Shiwei Feng

Orcid: 0000-0001-6959-4327

Affiliations:
  • Purdue University, Department of Computer Science, West Lafayette, IN, USA
  • Nanjing University, National Key Lab for Novel Software Technology, Nanjing, China (former)


According to our database1, Shiwei Feng authored at least 19 papers between 2020 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Position: Intelligent Coding Systems Should Write Programs with Justifications.
CoRR, August, 2025

IntenTest: Stress Testing for Intent Integrity in API-Calling LLM Agents.
CoRR, June, 2025

An LLM Agent for Functional Bug Detection in Network Protocols.
CoRR, June, 2025

ROSCallBaX: Statically Detecting Inconsistencies in Callback Function Setup of Robotic Systems.
Proc. ACM Softw. Eng., 2025

Unleashing the Power of Generative Model in Recovering Variable Names from Stripped Binary.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

2024
DIGIMON: Diagnosis and Mitigation of Sampling Skew for Reinforcement Learning based Meta-Planner in Robot Navigation.
CoRR, 2024

Distribution Preserving Backdoor Attack in Self-supervised Learning.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024

BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Fusion Is Not Enough: Single Modal Attacks on Fusion Models for 3D Object Detection.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Lotus: Evasive and Resilient Backdoor Attacks through Sub-Partitioning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
LmPa: Improving Decompilation by Synergy of Large Language Model and Program Analysis.
CoRR, 2023

Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving.
CoRR, 2023

PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Detecting Backdoors in Pre-trained Encoders.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2020
Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020


  Loading...