AkshatKaushik_2020-05-29_WebSVF-InteractiveCodeAnalysis.pptx
Baodi_2019-02-05_Uncovering.PPTX
Baodi_2019-05-02_malware.PPTX
Baodi_2019-08-30_Bankbot.pptx
Dinghua_20200207_CPSFault.pptx
FengXU_2022-12-16_Analysis and Verification of Open-Source AI Systems.pptx
Gadi basic user manual-Chinese.pptx
Guanqin-2020-04-03_Reasoning_tools_using_LLVM_Z3.pptx
GuanqinZHANG_2022-5-20_VerificationNN.pdf
GuanqinZHANG_2022-7-29_DNN Robustness study.pdf
GuanqinZHANG_2022_10_21_understanding_the_Robustness_of_Unlearning_models.pdf
GuanqinZHANG_2023-04-30_DNNRobustness_PhD_CA1.pdf
GuanqinZHANG_2023-12_1_DNNRobustness_verification_BNB.pdf
GuanqinZHANG_2024-8_1_OOPSLA2025_Efficient_Incremental_Verification_of_Neural_Network_Guided_by_Counterexample_Potentiality.pdf
Gurparteek Singh - CA 1 20211027.pptx
GurparteekSingh_20200724_AdversairalAttacks.pptx
GurparteekSingh_20200821_AdversairalAttacks.pptx
GurparteekSngh_2021-May-07_NLPIntroduction.pptx
GurparteekSngh_2022-03-03_NLP.pptx
Henry_Hua_20200418-code-clone-detection.pptx
Hongxu Chen-2020_10_16_Learning Heterogeneous Information Networks for Link Prediction.pdf
HsuMyatWin-20210806-Fairness.pptx
HuaZuo_2019-10-25-Transfer_learning.pptx
JiankunSun_2022-June-17_Towards Robust Malware Classification Using a Hybrid Convolutional Framework.pptx
Jiawei_2021-07-02_Intro_QC.pptx
Jiawei_2023-10-20_Symbolic_Abstraction.pdf
Jiawei_2024-05-03_review.pptx
JinglingSun_20210910.pptx
JinglingSun_20211126.pptx
Kaijie_2024-01-12_Robustness Certification of Neural Network Based.pdf
Kaijie_Liu_31_Jul_SVFNN__Safety_and_Robustness_Certification_of_Neural_Networks_with_SVF.pdf
Mengxi_2020-0515-Explainable K-limiting Relational Adversarial Attack.pdf
Mingshan-19-03-29-Sparse IFDS.pptx
Mingshan-19-06-07-HOPE.pptx
Mohamad_2019-02-08_TBAA.pptx
Mohamad_2021_Oct_15_compacting-points-to-sets-through-object-clustering.pdf
Mohamad_2021_Oct_15_hash-consed-points-to-sets.pdf
Nengkun_2021-04-09_Introduction to quantum Hoare logics.pptx
PeiXu_2022-April-21_Incremental&ParallelPTA.pptx
PeiXu_2022-Dec-2_ReduceTransitiveRedundancyinCFLReachability.pptx
PeiXu_2022-July-1_CFLonSVF&C++FieldSensitiveAliasAnalyze.pptx
PeiXu_2023-April-18_CA1_OnlineCycleEliminationForContextFreeLanguageReachability.pptx
Ruijun_2023-11-17_Attack_CLM.pptx
Ruijun_2024-05-10_Ensuring correctness of code generation through intermediate representation reasoningle.pdf
Ruijun_2024-07-03_Pre-training and fine-tuning llm.pdf
Shuangxiang Kan_2022-04-01_Construction of summary-based call graph in different application scenarios.pptx
Shuangxiang Kan_2022-08-12_Computing Specifications for Missing Code.pptx
Shuangxiang Kan_2023-9-4_AnnualReviewUNSW.pptx
Shuangxiang Kan_2024-5-3_AnnualReview.pptx
Thazin Aung 2020_09_04_CA1_Presentation.pptx
Thazin Aung_2019_07_19.pptx
ThazinAung_2019-11-08_Recommending Assignee_Label for Github Issue through Deep Neural Networks.pptx
ThazinAung_2020-02-21_Issue Report and source code through deep neural networks.pptx
Thazin_Aung_2019-08-16_Interactive Traceability Links Visualization using Hierarchical Trace Map.pptx
Thazin_Aung_29_05_2020_SLR.pptx
TianyangGuan_2020-11-27_IntegratedCodeanalysisPlatformbasedOnSVF.key
TuoLi_20240911_LRMiner_Security24.pptx
VishalUniyal_2021_12_10_ASurveyonAttackMethodsonMachineLearningModelsToIncreaseTheEfficiencyInTheDetectionOfFakeNews.pptx
VishalUniyal_2022-02-18_AdversarialPropagationDetectionOfFakeNewsOnSocial.pptx
Weekly Report Update Template.pptx
Weigang_20240216_Testing_Static_Ananlyzer.pptx
Weigang_20240510_Strengthen_security_through_assertion_enabled_code_generation.pptx
WritingResearchPapers--Tom Reps.pptx
Xiao-2021-06-18-PathSensitiveSparseAnalysis.pptx
Xiao-2022.6.3-ISSTA22.pdf
Xiao_2022.11.18_An Introduction to Abstract Interpretation.pptx
Xiao_2024-06-19_Fast Graph Simplification for Path-Sensitive Typestate Analysis.pdf
Yanxin - 2019.08.30 - Effects of code obfuscation and deobfuscation .pptx
Yanxin Zhang_2020_09_18-A Survey of Android Malware Detection Using Machine Learning.pptx
Yanxin-2019-04-26 - A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android Apps and Anti-Malware Products.pptx
Yao Wan-2020-03-20-deepcode-uts.pptx
Yuangang-2019-11-19-Fast_robust_rank_aggregation.pdf
Yuhao-20210820-Android.pptx
Yuhao-20210924-GamblingApps.pptx
Yuhao-20211112-MaliciousRegistration.pdf
YuhaoGao_2022-09-09_RegistrationBots.pptx
YuhaoGao_2022-11-04_AndroidCross-languageAnalysisBasedOnCaller-SensitiveSpecification.pptx
Yuxiang_2019_10_9_SAS19.pptx
Yuxiang_2022-11-30_OOPSLA22Report.pptx
Zexin+Zhong_2022-03-18_Taint+Analysis+For+Microservices.pdf
cheat sheet for group meeting.pptx
fengxu_2023_07_28_NNVerificationSurvey.pdf
guanqin_zhang_2020-06-12_symbolic execution using in z3.pptx
View raw (Sorry about that, but we can’t show files that are this big right now.)
You can’t perform that action at this time.