no code implementations • 7 Aug 2023 • Yuyi Zhong, Ruiwei Wang, Siau-Cheng Khoo
Furthermore, the experiment results also show that network reduction can improve the availability of existing verification tools on many networks by reducing them into sequential neural networks.
no code implementations • 1 Jan 2023 • Tianzuo Luo, Yuyi Zhong, Siaucheng Khoo
Although deep learning has made remarkable progress in processing various types of data such as images, text and speech, they are known to be susceptible to adversarial perturbations: perturbations specifically designed and added to the input to make the target model produce erroneous output.
4 code implementations • 5 Jan 2018 • Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong
Since deep learning is motivated to deal with problems that are very different from the problem of vulnerability detection, we need some guiding principles for applying deep learning to vulnerability detection.