default search action
Juan Zhai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Peifu Yang, Yuhong Nan, Lei Xue, Yuliang Zhang, Juan Zhai, Zibin Zheng:
Understanding Privacy Risks of Intelligent Connected Vehicles Through Their Companion Mobile Apps. IEEE Internet Things J. 11(20): 33683-33695 (2024) - [j4]Zeqin Liao, Yuhong Nan, Henglong Liang, Sicheng Hao, Juan Zhai, Jiajing Wu, Zibin Zheng:
SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis. Proc. ACM Softw. Eng. 1(FSE): 249-270 (2024) - [j3]Weipeng Jiang, Juan Zhai, Shiqing Ma, Xiaoyu Zhang, Chao Shen:
COSTELLO: Contrastive Testing for Embedding-Based Large Language Model as a Service Embeddings. Proc. ACM Softw. Eng. 1(FSE): 906-928 (2024) - [j2]Quanjun Zhang, Juan Zhai, Chunrong Fang, Jiawei Liu, Weisong Sun, Haichuan Hu, Qingyu Wang:
Machine Translation Testing via Syntactic Tree Pruning. ACM Trans. Softw. Eng. Methodol. 33(5): 125:1-125:39 (2024) - [c34]Jinsong Mao, Hailun Ding, Juan Zhai, Shiqing Ma:
Merlin: Multi-tier Optimization of eBPF Code for Performance and Compactness. ASPLOS (3) 2024: 639-653 - [c33]Yuan Xiao, Shiqing Ma, Juan Zhai, Chunrong Fang, Jinyuan Jia, Zhenyu Chen:
Towards General Robustness Verification of MaxPool-Based Convolutional Neural Networks via Tightening Linear Approximation. CVPR 2024: 24766-24775 - [c32]Xuanqi Gao, Weipeng Jiang, Juan Zhai, Shiqing Ma, Xiaoyu Zhang, Chao Shen:
Efficient DNN-Powered Software with Fair Sparse Models. ISSTA 2024: 983-995 - [i20]Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Chao Shen:
DREAM: Debugging and Repairing AutoML Pipelines. CoRR abs/2401.00379 (2024) - [i19]Quanjun Zhang, Juan Zhai, Chunrong Fang, Jiawei Liu, Weisong Sun, Haichuan Hu, Qingyu Wang:
Machine Translation Testing via Syntactic Tree Pruning. CoRR abs/2401.00751 (2024) - [i18]Weipeng Jiang, Xuanqi Gao, Juan Zhai, Shiqing Ma, Xiaoyu Zhang, Chao Shen:
From Effectiveness to Efficiency: Comparative Evaluation of Code Generated by LCGMs for Bilingual Programming Questions. CoRR abs/2406.00602 (2024) - [i17]Yuan Xiao, Shiqing Ma, Juan Zhai, Chunrong Fang, Jinyuan Jia, Zhenyu Chen:
Towards General Robustness Verification of MaxPool-based Convolutional Neural Networks via Tightening Linear Approximation. CoRR abs/2406.00699 (2024) - [i16]Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Shiwei Wang, Chao Shen:
CITADEL: Context Similarity Based Deep Learning Framework Bug Finding. CoRR abs/2406.12196 (2024) - [i15]Zeqin Liao, Yuhong Nan, Henglong Liang, Sicheng Hao, Juan Zhai, Jiajing Wu, Zibin Zheng:
SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis. CoRR abs/2406.15999 (2024) - [i14]Xuanqi Gao, Weipeng Jiang, Juan Zhai, Shiqing Ma, Xiaoyu Zhang, Chao Shen:
Efficient DNN-Powered Software with Fair Sparse Models. CoRR abs/2407.02805 (2024) - [i13]Fusen He, Juan Zhai, Minxue Pan:
Beyond Code Generation: Assessing Code LLM Maturity with Postconditions. CoRR abs/2407.14118 (2024) - [i12]Weipeng Jiang, Zhenting Wang, Juan Zhai, Shiqing Ma, Zhengyu Zhao, Chao Shen:
Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer. CoRR abs/2408.11313 (2024) - [i11]Zhenting Wang, Zhizhi Wang, Mingyu Jin, Mengnan Du, Juan Zhai, Shiqing Ma:
Data-centric NLP Backdoor Defense from the Lens of Memorization. CoRR abs/2409.14200 (2024) - [i10]Yinglong Zou, Juan Zhai, Chunrong Fang, Jiawei Liu, Tao Zheng, Zhenyu Chen:
Mutation-Based Deep Learning Framework Testing Method in JavaScript Environment. CoRR abs/2409.14968 (2024) - [i9]Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Chao Shen, Tianlin Li, Weipeng Jiang, Yang Liu:
