Juan Zhai

According to our database1, Juan Zhai authored at least 37 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Machine Translation Testing via Syntactic Tree Pruning.
CoRR, 2024

DREAM: Debugging and Repairing AutoML Pipelines.
CoRR, 2024

2023
Machine Learning for Actionable Warning Identification: A Comprehensive Survey.
CoRR, 2023

A Critical Review of Large Language Model on Software Engineering: An Example from ChatGPT and Automated Program Repair.
CoRR, 2023

AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts.
Proceedings of the 32nd USENIX Security Symposium, 2023

The Case for Learned Provenance Graph Storage Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

CILIATE: Towards Fairer Class-Based Incremental Learning by Dataset and Training Refinement.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

UNICORN: A Unified Backdoor Trigger Inversion Framework.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

2022
Neural Network Trojans Analysis and Mitigation from the Input Domain.
CoRR, 2022

Rethinking the Reverse-engineering of Trojan Triggers.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Training with More Confidence: Mitigating Injected and Natural Backdoors During Training.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Fairneuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning.
Proceedings of the 30th USENIX Security Symposium, 2021

AUTOTRAINER: An Automatic DNN Training Problem Detection and Repair System.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

2020
Effective testing of Android apps using extended IFML models.
J. Syst. Softw., 2020

C2S: translating natural language comments to formal program specifications.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Correlations between deep neural network model coverage criteria and model quality.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

FineLock: automatically refactoring coarse-grained locks into fine-grained locks.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

CPC: automatically classifying and propagating natural language comments via program analysis.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Automated Generation of LTL Specifications For Smart Home IoT Using Natural Language.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

2019
Preference-wise testing for Android applications.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Extracting Mapping Relations for Mobile User Interface Transformation.
Proceedings of the Internetware '19: The 11th Asia-Pacific Symposium on Internetware, 2019

2018
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Trojaning Attack on Neural Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Dual-force: understanding WebView malware via cross-language forced execution.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

2017
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning.
Proceedings of the 26th USENIX Security Symposium, 2017

LAMP: data provenance for graph based machine learning algorithms through derivative computation.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Are Your Classes Well-Encapsulated? Encapsulation Analysis for Java.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

A Framework for Array Invariants Synthesis in Induction-Loop Programs.
Proceedings of the 24th Asia-Pacific Software Engineering Conference, 2017

2016
Precondition Calculation for Loops Iterating over Data Structures.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

Automatic Invariant Synthesis for Arrays in Simple Programs.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

Automatic model generation from documentation for Java API functions.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
Assertion-Directed Precondition Synthesis for Loops over Data Structures.
Proceedings of the Dependable Software Engineering: Theories, Tools, and Applications, 2015

Node-Set Analysis for Linked Recursive Data Structures.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

Analyzing Inductively Defined Properties for Recursive Data Structures.
Proceedings of the 7th Asia-Pacific Symposium on Internetware, 2015

2014
Post-condition-Directed Invariant Inference for Loops over Data Structures.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014


  Loading...