Shuai Wang
Orcid: 0000-0002-0866-0308Affiliations:
- Hong Kong University of Science and Technology, Hong Kong
- ETH Zurich, Switzerland (former)
- Penn State University, University Park, PA, USA (PhD 2018)
According to our database1,
Shuai Wang
authored at least 118 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Software Eng., May, 2024
Evaluating C/C++ Vulnerability Detectability of Query-Based Static Application Security Testing Tools.
IEEE Trans. Dependable Secur. Comput., 2024
Proc. ACM Softw. Eng., 2024
Proc. ACM Program. Lang., 2024
CoRR, 2024
Scalable Differentiable Causal Discovery in the Presence of Latent Confounders with Skeleton Posterior (Extended Version).
CoRR, 2024
CoRR, 2024
Testing and Understanding Erroneous Planning in LLM Agents through Synthesized User Inputs.
CoRR, 2024
How do LLMs Support Deep Learning Testing? A Comprehensive Study Through the Lens of Image Mutation.
CoRR, 2024
LLMs Can Defend Themselves Against Jailbreaking in a Practical Manner: A Vision Paper.
CoRR, 2024
Eliminating Information Leakage in Hard Concept Bottleneck Models with Supervised, Hierarchical Concept Learning.
CoRR, 2024
An Empirical Study on Large Language Models in Accuracy and Robustness under Chinese Industrial Scenarios.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Scalable Differentiable Causal Discovery in the Presence of Latent Confounders with Skeleton Posterior.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
See the Forest, not Trees: Unveiling and Escaping the Pitfalls of Error-Triggering Inputs in Neural Network Testing.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Poster Abstract: On the Accuracy and Robustness of Large Language Models in Chinese Industrial Scenarios.
Proceedings of the 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
On Extracting Specialized Code Abilities from Large Language Models: A Feasibility Study.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Are We There Yet? Filling the Gap Between Binary Similarity Analysis and Binary Software Composition Analysis.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
HyperTheft: Thieving Model Weights from TEE-Shielded Neural Networks via Ciphertext Side Channels.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proc. VLDB Endow., December, 2023
ACM Trans. Softw. Eng. Methodol., July, 2023
IEEE Trans. Software Eng., 2023
Proc. ACM Manag. Data, 2023
CoRR, 2023
CoRR, 2023
Benchmarking and Explaining Large Language Model-based Code Generation: A Causality-Centric Approach.
CoRR, 2023
CoRR, 2023
Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning (Extended Version).
CoRR, 2023
"Oops, Did I Just Say That?" Testing and Repairing Unethical Suggestions of Large Language Models with Suggest-Critique-Reflect Process.
CoRR, 2023
CoRR, 2023
CoRR, 2023
CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 1st Workshop on eBPF and Kernel Extensions, 2023
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Perfce: Performance Debugging on Databases with Chaos Engineering-Enhanced Causality Analysis.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the Information Security - 26th International Conference, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Revisiting Neuron Coverage for DNN Testing: A Layer-Wise and Distribution-Aware Criterion.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Protecting Intellectual Property of Large Language Model-Based Code Generation APIs via Watermarks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2023
Proceedings of the Asian Conference on Machine Learning, 2023
2022
NeuralD: Detecting Indistinguishability Violations of Oblivious RAM With Neural Distinguishers.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Proc. ACM Meas. Anal. Comput. Syst., 2022
Inf. Softw. Technol., 2022
Byzantine-Robust Federated Learning with Optimal Statistical Rates and Privacy Guarantees.
CoRR, 2022
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Unlearnable Examples: Protecting Open-Source Software from Unauthorized Neural Code Learning.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2022
Unleashing the Power of Compiler Intermediate Representation to Enhance Neural Program Embeddings.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
MT-Teql: Evaluating and Augmenting Neural NLIDB on Real-world Linguistic and Schema Variations.
Proc. VLDB Endow., 2021
MDPFuzzer: Finding Crash-Triggering State Sequences in Models Solving the Markov Decision Process.
CoRR, 2021
You Can't See the Forest for Its Trees: Assessing Deep Neural Network Testing via NeuraL Coverage.
CoRR, 2021
Proceedings of the 15th USENIX Symposium on Operating Systems Design and Implementation, 2021
Proceedings of the 9th International Conference on Learning Representations, 2021
Perception Matters: Detecting Perception Failures of VQA Models Using Metamorphic Testing.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
2020
IEEE Trans. Software Eng., 2020
MT-Teql: Evaluating and Augmenting Consistency of Text-to-SQL Models with Metamorphic Testing.
CoRR, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
2019
Proc. ACM Program. Lang., 2019
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 41st International Conference on Software Engineering: Software Engineering Education and Training, 2019
2018
Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering, 2018
Software protection on the go: a large-scale empirical study on mobile app obfuscation.
Proceedings of the 40th International Conference on Software Engineering, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017
2016
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015