


default search action
Ziyang Li 0002
Person information
- affiliation: Johns Hopkins University, Baltimore, MD, USA
Other persons with the same name
- Ziyang Li — disambiguation page
- Ziyang Li 0001
— Nanjing University of Posts and Telecommunications, Nanjing, China - Ziyang Li 0003
— NICE XLab, XMU, Xiamen, China - Ziyang Li 0004
— Xinjiang University, Urumqi, China - Ziyang Li 0005
— Nanjing University, China - Ziyang Li 0006
— Northeastern University, Shenyang, Liaoning, China - Ziyang Li 0007
— Northeast Agricultural University, Harbin, Heilongjiang, China - Ziyang Li 0008
— Harbin Engineering University, Harbin, China - Ziyang Li 0009
— Hebei University of Technology, Tianjin, China - Ziyang Li 0010
— Xinjiang University, Ürümqi, Xinjiang, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[c13]Paul Biberstein, Ziyang Li, Joseph Devietti, Mayur Naik:
Lobster: A GPU-Accelerated Framework for Neurosymbolic Programming. ASPLOS (1) 2026: 147-162- 2025
[c12]Jiani Huang, Ziyang Li, Mayur Naik, Ser-Nam Lim:
LASER: A Neuro-Symbolic Framework for Learning Spatio-Temporal Scene Graphs with Weak Supervision. ICLR 2025
[c11]Ziyang Li, Saikat Dutta, Mayur Naik:
IRIS: LLM-Assisted Static Analysis for Detecting Security Vulnerabilities. ICLR 2025
[c10]Avishree Khare, Saikat Dutta
, Ziyang Li, Alaia Solko-Breslin
, Rajeev Alur, Mayur Naik:
Understanding the Effectiveness of Large Language Models in Detecting Security Vulnerabilities. ICST 2025: 103-114
[c9]Xi Zheng
, Ziyang Li
, Ivan Ruchkin
, Ruzica Piskac
, Miroslav Pajic
:
NeuroStrata: Harnessing Neuro-Symbolic Paradigms for Improved Testability and Verifiability of Autonomous CPS. SIGSOFT FSE Companion 2025: 566-570
[i12]Xi Zheng, Ziyang Li, Ivan Ruchkin, Ruzica Piskac, Miroslav Pajic:
NeuroStrata: Harnessing Neurosymbolic Paradigms for Improved Design, Testability, and Verifiability of Autonomous CPS. CoRR abs/2502.12267 (2025)
[i11]Paul Biberstein, Ziyang Li, Joseph Devietti, Mayur Naik:
Lobster: A GPU-Accelerated Framework for Neurosymbolic Programming. CoRR abs/2503.21937 (2025)
[i10]Jiani Huang, Amish Sethi
, Matthew Kuo, Mayank Keoliya, Neelay Velingker, JungHo Jung, Ser-Nam Lim, Ziyang Li, Mayur Naik:
ESCA: Contextualizing Embodied Agents via Scene-Graph Generation. CoRR abs/2510.15963 (2025)
[i9]Claire Wang, Ziyang Li, Saikat Dutta, Mayur Naik:
QLCoder: A Query Synthesizer For Static Analysis of Security Vulnerabilities. CoRR abs/2511.08462 (2025)- 2024
[j2]Ziyang Li, Jiani Huang, Jason Liu, Mayur Naik:
Neurosymbolic Programming in Scallop: Principles and Practice. Found. Trends Program. Lang. 8(2): 118-249 (2024)
[c8]Ziyang Li, Jiani Huang, Jason Liu
, Felix Zhu, Eric Zhao, William Dodds, Neelay Velingker, Rajeev Alur, Mayur Naik:
Relational Programming with Foundational Models. AAAI 2024: 10635-10644
[c7]Yinjun Wu, Mayank Keoliya, Kan Chen, Neelay Velingker, Ziyang Li, Emily J. Getzen, Qi Long, Mayur Naik, Ravi B. Parikh, Eric Wong:
