Skip to content

Commit 019381e

Browse files
committed
asgag
1 parent 755ef6e commit 019381e

File tree

3 files changed

+27
-2
lines changed

3 files changed

+27
-2
lines changed

_data/news.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,9 @@
1+
- date: Jan 2025
2+
headline: One paper is accepted by WWW 2025, congrats to Xinyao and Ziyu!
3+
4+
- date: Jan 2025
5+
headline: Two papers are accepted by ICSE 2025, congrats to Ziyu and Zhiming!
6+
17
- date: Nov 2024
28
headline: ICFEM 2025 will be in Hangzhou, consider submitting your work!
39

_pages/publications.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,17 @@ permalink: /publications/
3131
[Arxiv] Xiaoxia Liu, Jingyi Wang, Jun Sun, Xiaohan Yuan, Guoliang Dong, Peng Di, Wenhai Wang, Dongxia Wang. *Prompting Frameworks for Large Language Models: A Survey*. arXiv:2311.12785, 2023. ([Paper link](https://arxiv.org/abs/2311.12785), [Github link](https://github.com/lxx0628/Prompting-Framework-Survey), Media Coverage: [AGI Leap Summit, Best Paper Award](https://superagi.com/agi-leap-summit/))
3232

3333

34+
<br>
35+
#### 2025
36+
37+
- [ICSE, CCF A] Ziyu Mao, Jingyi Wang\*, Jun Sun, Shengchao Qin and Jiawen Xiong. *LLM-aided Automatic Modelling for Security Protocol Verification*. 47th International Conference on Software Engineering, Ottawa, Canada, Apr, 2025. (245/1150, acceptance rate: 21.3%)
38+
39+
- [WWW, CCF A] Xinyao Xu, Ziyu Mao, Jianzhong Su, Xingwei Lin, David Basin, Jun Sun and Jingyi Wang\*. *Quantitative Runtime Monitoring of Ethereum Transaction Attacks*. The Web Conference, Sydney, Australia, Apr, 2025. (409/2062, acceptance rate: 19.8%)
40+
41+
- [ICSE, CCF A] Zhiming Chi, Jianan Ma, Pengfei Yang, Cheng-chao Huang, Renjue, Li, Jingyi Wang, Xiaowei Huang, and Lijun Zhang. *Patch Synthesis for Property Repair of Deep Neural Networks*. 47th International Conference on Software Engineering, Ottawa, Canada, Apr, 2025. (245/1150, acceptance rate: 21.3%)
42+
43+
44+
3445
<br>
3546
#### 2024
3647

_pages/research.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ permalink: /research/
2020
<!-- ### ✅ Deep Learning System Security -->
2121
<br>
2222

23-
#### ***Theme 1: SE for Trustworthy AI: Testing, Verification and Repair of AI Models or AI-based Systems***
23+
#### ***Track 1: Software Engineering for Trustworthy AI***
2424
<!-- **[TOSEM 22, ICSE 21, TACAS 21, ISSTA 21, ASE 20, ICECCS 20, ICSE 19]: Testing, Verifying and Enhancing the Robustness of Deep Learning Models** -->
2525

2626
For AI models (e.g., large language models or deep learning models in general) or AI-based systems (e.g., autonomous cars), we are working towards *a systematic testing>verification>repair loop to comprehensively and automatically evaluate, identify and fix the potential risks hidden in multiple dimensions, e.g., robustness, fairness, safety and copyright.* This line of research is crucial for human beings to be aware of, manage and mitigate the risks in the emergence of diverse AI models and AI-based systems.
@@ -33,7 +33,7 @@ For AI models (e.g., large language models or deep learning models in general) o
3333
<!-- <br> -->
3434
<br>
3535

36-
#### ***Theme 2: Testing, Verification and Security of Industrial Safety-critical Systems***
36+
#### ***Track 2: Formal Design and Analysis of Security Protocols***
3737
<!-- **[TOSEM 22, ICSE 21, TACAS 21, ISSTA 21, ASE 20, ICECCS 20, ICSE 19]: Testing, Verifying and Enhancing the Robustness of Deep Learning Models** -->
3838

3939
Software is the core driving force for the digital operation of industrial safety-critical systems (industrial control systems, autonomous systems, etc). It is thus crucial to formally verify their software foundations (e.g., OS kernel, compilers, security protocols or control programs) for industrial safety-critical systems. In this line of research, we are working on *developing new logical foundations and specifications to better model, test and verify the desired security properties in different system software layers (especially those commonly used in safety-critical industries).*
@@ -46,6 +46,14 @@ Software is the core driving force for the digital operation of industrial safet
4646
<br>
4747

4848

49+
#### ***Track 3: AI Safety and Fairness***
50+
51+
Software is the core driving force for the digital operation of industrial safety-critical systems (industrial control systems, autonomous systems, etc). It is thus crucial to formally verify their software foundations (e.g., OS kernel, compilers, security protocols or control programs) for industrial safety-critical systems. In this line of research, we are working on *developing new logical foundations and specifications to better model, test and verify the desired security properties in different system software layers (especially those commonly used in safety-critical industries).*
52+
<!-- We are building systematic methodologies and toolkits including novel testing metrics correlated to robustness, test case generation methods, automatic verification and repair techniques to comprehensively test, verify and enhance the robustness of deep learning models deployed in various application scenarios, e.g., image classification, object detection and NLP. -->
53+
54+
*Related publications: [TSE 24, AsiaCCS/CPSS 24, TSE 23, CCS 23, CONFEST/FMICS 23, FITEE 22, IoT 22, TSE 21, ICSE 18, DSN 18, STTT 18, FM 18, FASE 17, FM 16]*
55+
56+
4957
<!-- #### ***Theme 3: AI-assisted Model Driven Engineering*** -->
5058

5159

0 commit comments

Comments
 (0)