Search

Your search keyword '"Dong, Jin Song"' showing total 37 results

Search Constraints

Start Over You searched for: Author "Dong, Jin Song" Remove constraint Author: "Dong, Jin Song" Database OAIster Remove constraint Database: OAIster
37 results on '"Dong, Jin Song"'

Search Results

1. Towards Transferable Attacks Against Vision-LLMs in Autonomous Driving with Typography

2. Exploring the Evolution of Hidden Activations with Live-Update Visualization

3. PAODING: A High-fidelity Data-free Pruning Toolkit for Debloating Pre-trained Neural Networks

4. Empirical Study on Transformer-based Techniques for Software Engineering

5. Supervised Robustness-preserving Data-free Neural Network Pruning

6. A Prompting-based Approach for Adversarial Example Generation and Robustness Enhancement

7. Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective

8. Geometric Theory for Program Testing

9. Repairing Adversarial Texts through Perturbation

10. DeepVisualInsight: Time-Travelling Visualization for Spatio-Temporal Causality of Deep Classification Training

11. Generalizing Neural Networks by Reflecting Deviating Data in Production

12. RegMiner: Towards Constructing a Large Regression Dataset from Code Evolution History

13. Automatic Fairness Testing of Neural Classifiers through Adversarial Sampling

14. Extracting Optimal Explanations for Ensemble Trees via Logical Reasoning

15. Self-Checking Deep Neural Networks in Deployment

16. N-PAT: A Nested Model-Checker

17. Automated synthesis of local time requirement for service composition

18. There is Limited Correlation between Coverage and Robustness for Deep Neural Networks

19. GRAVITAS: A Model Checking Based Planning and Goal Reasoning Framework for Autonomous Systems

20. Silas: High Performance, Explainable and Verifiable Machine Learning

21. Towards Interpreting Recurrent Neural Networks through Probabilistic Abstraction

22. A formalisation of the SPARC TSO memory model for multi-core machine code

33. Formalizing and verifying stochastic system architectures using Monterey Phoenix

34. Stateful Security Protocol Verification

35. Using Monterey Phoenix to Formalize and Verify System Architectures

36. Timed Automata Patterns

37. A Refinement Tool for Z

Catalog

Books, media, physical & digital resources