Property inference attacks on fully connected neural networks using permutation invariant representations K Ganju, Q Wang, W Yang, CA Gunter, N Borisov Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 566 | 2018 |
Detecting ai trojans using meta neural analysis X Xu, Q Wang, H Li, N Borisov, CA Gunter, B Li 2021 IEEE Symposium on Security and Privacy (SP), 103-120, 2021 | 346 | 2021 |
Fear and logging in the internet of things Q Wang, WU Hassan, A Bates, C Gunter Network and Distributed Systems Symposium, 2018 | 272 | 2018 |
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ... NDSS, 2020 | 210 | 2020 |
Charting the attack surface of trigger-action IoT platforms Q Wang, P Datta, W Yang, S Liu, A Bates, CA Gunter Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 188 | 2019 |
Cross-app poisoning in software-defined networking BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ... Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 63 | 2018 |
Automatic analysis of consistency properties of distributed transaction systems in Maude S Liu, PC Ölveczky, M Zhang, Q Wang, J Meseguer Tools and Algorithms for the Construction and Analysis of Systems: 25th …, 2019 | 21 | 2019 |
Read atomic transactions with prevention of lost updates: ROLA and its formal analysis S Liu, PC Ölveczky, Q Wang, I Gupta, J Meseguer Formal Aspects of Computing 31, 503-540, 2019 | 20 | 2019 |
ROLA: A New Distributed Transaction Protocol and Its Formal Analysis. S Liu, PC Ölveczky, K Santhanam, Q Wang, I Gupta, J Meseguer FASE, 77-93, 2018 | 18 | 2018 |
Formal modeling and analysis of the Walter transactional data store S Liu, PC Ölveczky, Q Wang, J Meseguer Rewriting Logic and Its Applications: 12th International Workshop, WRLA 2018 …, 2018 | 16 | 2018 |
Generating correct-by-construction distributed implementations from formal Maude designs S Liu, A Sandur, J Meseguer, PC Ölveczky, Q Wang NASA Formal Methods: 12th International Symposium, NFM 2020, Moffett Field …, 2020 | 14 | 2020 |
Extracting URLs from JavaScript via program analysis Q Wang, J Zhou, Y Chen, Y Zhang, J Zhao Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013 | 12 | 2013 |
Graph learning for interactive threat detection in heterogeneous smart home rule data G Wang, N Ivanov, B Chen, Q Wang, TV Nguyen, Q Yan Proceedings of the ACM on Management of Data 1 (1), 1-27, 2023 | 11 | 2023 |
Towards systematic parallel programming of graph problems via tree decomposition and tree parallelism Q Wang, M Chen, Y Liu, Z Hu Proceedings of the 2nd ACM SIGPLAN workshop on Functional high-performance …, 2013 | 5 | 2013 |
Provenance tracing in the internet of things Q Wang, WU Hassan, A Bates, C Gunter Proceedings of the 9th USENIX Conference on Theory and Practice of …, 2017 | 3 | 2017 |
Automatic transformation of formal maude designs into correct-by-construction distributed implementations S Liu, A Sandur, J Meseguer, PC Olveczky, Q Wang Technical report, 2019 | 2 | 2019 |
A New Distributed Transaction Protocol and Its Formal Analysis in Maude S Liu, PC Olveczky, K Santhanam, Q Wang, I Gupta, J Meseguer | 1 | 2018 |
ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security K Mukherjee, J Wiedemeier, Q Wang, J Kamimura, JJ Rhee, J Wei, Z Li, ... International Conference on Applied Cryptography and Network Security, 241-268, 2024 | | 2024 |