Folgen
Qi Wang
Titel
Zitiert von
Zitiert von
Jahr
Property inference attacks on fully connected neural networks using permutation invariant representations
K Ganju, Q Wang, W Yang, CA Gunter, N Borisov
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
5662018
Detecting ai trojans using meta neural analysis
X Xu, Q Wang, H Li, N Borisov, CA Gunter, B Li
2021 IEEE Symposium on Security and Privacy (SP), 103-120, 2021
3462021
Fear and logging in the internet of things
Q Wang, WU Hassan, A Bates, C Gunter
Network and Distributed Systems Symposium, 2018
2722018
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ...
NDSS, 2020
2102020
Charting the attack surface of trigger-action IoT platforms
Q Wang, P Datta, W Yang, S Liu, A Bates, CA Gunter
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1882019
Cross-app poisoning in software-defined networking
BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
632018
Automatic analysis of consistency properties of distributed transaction systems in Maude
S Liu, PC Ölveczky, M Zhang, Q Wang, J Meseguer
Tools and Algorithms for the Construction and Analysis of Systems: 25th …, 2019
212019
Read atomic transactions with prevention of lost updates: ROLA and its formal analysis
S Liu, PC Ölveczky, Q Wang, I Gupta, J Meseguer
Formal Aspects of Computing 31, 503-540, 2019
202019
ROLA: A New Distributed Transaction Protocol and Its Formal Analysis.
S Liu, PC Ölveczky, K Santhanam, Q Wang, I Gupta, J Meseguer
FASE, 77-93, 2018
182018
Formal modeling and analysis of the Walter transactional data store
S Liu, PC Ölveczky, Q Wang, J Meseguer
Rewriting Logic and Its Applications: 12th International Workshop, WRLA 2018 …, 2018
162018
Generating correct-by-construction distributed implementations from formal Maude designs
S Liu, A Sandur, J Meseguer, PC Ölveczky, Q Wang
NASA Formal Methods: 12th International Symposium, NFM 2020, Moffett Field …, 2020
142020
Extracting URLs from JavaScript via program analysis
Q Wang, J Zhou, Y Chen, Y Zhang, J Zhao
Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013
122013
Graph learning for interactive threat detection in heterogeneous smart home rule data
G Wang, N Ivanov, B Chen, Q Wang, TV Nguyen, Q Yan
Proceedings of the ACM on Management of Data 1 (1), 1-27, 2023
112023
Towards systematic parallel programming of graph problems via tree decomposition and tree parallelism
Q Wang, M Chen, Y Liu, Z Hu
Proceedings of the 2nd ACM SIGPLAN workshop on Functional high-performance …, 2013
52013
Provenance tracing in the internet of things
Q Wang, WU Hassan, A Bates, C Gunter
Proceedings of the 9th USENIX Conference on Theory and Practice of …, 2017
32017
Automatic transformation of formal maude designs into correct-by-construction distributed implementations
S Liu, A Sandur, J Meseguer, PC Olveczky, Q Wang
Technical report, 2019
22019
A New Distributed Transaction Protocol and Its Formal Analysis in Maude
S Liu, PC Olveczky, K Santhanam, Q Wang, I Gupta, J Meseguer
12018
ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security
K Mukherjee, J Wiedemeier, Q Wang, J Kamimura, JJ Rhee, J Wei, Z Li, ...
International Conference on Applied Cryptography and Network Security, 241-268, 2024
2024
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–18