Junfeng Yang

According to our database1, Junfeng Yang authored at least 90 papers between 2001 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
DeepXplore: Automated Whitebox Testing of Deep Learning Systems.
GetMobile, 2018

Plils: A Practical Indoor Localization System through Less Expensive Wireless Chips via Subregion Clustering.
Sensors, 2018

Directional gradients integration image for illumination insensitive face representation.
Mach. Vis. Appl., 2018

Efficient Formal Safety Analysis of Neural Networks.
CoRR, 2018

NEUZZ: Efficient Fuzzing with Neural Program Learning.
CoRR, 2018

Scalable Overload Control for Large-scale Microservice Architecture.
CoRR, 2018

Formal Security Analysis of Neural Networks using Symbolic Intervals.
CoRR, 2018

Transient Behavior Analysis of Offshore Wind Turbines During Lightning Strike to Multi-Blade.
IEEE Access, 2018

Formal Security Analysis of Neural Networks using Symbolic Intervals.
Proceedings of the 27th USENIX Security Symposium, 2018

AppFlow: using machine learning to synthesize robust, reusable UI tests.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Efficient Formal Safety Analysis of Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

OWL: Understanding and Detecting Concurrency Attacks.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Overload Control for Scaling WeChat Microservices.
Proceedings of the ACM Symposium on Cloud Computing, 2018

Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Partial Order Aware Concurrency Sampling.
Proceedings of the Computer Aided Verification - 30th International Conference, 2018

2017
An Efficient and Packing-Resilient Two-Phase Android Cloned Application Detection Approach.
Mobile Information Systems, 2017

Time and Energy Optimization Algorithms for the Static Scheduling of Multiple Workflows in Heterogeneous Computing System.
J. Grid Comput., 2017

Towards Practical Verification of Machine Learning: The Case of Computer Vision Systems.
CoRR, 2017

DeepXplore: Automated Whitebox Testing of Deep Learning Systems.
CoRR, 2017

FIRED: Frequent Inertial Resets with Diversification for Emerging Commodity Cyber-Physical Systems.
CoRR, 2017

DeepXplore: Automated Whitebox Testing of Deep Learning Systems.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

A variational method using Riemannian metric for SAR image segmentation.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

PanNet: A Deep Network Architecture for Pan-Sharpening.
Proceedings of the IEEE International Conference on Computer Vision, 2017

Promoting Citizen's Learning Experience in Smart Cities.
Proceedings of the Blended Learning. New Challenges and Innovative Practices, 2017

2016
Image decomposition-based structural similarity index for image quality assessment.
EURASIP J. Image and Video Processing, 2016

A partially parallel splitting method for multiple-block separable convex programming with applications to robust PCA.
Comp. Opt. and Appl., 2016

SUIDroid: An Efficient Hardening-Resilient Approach to Android App Clone Detection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Reducing crash recoverability to reachability.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

Shuffler: Fast and Deployable Continuous Code Re-Randomization.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

The Framework of Digital Learning Capacity for Digital Natives.
Proceedings of the 16th IEEE International Conference on Advanced Learning Technologies, 2016

Grandet: A Unified, Economical Object Store for Web Applications.
Proceedings of the Seventh ACM Symposium on Cloud Computing, 2016

2015
Making Lock-free Data Structures Verifiable with Artificial Transactions.
Operating Systems Review, 2015

A General Inertial Proximal Point Algorithm for Mixed Variational Inequality Problem.
SIAM Journal on Optimization, 2015

Inertial Proximal ADMM for Linearly Constrained Separable Convex Optimization.
SIAM J. Imaging Sciences, 2015

A Wavelet-Based Image Preprocessing Method or Illumination Insensitive Face Recognition.
J. Inf. Sci. Eng., 2015

Face recognition using local gradient binary count pattern.
J. Electronic Imaging, 2015

Automatic In-vivo Evolution of Kernel Policies for Better Performance.
CoRR, 2015

Secure Deduplication of General Computations.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Towards Making Systems Forget with Machine Unlearning.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Making lock-free data structures verifiable with artificial transactions.
Proceedings of the 8th Workshop on Programming Languages and Operating Systems, 2015

Paxos made transparent.
Proceedings of the 25th Symposium on Operating Systems Principles, 2015

Development and Use of a Questionnaire for Evaluating K-12 Smart Classroom.
Proceedings of the Hybrid Learning: Innovation in Educational Practices, 2015

KD-tree based clustering algorithm for fast face recognition on large-scale data.
Proceedings of the Seventh International Conference on Digital Image Processing, 2015

Android Malware Static Analysis Techniques.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

RepFrame: An Efficient and Transparent Framework for Dynamic Program Analysis.
Proceedings of the 6th Asia-Pacific Workshop on Systems, 2015

2014
Design of a Broadband Electrical Impedance Matching Network for Piezoelectric Ultrasound Transducers Based on a Genetic Algorithm.
Sensors, 2014

Inexact Alternating-Direction-Based Contraction Methods for Separable Linearly Constrained Convex Optimization.
J. Optimization Theory and Applications, 2014

Strategies for Smooth and Effective Cross-Cultural Online Collaborative Learning.
Educational Technology & Society, 2014

Making parallel programs reliable with stable multithreading.
Commun. ACM, 2014

A Method for Evaluating Technology-Rich Classroom Environment.
Proceedings of the Emerging Issues in Smart Learning, 2014

Efficiently, effectively detecting mobile app bugs with AppDoctor.
Proceedings of the Ninth Eurosys Conference 2014, 2014

2013
A Proximal Point Algorithm for Log-Determinant Optimization with Group Lasso Regularization.
SIAM Journal on Optimization, 2013

Linearized augmented Lagrangian and alternating direction methods for nuclear norm minimization.
Math. Comput., 2013

Optimizing Classroom Environment to Support Technology Enhanced Learning.
Proceedings of the Human-Computer Interaction and Knowledge Discovery in Complex, Unstructured, Big Data, 2013

The Concept of eTextbooks in K-12 Classes from the Perspective of Its Stakeholders.
Proceedings of the Human-Computer Interaction and Knowledge Discovery in Complex, Unstructured, Big Data, 2013

Parrot: a practical runtime for deterministic, stable, and reliable threads.
Proceedings of the ACM SIGOPS 24th Symposium on Operating Systems Principles, 2013

Effective dynamic detection of alias analysis errors.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Determinism Is Overrated: What Really Makes Multithreaded Programs Hard to Get Right and What Can Be Done About It.
Proceedings of the 5th USENIX Workshop on Hot Topics in Parallelism, 2013

Verifying systems rules using rule-directed symbolic execution.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2013

2012
Sound and precise analysis of parallel programs through schedule specialization.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2012

A Framework of Designing Learning Activities for Mobile Learning.
Proceedings of the Hybrid Learning - 5th International Conference, 2012

The MEERKATS Cloud Security Architecture.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Concurrency Attacks.
Proceedings of the 4th USENIX Workshop on Hot Topics in Parallelism, 2012

2011
Alternating Direction Algorithms for 1-Problems in Compressive Sensing.
SIAM J. Scientific Computing, 2011

Alternating Direction Method for Image Inpainting in Wavelet Domains.
SIAM J. Imaging Sciences, 2011

Context-based Online Configuration-Error Detection.
Proceedings of the 2011 USENIX Annual Technical Conference, 2011

Pervasive detection of process races in deployed systems.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

Practical software model checking via dynamic interface reduction.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

Efficient deterministic multithreading through schedule relaxation.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

Optimizing Data Partitioning for Data-Parallel Computing.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

The SPARCHS Project: Hardware Support for Software Security.
Proceedings of the First SysSec Workshop 2011, 2011

The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security.
Proceedings of the First SysSec Workshop 2011, 2011

2010
A Fast Alternating Direction Method for TVL1-L2 Signal Reconstruction From Partial Fourier Data.
J. Sel. Topics Signal Processing, 2010

Practical compressive sensing with Toeplitz and circulant matrices.
Proceedings of the Visual Communications and Image Processing 2010, 2010

Bypassing Races in Live Applications with Execution Filters.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

Stable Deterministic Multithreading through Schedule Memoization.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

Scalable and systematic detection of buggy inconsistencies in source code.
Proceedings of the 25th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2010

2009
Kinesis: A new approach to replica placement in distributed storage systems.
TOS, 2009

An Efficient TVL1 Algorithm for Deblurring Multichannel Images Corrupted by Impulsive Noise.
SIAM J. Scientific Computing, 2009

A Fast Algorithm for Edge-Preserving Variational Multichannel Image Restoration.
SIAM J. Imaging Sciences, 2009

MODIST: Transparent Model Checking of Unmodified Distributed Systems.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

A Game Analysis of the Mergers and Acquisitions of Foreign Capital Based on the Perspective of Industry Security.
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009

2008
A New Alternating Minimization Algorithm for Total Variation Image Reconstruction.
SIAM J. Imaging Sciences, 2008

2006
Using model checking to find serious file system errors.
ACM Trans. Comput. Syst., 2006

Automatically Generating Malicious Disks using Symbolic Execution.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

EXPLODE: A Lightweight, General System for Finding Serious Storage System Errors.
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), 2006

2004
Correlation exploitation in error ranking.
Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2004, Newport Beach, CA, USA, October 31, 2004

Using Model Checking to Find Serious File System Errors (Awarded Best Paper!).
Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004), 2004

2003
MECA: an extensible, expressive system and language for statically checking security properties.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2001
An Empirical Study of Operating System Errors.
Proceedings of the 18th ACM Symposium on Operating System Principles, 2001


  Loading...