default search action
Suman Jana
Person information
- affiliation: Columbia University, New York, NY, USA
- affiliation: University of Texas at Austin, TX, USA
- affiliation: University of Utah, Salt Lake City, UT, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Gabriel Ryan, Burcu Cetin, Yongwhan Lim, Suman Jana:
Accurate Data Race Prediction in the Linux Kernel through Sparse Fourier Learning. Proc. ACM Program. Lang. 8(OOPSLA1): 810-832 (2024) - [c61]Dongdong She, Adam Storek, Yuchong Xie, Seoyoung Kweon, Prashast Srivastava, Suman Jana:
FOX: Coverage-guided Fuzzing as Online Stochastic Control. CCS 2024: 765-779 - [c60]Marcus J. Min, Yangruibo Ding, Luca Buratti, Saurabh Pujar, Gail E. Kaiser, Suman Jana, Baishakhi Ray:
Beyond Accuracy: Evaluating Self-Consistency of Code Large Language Models with IdentityChain. ICLR 2024 - [c59]Yue Huang, Lichao Sun, Haoran Wang, Siyuan Wu, Qihui Zhang, Yuan Li, Chujie Gao, Yixin Huang, Wenhan Lyu, Yixuan Zhang, Xiner Li, Hanchi Sun, Zhengliang Liu, Yixin Liu, Yijue Wang, Zhikun Zhang, Bertie Vidgen, Bhavya Kailkhura, Caiming Xiong, Chaowei Xiao, Chunyuan Li, Eric P. Xing, Furong Huang, Hao Liu, Heng Ji, Hongyi Wang, Huan Zhang, Huaxiu Yao, Manolis Kellis, Marinka Zitnik, Meng Jiang, Mohit Bansal, James Zou, Jian Pei, Jian Liu, Jianfeng Gao, Jiawei Han, Jieyu Zhao, Jiliang Tang, Jindong Wang, Joaquin Vanschoren, John C. Mitchell, Kai Shu, Kaidi Xu, Kai-Wei Chang, Lifang He, Lifu Huang, Michael Backes, Neil Zhenqiang Gong, Philip S. Yu, Pin-Yu Chen, Quanquan Gu, Ran Xu, Rex Ying, Shuiwang Ji, Suman Jana, Tianlong Chen, Tianming Liu, Tianyi Zhou, William Wang, Xiang Li, Xiangliang Zhang, Xiao Wang, Xing Xie, Xun Chen, Xuyu Wang, Yan Liu, Yanfang Ye, Yinzhi Cao, Yong Chen, Yue Zhao:
Position: TrustLLM: Trustworthiness in Large Language Models. ICML 2024 - [c58]Kexin Pei, Weichen Li, Qirui Jin, Shuyang Liu, Scott Geng, Lorenzo Cavallaro, Junfeng Yang, Suman Jana:
Exploiting Code Symmetries for Learning Program Semantics. ICML 2024 - [c57]Dongdong She, Adam Storek, Yuchong Xie, Seoyoung Kweon, Prashast Srivastava, Suman Jana:
FOX: Coverage-guided Fuzzing as Online Stochastic Control. SBFT@ICSE 2024: 57-58 - [c56]Chong Xiang, Tong Wu, Sihui Dai, Jonathan Petit, Suman Jana, Prateek Mittal:
PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses. USENIX Security Symposium 2024 - [i44]Lichao Sun, Yue Huang, Haoran Wang, Siyuan Wu, Qihui Zhang, Chujie Gao, Yixin Huang, Wenhan Lyu, Yixuan Zhang, Xiner Li, Zhengliang Liu, Yixin Liu, Yijue Wang, Zhikun Zhang, Bhavya Kailkhura, Caiming Xiong, Chaowei Xiao, Chunyuan Li, Eric P. Xing, Furong Huang, Hao Liu, Heng Ji, Hongyi Wang, Huan Zhang, Huaxiu Yao, Manolis Kellis, Marinka Zitnik, Meng Jiang, Mohit Bansal, James Zou, Jian Pei, Jian Liu, Jianfeng Gao, Jiawei Han, Jieyu Zhao, Jiliang Tang, Jindong Wang, John C. Mitchell, Kai Shu, Kaidi Xu, Kai-Wei Chang, Lifang He, Lifu Huang, Michael Backes, Neil Zhenqiang Gong, Philip S. Yu, Pin-Yu Chen, Quanquan Gu, Ran Xu, Rex Ying, Shuiwang Ji, Suman Jana, Tianlong Chen, Tianming Liu, Tianyi Zhou, William Wang, Xiang Li, Xiangliang Zhang, Xiao Wang, Xing Xie, Xun Chen, Xuyu Wang, Yan Liu, Yanfang Ye, Yinzhi Cao, Yue Zhao:
TrustLLM: Trustworthiness in Large Language Models. CoRR abs/2401.05561 (2024) - [i43]Zhouxing Shi, Qirui Jin, Zico Kolter, Suman Jana, Cho-Jui Hsieh, Huan Zhang:
Neural Network Verification with Branch-and-Bound for General Nonlinearities. CoRR abs/2405.21063 (2024) - [i42]Dongdong She, Adam Storek, Yuchong Xie, Seoyoung Kweon, Prashast Srivastava, Suman Jana:
FOX: Coverage-guided Fuzzing as Online Stochastic Control. CoRR abs/2406.04517 (2024) - [i41]Dongdong She, Kexin Pei, Junfeng Yang, Baishakhi Ray, Suman Jana:
Comment on Revisiting Neural Program Smoothing for Fuzzing. CoRR abs/2409.04504 (2024) - 2023
- [j10]Suman Jana, Pabitra Kumar Biswas, Thanikanti Sudhakar Babu, Hassan Haes Alhelou:
An Improved Parametric Method for Selecting Different Types of Tesla Transformer Primary Coil to Construct an Artificial Lightning Simulator. IEEE Access 11: 22174-22186 (2023) - [j9]Suyoung Lee, Wonho Song, Suman Jana, Meeyoung Cha, Sooel Son:
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks. IEEE Trans. Dependable Secur. Comput. 20(4): 3434-3448 (2023) - [j8]Kexin Pei, Zhou Xuan, Junfeng Yang, Suman Jana, Baishakhi Ray:
Learning Approximate Execution Semantics From Traces for Binary Function Similarity. IEEE Trans. Software Eng. 49(4): 2776-2790 (2023) - [c55]Ali Ahad, Gang Wang, Chung Hwan Kim, Suman Jana, Zhiqiang Lin, Yonghwi Kwon:
FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation. ASPLOS (4) 2023: 169-188 - [c54]Gabriel Ryan, Abhishek Shah, Dongdong She, Suman Jana:
Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis. SP 2023: 2086-2103 - [i40]Kexin Pei, Weichen Li, Qirui Jin, Shuyang Liu, Scott Geng, Lorenzo Cavallaro, Junfeng Yang, Suman Jana:
Symmetry-Preserving Program Representations for Learning Code Semantics. CoRR abs/2308.03312 (2023) - [i39]Chong Xiang, Tong Wu, Sihui Dai, Jonathan Petit, Suman Jana, Prateek Mittal:
PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses. CoRR abs/2310.13076 (2023) - [i38]Marcus J. Min, Yangruibo Ding, Luca Buratti, Saurabh Pujar, Gail E. Kaiser, Suman Jana, Baishakhi Ray:
Beyond Accuracy: Evaluating Self-Consistency of Code Large Language Models with IdentityChain. CoRR abs/2310.14053 (2023) - 2022
- [c53]Abhishek Shah, Dongdong She, Samanway Sadhu, Krish Singal, Peter Coffman, Suman Jana:
MC2: Rigorous and Efficient Directed Greybox Fuzzing. CCS 2022: 2595-2609 - [c52]Huan Zhang, Shiqi Wang, Kaidi Xu, Yihan Wang, Suman Jana, Cho-Jui Hsieh, J. Zico Kolter:
A Branch and Bound Framework for Stronger Adversarial Attacks of ReLU Networks. ICML 2022: 26591-26604 - [c51]Huan Zhang, Shiqi Wang, Kaidi Xu, Linyi Li, Bo Li, Suman Jana, Cho-Jui Hsieh, J. Zico Kolter:
General Cutting Planes for Bound-Propagation-Based Neural Network Verification. NeurIPS 2022 - [c50]Kexin Pei, Dongdong She, Michael Wang, Scott Geng, Zhou Xuan, Yaniv David, Junfeng Yang, Suman Jana, Baishakhi Ray:
NeuDep: neural binary memory dependence analysis. ESEC/SIGSOFT FSE 2022: 747-759 - [c49]Dongdong She, Abhishek Shah, Suman Jana:
Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis. SP 2022: 2194-2211 - [c48]Sunnyeo Park, Daejun Kim, Suman Jana, Sooel Son:
FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities. USENIX Security Symposium 2022: 197-214 - [i37]Dongdong She, Abhishek Shah, Suman Jana:
Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis. CoRR abs/2203.12064 (2022) - [i36]Huan Zhang, Shiqi Wang, Kaidi Xu, Linyi Li, Bo Li, Suman Jana, Cho-Jui Hsieh, J. Zico Kolter:
General Cutting Planes for Bound-Propagation-Based Neural Network Verification. CoRR abs/2208.05740 (2022) - [i35]Abhishek Shah, Dongdong She, Samanway Sadhu, Krish Singal, Peter Coffman, Suman Jana:
MC2: Rigorous and Efficient Directed Greybox Fuzzing. CoRR abs/2208.14530 (2022) - [i34]Kexin Pei, Dongdong She, Michael Wang, Scott Geng, Zhou Xuan, Yaniv David, Junfeng Yang, Suman Jana, Baishakhi Ray:
NeuDep: Neural Binary Memory Dependence Analysis. CoRR abs/2210.02853 (2022) - 2021
- [c47]Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner:
Learning Security Classifiers with Verified Global Robustness Properties. CCS 2021: 477-494 - [c46]Kaidi Xu, Huan Zhang, Shiqi Wang, Yihan Wang, Suman Jana, Xue Lin, Cho-Jui Hsieh:
Fast and Complete: Enabling Complete Neural Network Verification with Rapid and Massively Parallel Incomplete Verifiers. ICLR 2021 - [c45]Kexin Pei, Jonas Guan, David Williams-King, Junfeng Yang, Suman Jana:
XDA: Accurate, Robust Disassembly with Transfer Learning. NDSS 2021 - [c44]Shiqi Wang, Huan Zhang, Kaidi Xu, Xue Lin, Suman Jana, Cho-Jui Hsieh, J. Zico Kolter:
Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Neural Network Robustness Verification. NeurIPS 2021: 29909-29921 - [c43]Jianan Yao, Runzhou Tao, Ronghui Gu, Jason Nieh, Suman Jana, Gabriel Ryan:
DistAI: Data-Driven Automated Invariant Learning for Distributed Protocols. OSDI 2021: 405-421 - [c42]Kexin Pei, Jonas Guan, Matthew Broughton, Zhongtian Chen, Songchen Yao, David Williams-King, Vikas Ummadisetty, Junfeng Yang, Baishakhi Ray, Suman Jana:
StateFormer: fine-grained type recovery from binaries using generative state modeling. ESEC/SIGSOFT FSE 2021: 690-702 - [c41]Gabriel Ryan, Abhishek Shah, Dongdong She, Koustubha Bhat, Suman Jana:
Fine Grained Dataflow Tracking with Proximal Gradients. USENIX Security Symposium 2021: 1611-1628 - [c40]Yizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana:
Cost-Aware Robust Tree Ensembles for Security Applications. USENIX Security Symposium 2021: 2291-2308 - [c39]Hyunjoo Lee, Jiyeon Lee, Daejun Kim, Suman Jana, Insik Shin, Sooel Son:
AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads. USENIX Security Symposium 2021: 2543-2560 - [i33]Shiqi Wang, Huan Zhang, Kaidi Xu, Xue Lin, Suman Jana, Cho-Jui Hsieh, J. Zico Kolter:
Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Complete and Incomplete Neural Network Verification. CoRR abs/2103.06624 (2021) - [i32]Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner:
Learning Security Classifiers with Verified Global Robustness Properties. CoRR abs/2105.11363 (2021) - [i31]Suyoung Lee, Wonho Song, Suman Jana, Meeyoung Cha, Sooel Son:
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks. CoRR abs/2106.10147 (2021) - 2020
- [j7]Saurabh Bagchi, Vaneet Aggarwal, Somali Chaterji, Fred Douglis, Aly El Gamal, Jiawei Han, Brian J. Henz, Henry Hoffmann, Suman Jana, Milind Kulkarni, Felix Xiaozhu Lin, Karen B. Marais, Prateek Mittal, Shaoshuai Mou, Xiaokang Qiu, Gesualdo Scutari:
Vision Paper: Grand Challenges in Resilience: Autonomous System Resilience through Design and Runtime Measures. IEEE Open J. Comput. Soc. 1: 155-172 (2020) - [c38]Gabriel Ryan, Justin Wong, Jianan Yao, Ronghui Gu, Suman Jana:
CLN2INV: Learning Loop Invariants with Continuous Logic Networks. ICLR 2020 - [c37]Debmalya Mandal, Samuel Deng, Suman Jana, Jeannette M. Wing, Daniel J. Hsu:
Ensuring Fairness Beyond the Training Data. NeurIPS 2020 - [c36]Vikash Sehwag, Shiqi Wang, Prateek Mittal, Suman Jana:
HYDRA: Pruning Adversarially Robust Neural Networks. NeurIPS 2020 - [c35]Jianan Yao, Gabriel Ryan, Justin Wong, Suman Jana, Ronghui Gu:
Learning nonlinear loop invariants with gated continuous logic networks. PLDI 2020: 106-120 - [c34]Dongdong She, Rahul Krishna, Lu Yan, Suman Jana, Baishakhi Ray:
MTFuzz: fuzzing with a multi-task neural network. ESEC/SIGSOFT FSE 2020: 737-749 - [c33]Dongdong She, Yizheng Chen, Abhishek Shah, Baishakhi Ray, Suman Jana:
Neutaint: Efficient Dynamic Taint Analysis with Neural Networks. SP 2020: 1527-1543 - [c32]Yizheng Chen, Shiqi Wang, Dongdong She, Suman Jana:
On Training Robust PDF Malware Classifiers. USENIX Security Symposium 2020: 2343-2360 - [i30]Somali Chaterji, Parinaz Naghizadeh, Muhammad Ashraful Alam, Saurabh Bagchi, Mung Chiang, David Corman, Brian J. Henz, Suman Jana, Na Li, Shaoshuai Mou, Meeko Oishi, Chunyi Peng, Tiark Rompf, Ashutosh Sabharwal, Shreyas Sundaram, James Weimer, Jennifer Weller:
Resilient Cyberphysical Systems and their Application Drivers: A Technology Roadmap. CoRR abs/2001.00090 (2020) - [i29]Vikash Sehwag, Shiqi Wang, Prateek Mittal, Suman Jana:
On Pruning Adversarially Robust Neural Networks. CoRR abs/2002.10509 (2020) - [i28]Bai Li, Shiqi Wang, Yunhan Jia, Yantao Lu, Zhenyu Zhong, Lawrence Carin, Suman Jana:
Towards Practical Lottery Ticket Hypothesis for Adversarial Training. CoRR abs/2003.05733 (2020) - [i27]Jianan Yao, Gabriel Ryan, Justin Wong, Suman Jana, Ronghui Gu:
Learning Nonlinear Loop Invariants with Gated Continuous Logic Networks. CoRR abs/2003.07959 (2020) - [i26]Dongdong She, Rahul Krishna, Lu Yan, Suman Jana, Baishakhi Ray:
MTFuzz: Fuzzing with a Multi-Task Neural Network. CoRR abs/2005.12392 (2020) - [i25]Bai Li, Shiqi Wang, Suman Jana, Lawrence Carin:
Towards Understanding Fast Adversarial Training. CoRR abs/2006.03089 (2020) - [i24]Debmalya Mandal, Samuel Deng, Suman Jana, Jeannette M. Wing, Daniel Hsu:
Ensuring Fairness Beyond the Training Data. CoRR abs/2007.06029 (2020) - [i23]Kexin Pei, Jonas Guan, David Williams-King, Junfeng Yang, Suman Jana:
XDA: Accurate, Robust Disassembly with Transfer Learning. CoRR abs/2010.00770 (2020) - [i22]Kaidi Xu, Huan Zhang, Shiqi Wang, Yihan Wang, Suman Jana, Xue Lin, Cho-Jui Hsieh:
Fast and Complete: Enabling Complete Neural Network Verification with Rapid and Massively Parallel Incomplete Verifiers. CoRR abs/2011.13824 (2020) - [i21]Kexin Pei, Zhou Xuan, Junfeng Yang, Suman Jana, Baishakhi Ray:
Trex: Learning Execution Semantics from Micro-Traces for Binary Similarity. CoRR abs/2012.08680 (2020)
2010 – 2019
- 2019
- [j6]Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana:
DeepXplore: automated whitebox testing of deep learning systems. Commun. ACM 62(11): 137-145 (2019) - [j5]Kexin Pei, Shiqi Wang, Yuchi Tian, Justin Whitehouse, Carl Vondrick, Yinzhi Cao, Baishakhi Ray, Suman Jana, Junfeng Yang:
Bringing Engineering Rigor to Deep Learning. ACM SIGOPS Oper. Syst. Rev. 53(1): 59-67 (2019) - [c31]Mathias Lécuyer, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, Suman Jana:
Certified Robustness to Adversarial Examples with Differential Privacy. IEEE Symposium on Security and Privacy 2019: 656-672 - [c30]Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, Suman Jana:
NEUZZ: Efficient Fuzzing with Neural Program Smoothing. IEEE Symposium on Security and Privacy 2019: 803-817 - [i20]Yizheng Chen, Shiqi Wang, Dongdong She, Suman Jana:
On Training Robust PDF Malware Classifiers. CoRR abs/1904.03542 (2019) - [i19]Shiqi Wang, Yizheng Chen, Ahmed Abdou, Suman Jana:
Enhancing Gradient-based Attacks with Symbolic Intervals. CoRR abs/1906.02282 (2019) - [i18]Vikash Sehwag, Shiqi Wang, Prateek Mittal, Suman Jana:
Towards Compact and Robust Deep Neural Networks. CoRR abs/1906.06110 (2019) - [i17]Dongdong She, Yizheng Chen, Baishakhi Ray, Suman Jana:
Neutaint: Efficient Dynamic Taint Analysis with Neural Networks. CoRR abs/1907.03756 (2019) - [i16]Gabriel Ryan, Abhishek Shah, Dongdong She, Koustubha Bhat, Suman Jana:
Fine Grained Dataflow Tracking with Proximal Gradients. CoRR abs/1909.03461 (2019) - [i15]Gabriel Ryan, Justin Wong, Jianan Yao, Ronghui Gu, Suman Jana:
CLN2INV: Learning Loop Invariants with Continuous Logic Networks. CoRR abs/1909.11542 (2019) - [i14]Yizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana:
Training Robust Tree Ensembles for Security. CoRR abs/1912.01149 (2019) - [i13]Saurabh Bagchi, Vaneet Aggarwal, Somali Chaterji, Fred Douglis, Aly El Gamal, Jiawei Han, Brian J. Henz, Hank Hoffmann, Suman Jana, Milind Kulkarni, Felix Xiaozhu Lin, Karen B. Marais, Prateek Mittal, Shaoshuai Mou, Xiaokang Qiu, Gesualdo Scutari:
Grand Challenges of Resilience: Autonomous System Resilience through Design and Runtime Measures. CoRR abs/1912.11598 (2019) - 2018
- [j4]Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana:
DeepXplore: Automated Whitebox Testing of Deep Learning Systems. GetMobile Mob. Comput. Commun. 22(3): 36-38 (2018) - [c29]Yuchi Tian, Kexin Pei, Suman Jana, Baishakhi Ray:
DeepTest: automated testing of deep-neural-network-driven autonomous cars. ICSE 2018: 303-314 - [c28]Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, Suman Jana:
Efficient Formal Safety Analysis of Neural Networks. NeurIPS 2018: 6369-6379 - [c27]Shankara Pailoor, Andrew Aday, Suman Jana:
MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation. USENIX Security Symposium 2018: 729-743 - [c26]Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, Suman Jana:
Formal Security Analysis of Neural Networks using Symbolic Intervals. USENIX Security Symposium 2018: 1599-1614 - [i12]Mathias Lécuyer, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, Suman Jana:
On the Connection between Differential Privacy and Adversarial Robustness in Machine Learning. CoRR abs/1802.03471 (2018) - [i11]Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, Suman Jana:
Formal Security Analysis of Neural Networks using Symbolic Intervals. CoRR abs/1804.10829 (2018) - [i10]Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, Suman Jana:
NEUZZ: Efficient Fuzzing with Neural Program Learning. CoRR abs/1807.05620 (2018) - [i9]Shiqi Wang, Kexin Pei, Justin Whitehouse, Junfeng Yang, Suman Jana:
Efficient Formal Safety Analysis of Neural Networks. CoRR abs/1809.08098 (2018) - [i8]Shiqi Wang, Yizheng Chen, Ahmed Abdou, Suman Jana:
MixTrain: Scalable Training of Formally Robust Neural Networks. CoRR abs/1811.02625 (2018) - 2017
- [c25]Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, Suman Jana:
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities. CCS 2017: 2155-2168 - [c24]Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana:
DeepXplore: Automated Whitebox Testing of Deep Learning Systems. SOSP 2017: 1-18 - [c23]Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, Suman Jana:
HVLearn: Automated Black-Box Analysis of Hostname Verification in SSL/TLS Implementations. IEEE Symposium on Security and Privacy 2017: 521-538 - [c22]Theofilos Petsios, Adrian Tang, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana:
NEZHA: Efficient Domain-Independent Differential Testing. IEEE Symposium on Security and Privacy 2017: 615-632 - [i7]Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana:
DeepXplore: Automated Whitebox Testing of Deep Learning Systems. CoRR abs/1705.06640 (2017) - [i6]Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, Suman Jana:
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities. CoRR abs/1708.08437 (2017) - [i5]Yuchi Tian, Kexin Pei, Suman Jana, Baishakhi Ray:
DeepTest: Automated Testing of Deep-Neural-Network-driven Autonomous Cars. CoRR abs/1708.08559 (2017) - [i4]Theofilos Petsios, Adrian Tang, Dimitris Mitropoulos, Salvatore J. Stolfo, Angelos D. Keromytis, Suman Jana:
Tug-of-War: Observations on Unified Content Handling. CoRR abs/1708.09334 (2017) - [i3]Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana:
Towards Practical Verification of Machine Learning: The Case of Computer Vision Systems. CoRR abs/1712.01785 (2017) - 2016
- [c21]George Argyros, Ioannis Stais, Suman Jana, Angelos D. Keromytis, Aggelos Kiayias:
SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning. CCS 2016: 1690-1701 - [c20]Yuan Jochen Kang, Baishakhi Ray, Suman Jana:
APEx: automated inference of error specifications for C APIs. ASE 2016: 472-482 - [c19]Suman Jana, Yuan Jochen Kang, Samuel Roth, Baishakhi Ray:
Automatically Detecting Error Handling Bugs Using Error Specifications. USENIX Security Symposium 2016: 345-362 - 2015
- [c18]Henry Corrigan-Gibbs, Suman Jana:
Recommendations for Randomness in the Operating System, or How to Keep Evil Children out of Your Pool and Other Random Facts. HotOS 2015 - [c17]Martin Georgiev, Suman Jana, Vitaly Shmatikov:
Rethinking Security of Web-Based System Applications. WWW 2015: 366-376 - [c16]Richard McPherson, Suman Jana, Vitaly Shmatikov:
No Escape From Reality: Security and Privacy of Augmented Reality Browsers. WWW 2015: 743-753 - [i2]Benjamin A. Braun, Suman Jana, Dan Boneh:
Robust and Efficient Elimination of Cache and Timing Side Channels. CoRR abs/1506.00189 (2015) - [i1]Suman Jana, Úlfar Erlingsson, Iulia Ion:
Apples and Oranges: Detecting Least-Privilege Violators with Peer Group Analysis. CoRR abs/1510.07308 (2015) - 2014
- [c15]Martin Georgiev, Suman Jana, Vitaly Shmatikov:
