019
Automatic model generation from documentation for Java API functions
J Zhai, J Huang, S Ma, X Zhang, L Tan, J Zhao, F Qin
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE …, 2016
Dynamic backdoor attacks against machine learning models
A Salem, R Wen, M Backes, S Ma, Y Zhang
arXiv preprint arXiv:2003.03675, 2020
Kernel-supported cost-effective audit logging for causality tracking
S Ma, J Zhai, Y Kwon, KH Lee, X Zhang, G Ciocarlie, A Gehani, ...
2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 241-254, 2018
SLF: fuzzing without valid seed inputs
W You, X Liu, S Ma, D Perry, X Zhang, B Liang
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
LAMP: data provenance for graph based machine learning algorithms through derivative computation
S Ma, Y Aafer, Z Xu, WC Lee, J Zhai, Y Liu, X Zhang
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
Badnl: Backdoor attacks against nlp models
X Chen, A Salem, M Backes, S Ma, Y Zhang
arXiv preprint arXiv:2006.01043, 2020
CPC: Automatically classifying and propagating natural language comments via program analysis
J Zhai, X Xu, Y Shi, G Tao, M Pan, S Ma, L Xu, W Zhang, L Tan, X Zhang
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
Debugging with intelligence via probabilistic inference
Z Xu, S Ma, X Zhang, S Zhu, B Xu
Proceedings of the 40th International Conference on Software Engineering …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20