Follow
Qi Wang
Title
Cited by
Cited by
Year
Property inference attacks on fully connected neural networks using permutation invariant representations
K Ganju, Q Wang, W Yang, CA Gunter, N Borisov
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
6462018
Detecting ai trojans using meta neural analysis
X Xu, Q Wang, H Li, N Borisov, CA Gunter, B Li
2021 IEEE Symposium on Security and Privacy (SP), 103-120, 2021
4092021
Fear and logging in the internet of things
Q Wang, WU Hassan, A Bates, C Gunter
Network and Distributed Systems Symposium, 2018
2932018
You are what you do: Hunting stealthy malware via data provenance analysis.
Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ...
NDSS, 2020
2802020
Charting the attack surface of trigger-action IoT platforms
Q Wang, P Datta, W Yang, S Liu, A Bates, CA Gunter
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
2032019
Cross-app poisoning in software-defined networking
BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
692018
Automatic analysis of consistency properties of distributed transaction systems in Maude
S Liu, PC Ölveczky, M Zhang, Q Wang, J Meseguer
International Conference on Tools and Algorithms for the Construction and …, 2019
252019
Read atomic transactions with prevention of lost updates: ROLA and its formal analysis
S Liu, PC Ölveczky, Q Wang, I Gupta, J Meseguer
Formal Aspects of Computing 31 (5), 503-540, 2019
242019
ROLA: A New Distributed Transaction Protocol and Its Formal Analysis.
S Liu, PC Ölveczky, K Santhanam, Q Wang, I Gupta, J Meseguer
FASE, 77-93, 2018
202018
Generating correct-by-construction distributed implementations from formal Maude designs
S Liu, A Sandur, J Meseguer, PC Ölveczky, Q Wang
NASA Formal Methods Symposium, 22-40, 2020
172020
Formal modeling and analysis of the Walter transactional data store
S Liu, PC Ölveczky, Q Wang, J Meseguer
International Workshop on Rewriting Logic and its Applications, 136-152, 2018
162018
Graph learning for interactive threat detection in heterogeneous smart home rule data
G Wang, N Ivanov, B Chen, Q Wang, TV Nguyen, Q Yan
Proceedings of the ACM on Management of Data 1 (1), 1-27, 2023
142023
Extracting URLs from JavaScript via program analysis
Q Wang, J Zhou, Y Chen, Y Zhang, J Zhao
Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013
122013
Towards systematic parallel programming of graph problems via tree decomposition and tree parallelism
Q Wang, M Chen, Y Liu, Z Hu
Proceedings of the 2nd ACM SIGPLAN workshop on Functional high-performance …, 2013
62013
Provenance tracing in the internet of things
Q Wang, WU Hassan, A Bates, C Gunter
Proceedings of the 9th USENIX Conference on Theory and Practice of …, 2017
42017
Proviot: Detecting stealthy attacks in iot through federated edge-cloud security
K Mukherjee, J Wiedemeier, Q Wang, J Kamimura, JJ Rhee, J Wei, Z Li, ...
International Conference on Applied Cryptography and Network Security, 241-268, 2024
32024
Automatic transformation of formal maude designs into correct-by-construction distributed implementations
S Liu, A Sandur, J Meseguer, PC Olveczky, Q Wang
Technical report, 2019
22019
System and method for automated integration of endpoint detection and response (edr) data to open extended detection and response (xdr) framework
J Gui, Q Wang, P Fei
US Patent App. 18/105,135, 2023
12023
Securing emerging IoT systems through systematic analysis and design
Q Wang
University of Illinois at Urbana-Champaign, 2020
12020
A new distributed transaction protocol and its formal analysis in maude
S Liu, PC Olveczky, K Santhanam, Q Wang, I Gupta, J Meseguer
12018
The system can't perform the operation now. Try again later.
Articles 1–20