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks. NDSS 2014 - [c14]Chad Brubaker, Suman Jana, Baishakhi Ray, Sarfraz Khurshid, Vitaly Shmatikov:
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations. IEEE Symposium on Security and Privacy 2014: 114-129 - [c13]David Silver, Suman Jana, Dan Boneh, Eric Yawei Chen, Collin Jackson:
Password Managers: Attacks and Defenses. USENIX Security Symposium 2014: 449-464 - 2013
- [j3]Sriram Nandha Premnath, Suman Jana, Jessica Croft, Prarthana Lakshmane Gowda, Mike Clark, Sneha Kumar Kasera, Neal Patwari, Srikanth V. Krishnamurthy:
Secret Key Extraction from Wireless Signal Strength in Real Environments. IEEE Trans. Mob. Comput. 12(5): 917-930 (2013) - [c12]Loris D'Antoni, Alan M. Dunn, Suman Jana, Tadayoshi Kohno, Benjamin Livshits, David Molnar, Alexander Moshchuk, Eyal Ofek, Franziska Roesner, T. Scott Saponas, Margus Veanes, Helen J. Wang:
Operating System Support for Augmented Reality Applications. HotOS 2013 - [c11]Suman Jana, Arvind Narayanan, Vitaly Shmatikov:
A Scanner Darkly: Protecting User Privacy from Perceptual Applications. IEEE Symposium on Security and Privacy 2013: 349-363 - [c10]Suman Jana, David Molnar, Alexander Moshchuk, Alan M. Dunn, Benjamin Livshits, Helen J. Wang, Eyal Ofek:
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers. USENIX Security Symposium 2013: 415-430 - 2012
- [c9]Martin Georgiev, Subodh Iyengar, Suman Jana, Rishita Anubhai, Dan Boneh, Vitaly Shmatikov:
The most dangerous code in the world: validating SSL certificates in non-browser software. CCS 2012: 38-49 - [c8]Yigal Bejerano, Suman Jana, Pramod V. Koppol:
Efficient construction of directed Redundant Steiner trees. LCN 2012: 119-127 - [c7]Alan M. Dunn, Michael Z. Lee, Suman Jana, Sangman Kim, Mark Silberstein, Yuanzhong Xu, Vitaly Shmatikov, Emmett Witchel:
Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels. OSDI 2012: 61-75 - [c6]Suman Jana, Vitaly Shmatikov:
Abusing File Processing in Malware Detectors for Fun and Profit. IEEE Symposium on Security and Privacy 2012: 80-94 - [c5]Suman Jana, Vitaly Shmatikov:
Memento: Learning Secrets from Process Footprints. IEEE Symposium on Security and Privacy 2012: 143-157 - 2011
- [c4]Suman Jana, Vitaly Shmatikov:
EVE: Verifying Correct Execution of Cloud-Hosted Web Applications. HotCloud 2011 - [c3]Suman Jana, Donald E. Porter, Vitaly Shmatikov:
TxBox: Building Secure, Efficient Sandboxes with System Transactions. IEEE Symposium on Security and Privacy 2011: 329-344 - 2010
- [j2]Neal Patwari, Jessica Croft, Suman Jana, Sneha Kumar Kasera:
High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements. IEEE Trans. Mob. Comput. 9(1): 17-30 (2010) - [j1]Suman Jana, Sneha Kumar Kasera:
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews. IEEE Trans. Mob. Comput. 9(3): 449-462 (2010)
2000 – 2009
- 2009
- [c2]Suman Jana, Sriram Nandha Premnath, Mike Clark, Sneha Kumar Kasera, Neal Patwari, Srikanth V. Krishnamurthy:
On the effectiveness of secret key extraction from wireless signal strength in real environments. MobiCom 2009: 321-332 - 2008
- [c1]Suman Jana, Sneha Kumar Kasera:
On fast and accurate detection of unauthorized wireless access points using clock skews. MobiCom 2008: 104-115
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint