


Остановите войну!
for scientists:


default search action
Juan Zhai
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i6]Zhenting Wang, Kai Mei, Juan Zhai, Shiqing Ma:
UNICORN: A Unified Backdoor Trigger Inversion Framework. CoRR abs/2304.02786 (2023) - [i5]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Shiwei Wang:
CILIATE: Towards Fairer Class-based Incremental Learning by Dataset and Training Refinement. CoRR abs/2304.04222 (2023) - 2022
- [c27]Zhenting Wang, Juan Zhai, Shiqing Ma:
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning. CVPR 2022: 15054-15063 - [c26]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen
, Qian Wang:
Fairneuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons. ICSE 2022: 921-933 - [c25]Zhenting Wang, Hailun Ding, Juan Zhai, Shiqing Ma:
Training with More Confidence: Mitigating Injected and Natural Backdoors During Training. NeurIPS 2022 - [c24]Zhenting Wang, Kai Mei, Hailun Ding, Juan Zhai, Shiqing Ma:
Rethinking the Reverse-engineering of Trojan Triggers. NeurIPS 2022 - [i4]Zhenting Wang, Hailun Ding, Juan Zhai, Shiqing Ma:
Neural Network Trojans Analysis and Mitigation from the Input Domain. CoRR abs/2202.06382 (2022) - [i3]Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Qian Wang:
FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons. CoRR abs/2204.02567 (2022) - [i2]Zhenting Wang, Juan Zhai, Shiqing Ma:
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning. CoRR abs/2205.13383 (2022) - [i1]Zhenting Wang, Kai Mei, Hailun Ding, Juan Zhai, Shiqing Ma:
Rethinking the Reverse-engineering of Trojan Triggers. CoRR abs/2210.15127 (2022) - 2021
- [c23]Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Chao Shen:
AUTOTRAINER: An Automatic DNN Training Problem Detection and Repair System. ICSE 2021: 359-371 - [c22]Hailun Ding, Shenao Yan, Juan Zhai, Shiqing Ma:
ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning. USENIX Security Symposium 2021: 3023-3040 - 2020
- [j1]Minxue Pan, Yifei Lu, Yu Pei
, Tian Zhang, Juan Zhai, Xuandong Li:
Effective testing of Android apps using extended IFML models. J. Syst. Softw. 159 (2020) - [c21]Shiyu Zhang, Juan Zhai, Lei Bu, Mingsong Chen, Linzhang Wang, Xuandong Li:
Automated Generation of LTL Specifications For Smart Home IoT Using Natural Language. DATE 2020: 622-625 - [c20]Juan Zhai, Xiangzhe Xu, Yu Shi, Guanhong Tao, Minxue Pan, Shiqing Ma, Lei Xu, Weifeng Zhang, Lin Tan, Xiangyu Zhang:
CPC: automatically classifying and propagating natural language comments via program analysis. ICSE 2020: 1359-1371 - [c19]Yang Zhang, Shuai Shao, Juan Zhai, Shiqing Ma:
FineLock: automatically refactoring coarse-grained locks into fine-grained locks. ISSTA 2020: 565-568 - [c18]Juan Zhai, Yu Shi, Minxue Pan, Guian Zhou, Yongxiang Liu, Chunrong Fang
, Shiqing Ma, Lin Tan, Xiangyu Zhang:
C2S: translating natural language comments to formal program specifications. ESEC/SIGSOFT FSE 2020: 25-37 - [c17]Shenao Yan, Guanhong Tao, Xuwei Liu, Juan Zhai, Shiqing Ma, Lei Xu, Xiangyu Zhang:
Correlations between deep neural network model coverage criteria and model quality. ESEC/SIGSOFT FSE 2020: 775-787
2010 – 2019
- 2019
- [c16]Ruihua Ji, Junyu Pei, Wenhua Yang, Juan Zhai, Minxue Pan, Tian Zhang:
Extracting Mapping Relations for Mobile User Interface Transformation. Internetware 2019: 2:1-2:10 - [c15]Yifei Lu, Minxue Pan, Juan Zhai, Tian Zhang, Xuandong Li:
Preference-wise testing for Android applications. ESEC/SIGSOFT FSE 2019: 268-278 - 2018
- [c14]Zhenhao Tang, Juan Zhai, Minxue Pan, Yousra Aafer, Shiqing Ma, Xiangyu Zhang, Jianhua Zhao:
Dual-force: understanding WebView malware via cross-language forced execution. ASE 2018: 714-725 - [c13]Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, Xiangyu Zhang:
Trojaning Attack on Neural Networks. NDSS 2018 - [c12]Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee, Xiangyu Zhang, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, Somesh Jha:
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking. USENIX Annual Technical Conference 2018: 241-254 - 2017
- [c11]Bin Li, Juan Zhai, Zhenhao Tang, Enyi Tang, Jianhua Zhao:
A Framework for Array Invariants Synthesis in Induction-Loop Programs. APSEC 2017: 21-30 - [c10]Zhenhao Tang, Juan Zhai, Bin Li, Jianhua Zhao:
Are Your Classes Well-Encapsulated? Encapsulation Analysis for Java. QRS 2017: 208-215 - [c9]Shiqing Ma, Yousra Aafer, Zhaogui Xu, Wen-Chuan Lee, Juan Zhai, Yingqi Liu, Xiangyu Zhang:
LAMP: data provenance for graph based machine learning algorithms through derivative computation. ESEC/SIGSOFT FSE 2017: 786-797 - [c8]Shiqing Ma, Juan Zhai, Fei Wang, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning. USENIX Security Symposium 2017: 1111-1128 - 2016
- [c7]Juan Zhai, Jianjun Huang, Shiqing Ma, Xiangyu Zhang, Lin Tan, Jianhua Zhao, Feng Qin:
Automatic model generation from documentation for Java API functions. ICSE 2016: 380-391 - [c6]Bin Li, Zhenhao Tang, Juan Zhai, Jianhua Zhao:
Automatic Invariant Synthesis for Arrays in Simple Programs. QRS 2016: 108-119 - [c5]Juan Zhai, Bin Li, Zhenhao Tang, Jianhua Zhao, Xuandong Li:
Precondition Calculation for Loops Iterating over Data Structures. QRS 2016: 132-143 - 2015
- [c4]Zhenhao Tang, Hanfei Wang, Bin Li, Juan Zhai, Jianhua Zhao, Xuandong Li:
Analyzing Inductively Defined Properties for Recursive Data Structures. Internetware 2015: 221-228 - [c3]Zhenhao Tang, Hanfei Wang, Bin Li, Juan Zhai, Jianhua Zhao, Xuandong Li:
Node-Set Analysis for Linked Recursive Data Structures. QRS 2015: 59-64 - [c2]Juan Zhai, Hanfei Wang, Jianhua Zhao:
Assertion-Directed Precondition Synthesis for Loops over Data Structures. SETTA 2015: 258-274 - 2014
- [c1]Juan Zhai, Hanfei Wang, Jianhua Zhao:
Post-condition-Directed Invariant Inference for Loops over Data Structures. SERE (Companion) 2014: 204-212
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-05-12 20:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint