You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _pages/publications.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,6 +61,8 @@ permalink: /publications/
61
61
62
62
[TDSC, CCF A] Xiangshan Gao, Jingyi Wang, Zhikun Zhang, Jialuo Chen, Peng Cheng and Jiming Chen. *A2E: Black-box Anti-adversarial Example based Watermarking to Verify Federated Unlearning*, IEEE Transactions on Dependable and Secure Computing. (Accepted)
63
63
64
+
[IST, CCF B] Xiaoxia Liu, Jingyi Wang\*, Hsiao-Ying Lin, Chengfang Fang, Jie Shi, Xiaodong Zhang, Wenhai Wang. *Semantic-aware Testing for Object Detection Systems*. Information and Software Technology, 2025. (Accepted)
65
+
64
66
[TNNLS] Xiaokun Luan, Xiyue Zhang, Jingyi Wang, and Meng Sun. *Protecting Deep Learning Model Copyrights with Adversarial Example-Free Reuse Detection*. IEEE Transactions on Neural Networks and Learning Systems. (Accepted)
65
67
66
68
[CAC] Xuran Li, Jingyi Wang\*, Xiaohan Yuan and Peixin Zhang. *PRUNE: A Patching Based Repair Framework for Certifiable Unlearning of Neural Networks*. The China Automation Conference, Harbin, China, Sep, 2025.
@@ -73,6 +75,8 @@ permalink: /publications/
73
75
<br>
74
76
#### 2024
75
77
78
+
[TDSC, CCF A] Xiangshan Gao, Xingjun Ma, Jingyi Wang, Youcheng Sun, Bo Li, Shouling Ji, Peng Cheng and Jiming Chen. *VERIFI: Towards Verifiable Federated Unlearning*, IEEE Transactions on Dependable and Secure Computing. (<fontcolor="#dd0000">Best Paper Award Runner-Up of IEEE TDSC 2024</font>)
79
+
76
80
[ICSE, CCF A] Jianan Ma, Pengfei Yang, Jingyi Wang\*, Youcheng Sun, Chengchao Huang and Zhen Wang. *VeRe: Verification Guided Synthesis for Repairing Deep Neural Networks*. 46th International Conference on Software Engineering, Lisbon, Portugal, Apr, 2024. (Acceptance rate: 234/1051=22%)
77
81
78
82
[ISSTA, CCF A] Xiangshan Gao, Jialuo Chen, Jingyi Wang\*, Jie Shi, Peng Cheng and Jiming Chen. *TeDA: A Testing Framework for Data Usage Auditing in Deep Learning Model Development*. 33rd International Symposium on Software Testing and Analysis, Vienna, Austria, Sep 2024.
@@ -87,9 +91,6 @@ permalink: /publications/
87
91
88
92
[TSE, CCF A] Shunkai Zhu, Jingyi Wang\*, Jun Sun, Jie Yang, Xingwei Lin, Tianyi Wang, Liyi Zhang and Peng Cheng. *Better Pay Attention Whilst Fuzzing*. IEEE Transactions on Software Engineering. (Accepted)
89
93
90
-
[TDSC, CCF A] Xiangshan Gao, Xingjun Ma, Jingyi Wang, Youcheng Sun, Bo Li, Shouling Ji, Peng Cheng and Jiming Chen. *VERIFI: Towards Verifiable Federated Unlearning*, IEEE Transactions on Dependable and Secure Computing. (Accepted)
91
-
92
-
93
94
[TOSEM, CCF A] Zhe Zhao, Guangke Chen, Tong Liu, Taishan Li, Fu Song, Jingyi Wang and Jun Sun. *Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples*, ACM Transactions on Software Engineering and Methodology. (Accepted)
94
95
95
96
[RA-L] Yifan Jia, Christopher M. Poskitt, Peixin Zhang, Jingyi Wang\*, Jun Sun, Sudipta Chattopadhyay. *Robust and Fast DNN Model Training for Trustworthy Robots.* IEEE Robotics and Automation Letters. (Accepted)
Copy file name to clipboardExpand all lines: _pages/research.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,6 +35,8 @@ AI systems, including emerging AI models (e.g., deep neural networks and large l
35
35
36
36
[CCS 2025] Jianan Ma, Jingyi Wang\*, Qi Xuan and Zhen Wang. *Provable Repair of Deep Neural Network Defects through Pre-image Synthesis and Property Refinement*. The 32nd ACM Conference on Computer and Communications Security, Taipei, China, Oct, 2025.
37
37
38
+
[TDSC 2024] Xiangshan Gao, Xingjun Ma, Jingyi Wang, Youcheng Sun, Bo Li, Shouling Ji, Peng Cheng and Jiming Chen. *VERIFI: Towards Verifiable Federated Unlearning*, IEEE Transactions on Dependable and Secure Computing. (<fontcolor="#dd0000">Best Paper Award Runner-Up of IEEE TDSC 2024</font>)
39
+
38
40
[S&P 2022] Jialuo Chen, Jingyi Wang\*, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li and Dawn Song. [*Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models*](https://arxiv.org/abs/2112.05588). 43rd IEEE Symposium on Security and Privacy, Oakland, USA, May 2022.
39
41
40
42
[TACAS 2021] Pengfei Yang, Renjue Li, Jianlin Li, Cheng-Chao Huang, Jingyi Wang, Jun Sun, Bai Xue and Lijun Zhang. *Improving Neural Network Verification through Spurious Region Guided Refinement*, 27th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Luxembourg, Luxembourg (online), Apr 2021.
@@ -77,6 +79,8 @@ Software stack is the core driving force behind the digital operation of industr
77
79
78
80
**Sample Work:**
79
81
82
+
[CCS 2025] Huan Sun, David Sanan, Jingyi Wang\*, Yongwang Zhao, Jun Sun and Wenhai Wang. *Generalized Security-Preserving Refinement for Concurrent Systems*. The 32nd ACM Conference on Computer and Communications Security, Taipei, China, Oct, 2025.
83
+
80
84
[ICSE 2025] Ziyu Mao, Jingyi Wang\*, Jun Sun, Shengchao Qin and Jiawen Xiong. *LLM-aided Automatic Modelling for Security Protocol Verification*. 47th International Conference on Software Engineering, Ottawa, Canada, Apr, 2025.
81
85
82
86
[WWW 2025] Xinyao Xu, Ziyu Mao, Jianzhong Su, Xingwei Lin, David Basin, Jun Sun and Jingyi Wang\*. *Quantitative Runtime Monitoring of Ethereum Transaction Attacks*. The Web Conference, Sydney, Australia, Apr, 2025.
0 commit comments