Suman Jana
Columbia University in the City of New York
H-index: 43
North America-United States
Top articles of Suman Jana
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Trustllm: Trustworthiness in large language models | arXiv preprint arXiv:2401.05561 | Lichao Sun Yue Huang Haoran Wang Siyuan Wu Qihui Zhang | 2024/1/10 |
Symmetry-Preserving Program Representations for Learning Code Semantics | arXiv preprint arXiv:2308.03312 | Kexin Pei Weichen Li Qirui Jin Shuyang Liu Scott Geng | 2023/8/7 |
Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis | Gabriel Ryan Abhishek Shah Dongdong She Suman Jana | 2023/5/21 | |
FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation | Ali Ahad Gang Wang Chung Hwan Kim Suman Jana Zhiqiang Lin | 2023/3/25 | |
Formal verification for neural networks with general nonlinearities via branch-and-bound | Zhouxing Shi Qirui Jin Huan Zhang Zico Kolter Suman Jana | 2023 | |
Beyond accuracy: Evaluating self-consistency of code large language models with identitychain | arXiv preprint arXiv:2310.14053 | Marcus J Min Yangruibo Ding Luca Buratti Saurabh Pujar Gail Kaiser | 2023/10/21 |
PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses | arXiv preprint arXiv:2310.13076 | Chong Xiang Tong Wu Sihui Dai Jonathan Petit Suman Jana | 2023/10/19 |
A branch and bound framework for stronger adversarial attacks of ReLU networks | Huan Zhang Shiqi Wang Kaidi Xu Yihan Wang Suman Jana | 2022/6/28 | |
General cutting planes for bound-propagation-based neural network verification | Advances in Neural Information Processing Systems (NeurIPS) | Huan Zhang Shiqi Wang Kaidi Xu Linyi Li Bo Li | 2022/8/11 |
Effective seed scheduling for fuzzing with graph centrality analysis | Dongdong She Abhishek Shah Suman Jana | 2022/5/22 | |
NeuDep: neural binary memory dependence analysis | Kexin Pei Dongdong She Michael Wang Scott Geng Zhou Xuan | 2022/11/7 | |
{FUGIO}: Automatic Exploit Generation for {PHP} Object Injection Vulnerabilities | Sunnyeo Park Daejun Kim Suman Jana Sooel Son | 2022 | |
Mc2: Rigorous and efficient directed greybox fuzzing | Abhishek Shah Dongdong She Samanway Sadhu Krish Singal Peter Coffman | 2022/11/7 | |
Evaluating the robustness of trigger set-based watermarks embedded in deep neural networks | IEEE Transactions on Dependable and Secure Computing | Suyoung Lee Wonho Song Suman Jana Meeyoung Cha Sooel Son | 2022/8/5 |
Jiyeon Lee | JMIR | Jiyeon Lee LEE Kilho Byunggill Joe Yonghyeon Park Jihun Hamm | 2022/8 |
Learning approximate execution semantics from traces for binary function similarity | IEEE Transactions on Software Engineering | Kexin Pei Zhou Xuan Junfeng Yang Suman Jana Baishakhi Ray | 2022/12/28 |
StateFormer: Fine-Grained Type Recovery from Binaries Using Generative State Modeling | Kexin Pei Jonas Guan Matthew Broughton Zhongtian Chen Songchen Yao | 2021/8/20 | |
{DistAI}:{Data-Driven} automated invariant learning for distributed protocols | Jianan Yao Runzhou Tao Ronghui Gu Jason Nieh Suman Jana | 2021 | |
{AdCube}:{WebVR} Ad Fraud and Practical Confinement of {Third-Party} Ads | Hyunjoo Lee Jiyeon Lee Daejun Kim Suman Jana Insik Shin | 2021 | |
{Cost-Aware} robust tree ensembles for security applications | Yizheng Chen Shiqi Wang Weifan Jiang Asaf Cidon Suman Jana | 2021 |