Skip to content

Commit ebd5533

Browse files
committed
jjjjjjj
1 parent d41db0a commit ebd5533

File tree

3 files changed

+10
-5
lines changed

3 files changed

+10
-5
lines changed

_data/phdstudents.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@
3333
number_educ: 3
3434
education1: B.E., Hefei University of Technology
3535
education2: Visiting PhD student of Prof. Phillipa Gardner's group at Imperial College London
36-
education3: CCS 25<sup>1st author</sup>, CONFEST/FMICS 23<sup>1st author</sup>
36+
education3: CCS 25<sup>1st author</sup>, ICFEM 25<sup>1st author</sup>, CONFEST/FMICS 23<sup>1st author</sup>
3737

3838

3939
- name: Xiangxiang Chen
@@ -58,7 +58,7 @@
5858
number_educ: 3
5959
education1: B.E., Jilin University
6060
education2: Intern at Ant Group
61-
education3: ISSTA 25
61+
education3: IST 25<sup>1st author</sup>, ISSTA 25
6262

6363
- name: Zihan Liu
6464
photo: zihan.jpg

_pages/publications.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,8 @@ permalink: /publications/
6161

6262
[TDSC, CCF A] Xiangshan Gao, Jingyi Wang, Zhikun Zhang, Jialuo Chen, Peng Cheng and Jiming Chen. *A2E: Black-box Anti-adversarial Example based Watermarking to Verify Federated Unlearning*, IEEE Transactions on Dependable and Secure Computing. (Accepted)
6363

64+
[IST, CCF B] Xiaoxia Liu, Jingyi Wang\*, Hsiao-Ying Lin, Chengfang Fang, Jie Shi, Xiaodong Zhang, Wenhai Wang. *Semantic-aware Testing for Object Detection Systems*. Information and Software Technology, 2025. (Accepted)
65+
6466
[TNNLS] Xiaokun Luan, Xiyue Zhang, Jingyi Wang, and Meng Sun. *Protecting Deep Learning Model Copyrights with Adversarial Example-Free Reuse Detection*. IEEE Transactions on Neural Networks and Learning Systems. (Accepted)
6567

6668
[CAC] Xuran Li, Jingyi Wang\*, Xiaohan Yuan and Peixin Zhang. *PRUNE: A Patching Based Repair Framework for Certifiable Unlearning of Neural Networks*. The China Automation Conference, Harbin, China, Sep, 2025.
@@ -73,6 +75,8 @@ permalink: /publications/
7375
<br>
7476
#### 2024
7577

78+
[TDSC, CCF A] Xiangshan Gao, Xingjun Ma, Jingyi Wang, Youcheng Sun, Bo Li, Shouling Ji, Peng Cheng and Jiming Chen. *VERIFI: Towards Verifiable Federated Unlearning*, IEEE Transactions on Dependable and Secure Computing. (<font color="#dd0000">Best Paper Award Runner-Up of IEEE TDSC 2024</font>)
79+
7680
[ICSE, CCF A] Jianan Ma, Pengfei Yang, Jingyi Wang\*, Youcheng Sun, Chengchao Huang and Zhen Wang. *VeRe: Verification Guided Synthesis for Repairing Deep Neural Networks*. 46th International Conference on Software Engineering, Lisbon, Portugal, Apr, 2024. (Acceptance rate: 234/1051=22%)
7781

7882
[ISSTA, CCF A] Xiangshan Gao, Jialuo Chen, Jingyi Wang\*, Jie Shi, Peng Cheng and Jiming Chen. *TeDA: A Testing Framework for Data Usage Auditing in Deep Learning Model Development*. 33rd International Symposium on Software Testing and Analysis, Vienna, Austria, Sep 2024.
@@ -87,9 +91,6 @@ permalink: /publications/
8791

8892
[TSE, CCF A] Shunkai Zhu, Jingyi Wang\*, Jun Sun, Jie Yang, Xingwei Lin, Tianyi Wang, Liyi Zhang and Peng Cheng. *Better Pay Attention Whilst Fuzzing*. IEEE Transactions on Software Engineering. (Accepted)
8993

90-
[TDSC, CCF A] Xiangshan Gao, Xingjun Ma, Jingyi Wang, Youcheng Sun, Bo Li, Shouling Ji, Peng Cheng and Jiming Chen. *VERIFI: Towards Verifiable Federated Unlearning*, IEEE Transactions on Dependable and Secure Computing. (Accepted)
91-
92-
9394
[TOSEM, CCF A] Zhe Zhao, Guangke Chen, Tong Liu, Taishan Li, Fu Song, Jingyi Wang and Jun Sun. *Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples*, ACM Transactions on Software Engineering and Methodology. (Accepted)
9495

9596
[RA-L] Yifan Jia, Christopher M. Poskitt, Peixin Zhang, Jingyi Wang\*, Jun Sun, Sudipta Chattopadhyay. *Robust and Fast DNN Model Training for Trustworthy Robots.* IEEE Robotics and Automation Letters. (Accepted)

_pages/research.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,8 @@ AI systems, including emerging AI models (e.g., deep neural networks and large l
3535

3636
[CCS 2025] Jianan Ma, Jingyi Wang\*, Qi Xuan and Zhen Wang. *Provable Repair of Deep Neural Network Defects through Pre-image Synthesis and Property Refinement*. The 32nd ACM Conference on Computer and Communications Security, Taipei, China, Oct, 2025.
3737

38+
[TDSC 2024] Xiangshan Gao, Xingjun Ma, Jingyi Wang, Youcheng Sun, Bo Li, Shouling Ji, Peng Cheng and Jiming Chen. *VERIFI: Towards Verifiable Federated Unlearning*, IEEE Transactions on Dependable and Secure Computing. (<font color="#dd0000">Best Paper Award Runner-Up of IEEE TDSC 2024</font>)
39+
3840
[S&P 2022] Jialuo Chen, Jingyi Wang\*, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li and Dawn Song. [*Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models*](https://arxiv.org/abs/2112.05588). 43rd IEEE Symposium on Security and Privacy, Oakland, USA, May 2022.
3941

4042
[TACAS 2021] Pengfei Yang, Renjue Li, Jianlin Li, Cheng-Chao Huang, Jingyi Wang, Jun Sun, Bai Xue and Lijun Zhang. *Improving Neural Network Verification through Spurious Region Guided Refinement*, 27th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Luxembourg, Luxembourg (online), Apr 2021.
@@ -77,6 +79,8 @@ Software stack is the core driving force behind the digital operation of industr
7779

7880
**Sample Work:**
7981

82+
[CCS 2025] Huan Sun, David Sanan, Jingyi Wang\*, Yongwang Zhao, Jun Sun and Wenhai Wang. *Generalized Security-Preserving Refinement for Concurrent Systems*. The 32nd ACM Conference on Computer and Communications Security, Taipei, China, Oct, 2025.
83+
8084
[ICSE 2025] Ziyu Mao, Jingyi Wang\*, Jun Sun, Shengchao Qin and Jiawen Xiong. *LLM-aided Automatic Modelling for Security Protocol Verification*. 47th International Conference on Software Engineering, Ottawa, Canada, Apr, 2025.
8185

8286
[WWW 2025] Xinyao Xu, Ziyu Mao, Jianzhong Su, Xingwei Lin, David Basin, Jun Sun and Jingyi Wang\*. *Quantitative Runtime Monitoring of Ethereum Transaction Attacks*. The Web Conference, Sydney, Australia, Apr, 2025.

0 commit comments

Comments
 (0)