Follow
Shiqi Shen
Shiqi Shen
Verified email at comp.nus.edu.sg
Title
Cited by
Cited by
Year
Auror defending against poisoning attacks in collaborative deep learning systems
S Shen, S Tople, P Saxena
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
3382016
Neural nets can learn function type signatures from binaries
ZL Chua, S Shen, P Saxena, Z Liang
26th {USENIX} Security Symposium ({USENIX} Security 17), 99-116, 2017
1832017
Quantitative verification of neural networks and its security applications
T Baluta, S Shen, S Shinde, KS Meel, P Saxena
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1062019
Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints.
S Shen, S Shinde, S Ramesh, A Roychoudhury, P Saxena
NDSS, 2019
362019
Localizing Vulnerabilities Statistically From One Exploit
S Shen, A Kolluri, Z Dong, P Saxena, A Roychoudhury
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
232021
Refined Grey-Box Fuzzing with SIVO
I Nikolic, R Mantu, S Shen, P Saxena
arXiv preprint arXiv:2102.02394, 2021
4*2021
Neuro-symbolic execution: The feasibility of an inductive approach to symbolic execution
S Shen, S Ramesh, S Shinde, A Roychoudhury, P Saxena
arXiv preprint arXiv:1807.00575, 2018
32018
Localizing Patch Points From One Exploit
S Shen, A Kolluri, Z Dong, P Saxena, A Roychoudhury
arXiv preprint arXiv:2008.04516, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–8