DISCRET: Synthesizing Faithful Explanations For Treatment Effect Estimation. ICML 2024: 53597-53618
[c6]Alaia Solko-Breslin, Seewon Choi, Ziyang Li, Neelay Velingker, Rajeev Alur, Mayur Naik, Eric Wong:
Data-Efficient Learning with Neural Programs. NeurIPS 2024
[c5]Chang Zhu, Ziyang Li, Anton Xue, Ati Priya Bajaj, Wil Gibbs, Yibo Liu, Rajeev Alur, Tiffany Bao, Hanjun Dai, Adam Doupé, Mayur Naik, Yan Shoshitaishvili, Ruoyu Wang, Aravind Machiry:
TYGR: Type Inference on Stripped Binaries using Graph Neural Networks. USENIX Security Symposium 2024
[i8]Ziyang Li, Saikat Dutta
, Mayur Naik:
LLM-Assisted Static Analysis for Detecting Security Vulnerabilities. CoRR abs/2405.17238 (2024)
[i7]Yinjun Wu, Mayank Keoliya, Kan Chen, Neelay Velingker, Ziyang Li, Emily J. Getzen, Qi Long, Mayur Naik, Ravi B. Parikh, Eric Wong
:
DISCRET: Synthesizing Faithful Explanations For Treatment Effect Estimation. CoRR abs/2406.00611 (2024)
[i6]Alaia Solko-Breslin, Seewon Choi, Ziyang Li, Neelay Velingker, Rajeev Alur, Mayur Naik, Eric Wong
:
Data-Efficient Learning with Neural Programs. CoRR abs/2406.06246 (2024)
[i5]Ziyang Li, Jiani Huang, Jason Liu, Felix Zhu, Eric Zhao, William Dodds, Neelay Velingker, Rajeev Alur, Mayur Naik:
Relational Programming with Foundation Models. CoRR abs/2412.14515 (2024)- 2023
[j1]Ziyang Li
, Jiani Huang
, Mayur Naik
:
Scallop: A Language for Neurosymbolic Programming. Proc. ACM Program. Lang. 7(PLDI): 1463-1487 (2023)
[c4]Hanlin Zhang, Jiani Huang, Ziyang Li, Mayur Naik, Eric P. Xing:
Improved Logical Reasoning of Language Models via Differentiable Symbolic Programming. ACL (Findings) 2023: 3062-3077
[i4]Ziyang Li, Jiani Huang, Mayur Naik:
Scallop: A Language for Neurosymbolic Programming. CoRR abs/2304.04812 (2023)
[i3]Jiani Huang, Ziyang Li, David Jacobs, Mayur Naik, Ser-Nam Lim:
LASER: Neuro-Symbolic Learning of Semantic Video Representations. CoRR abs/2304.07647 (2023)
[i2]Hanlin Zhang, Jiani Huang, Ziyang Li, Mayur Naik, Eric P. Xing:
Improved Logical Reasoning of Language Models via Differentiable Symbolic Programming. CoRR abs/2305.03742 (2023)
[i1]Avishree Khare, Saikat Dutta, Ziyang Li, Alaia Solko-Breslin, Rajeev Alur, Mayur Naik:
Understanding the Effectiveness of Large Language Models in Detecting Security Vulnerabilities. CoRR abs/2311.16169 (2023)- 2021
[c3]Jiani Huang, Ziyang Li, Binghong Chen, Karan Samel, Mayur Naik, Le Song, Xujie Si:
Scallop: From Probabilistic Deductive Databases to Scalable Differentiable Reasoning. NeurIPS 2021: 25134-25145
[c2]Ziyang Li, Aravind Machiry, Binghong Chen, Mayur Naik, Ke Wang, Le Song:
ARBITRAR: User-Guided API Misuse Detection. SP 2021: 1400-1415- 2020
[c1]Elizabeth Dinella, Hanjun Dai, Ziyang Li, Mayur Naik, Le Song, Ke Wang:
Hoppity: Learning Graph Transformations to Detect and Fix Bugs in Programs. ICLR 2020
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-14 22:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







