Follow
Shiqi Wang
Shiqi Wang
Applied Scientist, Amazon AWS AI Lab
Verified email at cs.columbia.edu - Homepage
Title
Cited by
Cited by
Year
Formal security analysis of neural networks using symbolic intervals
S Wang, K Pei, J Whitehouse, J Yang, S Jana
USENIX Security 2018, 2018
5172018
Efficient formal safety analysis of neural networks
S Wang, K Pei, J Whitehouse, J Yang, S Jana
NeurIPS 2018, 2018
4572018
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes, ZM Mao, A Prakash, ...
NDSS 2017, 2017
3982017
Beta-crown: Efficient bound propagation with per-neuron split constraints for neural network robustness verification
S Wang, H Zhang, K Xu, X Lin, S Jana, CJ Hsieh, JZ Kolter
NeurIPS 2021, 2021
278*2021
Hydra: Pruning adversarially robust neural networks
V Sehwag, S Wang, P Mittal, S Jana
NeurIPS 2020, 2020
1912020
Fast and complete: Enabling complete neural network verification with rapid and massively parallel incomplete verifiers
K Xu, H Zhang, S Wang, Y Wang, S Jana, X Lin, CJ Hsieh
ICLR 2021, 2021
1272021
Mixtrain: Scalable training of verifiably robust neural networks
S Wang, Y Chen, A Abdou, S Jana
arXiv preprint arXiv:1811.02625, 2018
972018
On training robust {PDF} malware classifiers
Y Chen, S Wang, D She, S Jana
USENIX Security 2020, 2020
832020
Multi-lingual Evaluation of Code Generation Models
B Athiwaratkun, SK Gouda, Z Wang, X Li, Y Tian, M Tan, WU Ahmad, ...
ICLR 2023, 2023
73*2023
General Cutting Planes for Bound-Propagation-Based Neural Network Verification
H Zhang, S Wang, K Xu, L Li, B Li, S Jana, CJ Hsieh, JZ Kolter
NeurIPS 2022, 2022
682022
Towards understanding fast adversarial training
B Li, S Wang, S Jana, L Carin
arXiv preprint arXiv:2006.03089, 2020
472020
Are diffusion models vulnerable to membership inference attacks?
J Duan, F Kong, S Wang, X Shi, K Xu
ICML 2023, 2023
462023
Towards compact and robust deep neural networks
V Sehwag, S Wang, P Mittal, S Jana
arXiv preprint arXiv:1906.06110, 2019
362019
Learning Security Classifiers with Verified Global Robustness Properties
Y Chen, S Wang, Y Qin, X Liao, S Jana, D Wagner
CCS 2021, 2021
312021
Cost-Aware Robust Tree Ensembles for Security Applications
Y Chen, S Wang, W Jiang, A Cidon, S Jana
USENIX Security 2021, 2021
242021
ReCode: Robustness Evaluation of Code Generation Models
S Wang, Z Li, H Qian, C Yang, Z Wang, M Shang, V Kumar, S Tan, B Ray, ...
ACL 2023, 2022
20*2022
Shifting attention to relevance: Towards the uncertainty estimation of large language models
J Duan, H Cheng, S Wang, C Wang, A Zavalny, R Xu, B Kailkhura, K Xu
arXiv preprint arXiv:2307.01379, 2023
192023
A Branch and Bound Framework for Stronger Adversarial Attacks of ReLU Networks
H Zhang, S Wang, K Xu, Y Wang, S Jana, CJ Hsieh, Z Kolter
ICML 2022, 2022
192022
Towards practical lottery ticket hypothesis for adversarial training
B Li, S Wang, Y Jia, Y Lu, Z Zhong, L Carin, S Jana
arXiv preprint arXiv:2003.05733, 2020
142020
Enhancing gradient-based attacks with symbolic intervals
S Wang, Y Chen, A Abdou, S Jana
ICML Workshop on Security and Privacy of Machine Learning, 2019
112019
The system can't perform the operation now. Try again later.
Articles 1–20