Fei Wang

Affiliations:
  • Purdue University, West Lafayette, IN, USA


According to our database1, Fei Wang authored at least 21 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Architecting Intermediate Layers for Efficient Composition of Data Management and Machine Learning Systems.
CoRR, 2023

2022
ProFactory: Improving IoT Security via Formalized Protocol Customization.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021


2020
HACCLE: An Ecosystem for Building Secure Multi-Party Computations.
CoRR, 2020

2019
Flare & Lantern: Efficiently Swapping Horses Midstream.
Proc. VLDB Endow., 2019

Demystifying differentiable programming: shift/reset the penultimate backpropagator.
Proc. ACM Program. Lang., 2019

Graph Neural Reasoning for 2-Quantified Boolean Formula Solvers.
CoRR, 2019

AutoGraph: Imperative-style Coding with Graph-based Performance.
Proceedings of the Second Conference on Machine Learning and Systems, SysML 2019, 2019

Parallel Training via Computation Graph Transformation.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Demystifying Differentiable Programming: Shift/Reset the Penultimate Backpropagator.
CoRR, 2018

From Gameplay to Symbolic Reasoning: Learning SAT Solver Heuristics in the Style of Alpha(Go) Zero.
CoRR, 2018

Backpropagation with Callbacks: Foundations for Efficient and Expressive Differentiable Programming.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

A Language and Compiler View on Differentiable Programming.
Proceedings of the 6th International Conference on Learning Representations, 2018

Lprov: Practical Library-aware Provenance Tracing.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Towards Strong Normalization for Dependent Object Types (DOT) (Artifact).
Dagstuhl Artifacts Ser., 2017

Towards Strong Normalization for Dependent Object Types (DOT).
Proceedings of the 31st European Conference on Object-Oriented Programming, 2017

2015
LiHB: Lost in HTTP Behaviors - A Behavior-Based Covert Channel in HTTP.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

2014
A novel distributed covert channel in HTTP.
Secur. Commun. Networks, 2014

PS-TRUST: Provably secure solution for truthful double spectrum auctions.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
A Novel Web Tunnel Detection Method Based on Protocol Behaviors.
Proceedings of the Security and Privacy in Communication Networks, 2013


  Loading...