Westgate E213
Date | Speaker | Title | Links |
---|---|---|---|
1.11 | Jingquan Zhang | Fuzzing File Systems via Two-Dimensional Input Space Exploration | |
1.18 | Rupesh Prajapati | Long Text Generation via Adversarial Training with Leaked Information | |
1.25 | Xiangkun Jia | Research summary of program analysis and vulnerability analysis | |
2.1 | Yu Fu | VeriMAP: A Tool for Verifying Programs through Transformations | |
2.8 | Xiaoting Li | Robust Physical-World Attacks on Deep Learning Visual Classification | |
2.15 | Zihao Wang | Evaluating Fuzz Testing | |
2.22 | Yuyan Bao | Reasoning About Frame Properties in Object-Oriented Programs | |
3.1 | Xiangkun Jia | Sharing works in NDSS 2019 | |
3.9 | Spring Break | ||
3.15 | Li Wang | Research Practice Based on Symbolic Execution & Semantics Equivalence | |
3.22 | Yuyan Bao | Making Software More Reliable By Using Formal Methods | |
3.29 | Zihao Wang | KATE:K-Competitive Autoencoder for Text | |
4.5 | Robert Brotzman | CaSym: Cache Aware Symbolic Execution for Side Channel Detection and Mitigation | |
4.12 | Precise and Accurate Patch Test for Binaries | ||
4.19 | SABRE: Protecting Bitcoin against Routing Attacks | ||
4.26 | Zihao Wang | Dtat-Based Marketing Strategy Optimization for Car-Hailing Platforms | |
5.24 | Zihao Wang | LLVM-Based Program Analysis | 5.31 | Xiangkun Jia | Improve fuzzing with ml | 6.7 | Yuyan Bao | Blockchain security | 7.12 | Xiangkun Jia | AFL and improvement | 7.19 | Yu Fu | Prolog and related research | 7.26 | Li Wang | N-gram binary code similarity analysis | 8.2 | Zihao Wang | Machine Learning Featured Program Analysis |