Search Results for author: Yuyi Zhong

Found 3 papers, 1 papers with code

Expediting Neural Network Verification via Network Reduction

no code implementations7 Aug 2023 Yuyi Zhong, Ruiwei Wang, Siau-Cheng Khoo

Furthermore, the experiment results also show that network reduction can improve the availability of existing verification tools on many networks by reducing them into sequential neural networks.

ExploreADV: Towards exploratory attack for Neural Networks

no code implementations1 Jan 2023 Tianzuo Luo, Yuyi Zhong, Siaucheng Khoo

Although deep learning has made remarkable progress in processing various types of data such as images, text and speech, they are known to be susceptible to adversarial perturbations: perturbations specifically designed and added to the input to make the target model produce erroneous output.

Adversarial Attack

VulDeePecker: A Deep Learning-Based System for Vulnerability Detection

4 code implementations5 Jan 2018 Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong

Since deep learning is motivated to deal with problems that are very different from the problem of vulnerability detection, we need some guiding principles for applying deep learning to vulnerability detection.

Vulnerability Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.