no code implementations • 7 Nov 2023 • Jianan Yao, Ziqiao Zhou, Weiteng Chen, Weidong Cui
Formal verification can provably guarantee the correctness of critical system software, but the high proof burden has long hindered its wide adoption.
no code implementations • 13 Jul 2020 • Ivan Evtimov, Weidong Cui, Ece Kamar, Emre Kiciman, Tadayoshi Kohno, Jerry Li
Machine learning (ML) models deployed in many safety- and business-critical systems are vulnerable to exploitation through adversarial examples.