Speculative Coreset Selection for Task-Specific Fine-tuning. CoRR abs/2410.01296 (2024) - 2023
- [c31]Zhenting Wang, Kai Mei, Juan Zhai, Shiqing Ma:
UNICORN: A Unified Backdoor Trigger Inversion Framework. ICLR 2023 - [c30]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Shiwei Wang:
CILIATE: Towards Fairer Class-Based Incremental Learning by Dataset and Training Refinement. ISSTA 2023: 475-487 - [c29]Hailun Ding, Juan Zhai, Yuhong Nan, Shiqing Ma:
AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts. USENIX Security Symposium 2023: 373-390 - [c28]Hailun Ding, Juan Zhai, Dong Deng, Shiqing Ma:
The Case for Learned Provenance Graph Storage Systems. USENIX Security Symposium 2023: 3277-3294 - [i8]Zhenting Wang, Kai Mei, Juan Zhai, Shiqing Ma:
UNICORN: A Unified Backdoor Trigger Inversion Framework. CoRR abs/2304.02786 (2023) - [i7]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Shiwei Wang:
CILIATE: Towards Fairer Class-based Incremental Learning by Dataset and Training Refinement. CoRR abs/2304.04222 (2023) - [i6]Quanjun Zhang, Tongke Zhang, Juan Zhai, Chunrong Fang, Bowen Yu, Weisong Sun, Zhenyu Chen:
A Critical Review of Large Language Model on Software Engineering: An Example from ChatGPT and Automated Program Repair. CoRR abs/2310.08879 (2023) - [i5]Xiuting Ge, Chunrong Fang, Xuanye Li, Weisong Sun, Daoyuan Wu, Juan Zhai, Shangwei Lin, Zhihong Zhao, Yang Liu, Zhenyu Chen:
Machine Learning for Actionable Warning Identification: A Comprehensive Survey. CoRR abs/2312.00324 (2023) - 2022
- [c27]Zhenting Wang, Juan Zhai, Shiqing Ma:
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning. CVPR 2022: 15054-15063 - [c26]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Qian Wang:
Fairneuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons. ICSE 2022: 921-933 - [c25]Zhenting Wang, Hailun Ding, Juan Zhai, Shiqing Ma:
Training with More Confidence: Mitigating Injected and Natural Backdoors During Training. NeurIPS 2022 - [c24]Zhenting Wang, Kai Mei, Hailun Ding, Juan Zhai, Shiqing Ma:
Rethinking the Reverse-engineering of Trojan Triggers. NeurIPS 2022 - [i4]Zhenting Wang, Hailun Ding, Juan Zhai, Shiqing Ma:
Neural Network Trojans Analysis and Mitigation from the Input Domain. CoRR abs/2202.06382 (2022) - [i3]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Qian Wang:
FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons. CoRR abs/2204.02567 (2022) - [i2]Zhenting Wang, Juan Zhai, Shiqing Ma:
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning. CoRR abs/2205.13383 (2022) - [i1]Zhenting Wang, Kai Mei, Hailun Ding, Juan Zhai, Shiqing Ma:
Rethinking the Reverse-engineering of Trojan Triggers. CoRR abs/2210.15127 (2022) - 2021
- [c23]Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Chao Shen:
AUTOTRAINER: An Automatic DNN Training Problem Detection and Repair System. ICSE 2021: 359-371 - [c22]Hailun Ding, Shenao Yan, Juan Zhai, Shiqing Ma:
ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning. USENIX Security Symposium 2021: 3023-3040 - 2020
- [j1]Minxue Pan, Yifei Lu, Yu Pei, Tian Zhang, Juan Zhai, Xuandong Li:
Effective testing of Android apps using extended IFML models. J. Syst. Softw. 159 (2020) - [c21]Shiyu Zhang, Juan Zhai, Lei Bu, Mingsong Chen, Linzhang Wang, Xuandong Li:
Automated Generation of LTL Specifications For Smart Home IoT Using Natural Language. DATE 2020: 622-625 - [c20]Juan Zhai, Xiangzhe Xu, Yu Shi, Guanhong Tao, Minxue Pan, Shiqing Ma, Lei Xu, Weifeng Zhang, Lin Tan, Xiangyu Zhang:
CPC: automatically classifying and propagating natural language comments via program analysis. ICSE 2020: 1359-1371 - [c19]Yang Zhang, Shuai Shao, Juan Zhai, Shiqing Ma:
FineLock: automatically refactoring coarse-grained locks into fine-grained locks. ISSTA 2020: 565-568 - [c18]Juan Zhai, Yu Shi, Minxue Pan, Guian Zhou, Yongxiang Liu, Chunrong Fang, Shiqing Ma, Lin Tan, Xiangyu Zhang:
C2S: translating natural language comments to formal program specifications. ESEC/SIGSOFT FSE 2020: 25-37 - [c17]Shenao Yan, Guanhong Tao, Xuwei Liu, Juan Zhai, Shiqing Ma, Lei Xu, Xiangyu Zhang:
Correlations between deep neural network model coverage criteria and model quality. ESEC/SIGSOFT FSE 2020: 775-787
2010 – 2019
- 2019
- [c16]Ruihua Ji, Junyu Pei, Wenhua Yang, Juan Zhai, Minxue Pan, Tian Zhang:
Extracting Mapping Relations for Mobile User Interface Transformation. Internetware 2019: 2:1-2:10 - [c15]Yifei Lu, Minxue Pan, Juan Zhai, Tian Zhang, Xuandong Li:
Preference-wise testing for Android applications. ESEC/SIGSOFT FSE 2019: 268-278 - 2018
- [c14]Zhenhao Tang, Juan Zhai, Minxue Pan, Yousra Aafer, Shiqing Ma, Xiangyu Zhang, Jianhua Zhao:
Dual-force: understanding WebView malware via cross-language forced execution. ASE 2018: 714-725 - [c13]Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, Xiangyu Zhang:
Trojaning Attack on Neural Networks. NDSS 2018 - [c12]Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee, Xiangyu Zhang, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, Somesh Jha:
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking. USENIX ATC 2018: 241-254 - 2017
- [c11]Bin Li, Juan Zhai, Zhenhao Tang, Enyi Tang, Jianhua Zhao:
A Framework for Array Invariants Synthesis in Induction-Loop Programs. APSEC 2017: 21-30 - [c10]Zhenhao Tang, Juan Zhai, Bin Li, Jianhua Zhao:
Are Your Classes Well-Encapsulated? Encapsulation Analysis for Java. QRS 2017: 208-215 - [c9]Shiqing Ma, Yousra Aafer, Zhaogui Xu, Wen-Chuan Lee, Juan Zhai, Yingqi Liu, Xiangyu Zhang:
LAMP: data provenance for graph based machine learning algorithms through derivative computation. ESEC/SIGSOFT FSE 2017: 786-797 - [c8]Shiqing Ma, Juan Zhai, Fei Wang, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning. USENIX Security Symposium 2017: 1111-1128 - 2016
- [c7]Juan Zhai, Jianjun Huang, Shiqing Ma, Xiangyu Zhang, Lin Tan, Jianhua Zhao, Feng Qin:
Automatic model generation from documentation for Java API functions. ICSE 2016: 380-391 - [c6]Bin Li, Zhenhao Tang, Juan Zhai, Jianhua Zhao:
Automatic Invariant Synthesis for Arrays in Simple Programs. QRS 2016: 108-119 - [c5]Juan Zhai, Bin Li, Zhenhao Tang, Jianhua Zhao, Xuandong Li:
Precondition Calculation for Loops Iterating over Data Structures. QRS 2016: 132-143 - 2015
- [c4]Zhenhao Tang, Hanfei Wang, Bin Li, Juan Zhai, Jianhua Zhao, Xuandong Li:
Analyzing Inductively Defined Properties for Recursive Data Structures. Internetware 2015: 221-228 - [c3]Zhenhao Tang, Hanfei Wang, Bin Li, Juan Zhai, Jianhua Zhao, Xuandong Li:
Node-Set Analysis for Linked Recursive Data Structures. QRS 2015: 59-64 - [c2]Juan Zhai, Hanfei Wang, Jianhua Zhao:
Assertion-Directed Precondition Synthesis for Loops over Data Structures. SETTA 2015: 258-274 - 2014
- [c1]Juan Zhai, Hanfei Wang, Jianhua Zhao:
Post-condition-Directed Invariant Inference for Loops over Data Structures. SERE (Companion) 2014: 204-212
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint