default search action
Jingyi Wang 0004
Person information
- affiliation: Zhejiang University, China
- affiliation (former): Singapore University of Technology and Design, Singapore
Other persons with the same name
- Jingyi Wang — disambiguation page
- Jingyi Wang 0001 — Shenzhen University, College of Mathematics and Statistics, Shenzhen, China
- Jingyi Wang 0002 — University of Houston, Department of Electrical and Computer Engineering, Houston, TX, USA
- Jingyi Wang 0003 — Jiangsu University, Zhenjiang, China
- Jingyi Wang 0005 — University of British Columbia, Vancouver, Canada (and 1 more)
- Jingyi Wang 0006 — Yunnan University of Finance and Economics, China
- Jingyi Wang 0007 — Sichuan University, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Xiangshan Gao, Xingjun Ma, Jingyi Wang, Youcheng Sun, Bo Li, Shouling Ji, Peng Cheng, Jiming Chen:
VeriFi: Towards Verifiable Federated Unlearning. IEEE Trans. Dependable Secur. Comput. 21(6): 5720-5736 (2024) - [j12]Zhe Zhao, Guangke Chen, Tong Liu, Taishan Li, Fu Song, Jingyi Wang, Jun Sun:
Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples. ACM Trans. Softw. Eng. Methodol. 33(3): 68:1-68:45 (2024) - [j11]Shunkai Zhu, Jingyi Wang, Jun Sun, Jie Yang, Xingwei Lin, Tian Wang, Liyi Zhang, Peng Cheng:
Better Pay Attention Whilst Fuzzing. IEEE Trans. Software Eng. 50(2): 190-208 (2024) - [c27]Zichen Wang, Jingyi Wang, Fu Song, Kun Wang, Hongyi Pu, Peng Cheng:
K-RAPID: A Formal Executable Semantics of the RAPID Robot Programming Language. CPSS@AsiaCCS 2024: 64-76 - [c26]Jianan Ma, Pengfei Yang, Jingyi Wang, Youcheng Sun, Cheng-Chao Huang, Zhen Wang:
VeRe: Verification Guided Synthesis for Repairing Deep Neural Networks. ICSE 2024: 8:1-8:13 - [c25]Jialuo Chen, Jingyi Wang, Youcheng Sun, Peng Cheng, Jiming Chen:
Isolation-Based Debugging for Neural Networks. ISSTA 2024: 338-349 - [c24]Zuohui Chen, Jun Zhou, Youcheng Sun, Jingyi Wang, Qi Xuan, Xiaoniu Yang:
Interpretability Based Neural Network Repair. ISSTA 2024: 908-919 - [c23]Xiangshan Gao, Jialuo Chen, Jingyi Wang, Jie Shi, Peng Cheng, Jiming Chen:
TeDA: A Testing Framework for Data Usage Auditing in Deep Learning Model Development. ISSTA 2024: 1479-1490 - [i31]Xiaohan Yuan, Jinfeng Li, Dongxia Wang, Yuefeng Chen, Xiaofeng Mao, Longtao Huang, Hui Xue, Wenhai Wang, Kui Ren, Jingyi Wang:
S-Eval: Automatic and Adaptive Test Generation for Benchmarking Safety Evaluation of Large Language Models. CoRR abs/2405.14191 (2024) - [i30]Zhibo Wang, Peng Kuang, Zhixuan Chu, Jingyi Wang, Kui Ren:
Towards Real World Debiasing: A Fine-grained Analysis On Spurious Correlation. CoRR abs/2405.15240 (2024) - [i29]Xiaokun Luan, Xiyue Zhang, Jingyi Wang, Meng Sun:
Protecting Deep Learning Model Copyrights with Adversarial Example-Free Reuse Detection. CoRR abs/2407.03883 (2024) - [i28]Kun Wang, Christopher M. Poskitt, Yang Sun, Jun Sun, Jingyi Wang, Peng Cheng, Jiming Chen:
μDrive: User-Controlled Autonomous Driving. CoRR abs/2407.13201 (2024) - [i27]Jialuo Chen, Jingyi Wang, Xiyue Zhang, Youcheng Sun, Marta Kwiatkowska, Jiming Chen, Peng Cheng:
FAST: Boosting Uncertainty-based Test Prioritization Methods for Neural Networks via Feature Selection. CoRR abs/2409.09130 (2024) - 2023
- [j10]Yangyang Geng, Yuqi Chen, Rongkuan Ma, Qiang Wei, Jie Pan, Jingyi Wang, Peng Cheng, Qingxian Wang:
Defending Cyber-Physical Systems Through Reverse-Engineering-Based Memory Sanity Check. IEEE Internet Things J. 10(10): 8331-8347 (2023) - [j9]Yifan Jia, Christopher M. Poskitt, Peixin Zhang, Jingyi Wang, Jun Sun, Sudipta Chattopadhyay:
Boosting Adversarial Training in Safety-Critical Systems Through Boundary Data Selection. IEEE Robotics Autom. Lett. 8(12): 8350-8357 (2023) - [j8]Jialuo Chen, Jingyi Wang, Xingjun Ma, Youcheng Sun, Jun Sun, Peixin Zhang, Peng Cheng:
QuoTe: Quality-oriented Testing for Deep Learning Systems. ACM Trans. Softw. Eng. Methodol. 32(5): 125:1-125:33 (2023) - [j7]Mengdi Zhang, Jun Sun, Jingyi Wang, Bing Sun:
TestSGD: Interpretable Testing of Neural Networks against Subtle Group Discrimination. ACM Trans. Softw. Eng. Methodol. 32(6): 137:1-137:24 (2023) - [j6]Kun Wang, Jingyi Wang, Christopher M. Poskitt, Xiangxiang Chen, Jun Sun, Peng Cheng:
K-ST: A Formal Executable Semantics of the Structured Text Language for PLCs. IEEE Trans. Software Eng. 49(10): 4796-4813 (2023) - [c22]Wenya Wang, Xingwei Lin, Jingyi Wang, Wang Gao, Dawu Gu, Wei Lv, Jiashui Wang:
HODOR: Shrinking Attack Surface on Node.js via System Call Limitation. CCS 2023: 2800-2814 - [c21]Weipeng Jiang, Chao Shen, Chenhao Lin, Jingyi Wang, Jun Sun, Xuanqi Gao:
Black-Box Fairness Testing with Shadow Models. ICICS 2023: 467-484 - [c20]Jialuo Chen, Youcheng Sun, Jingyi Wang, Peng Cheng, Xingjun Ma:
DEEPJUDGE: A Testing Framework for Copyright Protection of Deep Learning Models. ICSE Companion 2023: 64-67 - [c19]Huizhong Guo, Jinfeng Li, Jingyi Wang, Xiangyu Liu, Dongxia Wang, Zehong Hu, Rong Zhang, Hui Xue:
FairRec: Fairness Testing for Deep Recommender Systems. ISSTA 2023: 310-321 - [i26]Huizhong Guo, Jinfeng Li, Jingyi Wang, Xiangyu Liu, Dongxia Wang, Zehong Hu, Rong Zhang, Hui Xue:
FairRec: Fairness Testing for Deep Recommender Systems. CoRR abs/2304.07030 (2023) - [i25]Xiaoxia Liu, Jingyi Wang, Jun Sun, Xiaohan Yuan, Guoliang Dong, Peng Di, Wenhai Wang, Dongxia Wang:
Prompting Frameworks for Large Language Models: A Survey. CoRR abs/2311.12785 (2023) - 2022
- [j5]Mengdi Zhang, Jun Sun, Jingyi Wang:
Which neural network makes more explainable decisions? An approach towards measuring explainability. Autom. Softw. Eng. 29(2): 39 (2022) - [j4]Peixin Zhang, Jingyi Wang, Jun Sun, Xinyu Wang, Guoliang Dong, Xingen Wang, Ting Dai, Jin Song Dong:
Automatic Fairness Testing of Neural Classifiers Through Adversarial Sampling. IEEE Trans. Software Eng. 48(9): 3593-3612 (2022) - [c18]Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, Jinyin Chen:
NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification. ICSE 2022: 1519-1531 - [c17]Jialuo Chen, Jingyi Wang, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, Dawn Song:
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models. SP 2022: 824-841 - [c16]Guoliang Dong, Jingyi Wang, Jun Sun, Sudipta Chattopadhyay, Xinyu Wang, Ting Dai, Jie Shi, Jin Song Dong:
Repairing Adversarial Texts Through Perturbation. TASE 2022: 29-48 - [i24]Guoliang Dong, Jingyi Wang, Jun Sun, Sudipta Chattopadhyay, Xinyu Wang, Ting Dai, Jie Shi, Jin Song Dong:
Repairing Adversarial Texts through Perturbation. CoRR abs/2201.02504 (2022) - [i23]Kun Wang, Jingyi Wang, Christopher M. Poskitt, Xiangxiang Chen, Jun Sun, Peng Cheng:
K-ST: A Formal Executable Semantics of PLC Structured Text Language. CoRR abs/2202.04076 (2022) - [i22]Xiangshan Gao, Xingjun Ma, Jingyi Wang, Youcheng Sun, Bo Li, Shouling Ji, Peng Cheng, Jiming Chen:
VeriFi: Towards Verifiable Federated Unlearning. CoRR abs/2205.12709 (2022) - [i21]Mengdi Zhang, Jun Sun, Jingyi Wang, Bing Sun:
TESTSGD: Interpretable Testing of Neural Networks Against Subtle Group Discrimination. CoRR abs/2208.11321 (2022) - [i20]Rongkuan Ma, Qiang Wei, Jingyi Wang, Shunkai Zhu, Shouling Ji, Peng Cheng, Yan Jia, Qingxian Wang:
Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study. CoRR abs/2212.14296 (2022) - 2021
- [j3]Yifan Jia, Jingyi Wang, Christopher M. Poskitt, Sudipta Chattopadhyay, Jun Sun, Yuqi Chen:
Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems. Int. J. Crit. Infrastructure Prot. 34: 100452 (2021) - [j2]Jingyi Wang, Jun Sun, Shengchao Qin, Cyrille Jégourel:
Automatically 'Verifying' Discrete-Time Complex Systems through Learning, Abstraction and Refinement. IEEE Trans. Software Eng. 47(1): 189-203 (2021) - [c15]Jingyi Wang, Jialuo Chen, Youcheng Sun, Xingjun Ma, Dongxia Wang, Jun Sun, Peng Cheng:
RobOT: Robustness-Oriented Testing for Deep Learning Systems. ICSE 2021: 300-311 - [c14]Zhe Zhao, Guangke Chen, Jingyi Wang, Yiwei Yang, Fu Song, Jun Sun:
Attack as defense: characterizing adversarial examples using robustness. ISSTA 2021: 42-55 - [c13]Pengfei Yang, Renjue Li, Jianlin Li, Cheng-Chao Huang, Jingyi Wang, Jun Sun, Bai Xue, Lijun Zhang:
Improving Neural Network Verification through Spurious Region Guided Refinement. TACAS (1) 2021: 389-408 - [i19]Jingyi Wang, Jialuo Chen, Youcheng Sun, Xingjun Ma, Dongxia Wang, Jun Sun, Peng Cheng:
RobOT: Robustness-Oriented Testing for Deep Learning Systems. CoRR abs/2102.05913 (2021) - [i18]Zhe Zhao, Guangke Chen, Jingyi Wang, Yiwei Yang, Fu Song, Jun Sun:
Attack as Defense: Characterizing Adversarial Examples using Robustness. CoRR abs/2103.07633 (2021) - [i17]Yifan Jia, Jingyi Wang, Christopher M. Poskitt, Sudipta Chattopadhyay, Jun Sun, Yuqi Chen:
Adversarial Attacks and Mitigation for Anomaly Detectors of Cyber-Physical Systems. CoRR abs/2105.10707 (2021) - [i16]Peixin Zhang, Jingyi Wang, Jun Sun, Xinyu Wang, Guoliang Dong, Xingen Wang, Ting Dai, Jin Song Dong:
Automatic Fairness Testing of Neural Classifiers through Adversarial Sampling. CoRR abs/2107.08176 (2021) - [i15]Peixin Zhang, Jingyi Wang, Jun Sun, Xinyu Wang:
Fairness Testing of Deep Image Classification with Adequacy Metrics. CoRR abs/2111.08856 (2021) - [i14]Jialuo Chen, Jingyi Wang, Tinglan Peng, Youcheng Sun, Peng Cheng, Shouling Ji, Xingjun Ma, Bo Li, Dawn Song:
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models. CoRR abs/2112.05588 (2021) - [i13]Shunkai Zhu, Jingyi Wang, Jun Sun, Jie Yang, Xingwei Lin, Liyi Zhang, Peng Cheng:
Better Pay Attention Whilst Fuzzing. CoRR abs/2112.07143 (2021) - [i12]Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, Jinyin Chen:
NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification. CoRR abs/2112.13214 (2021) - 2020
- [c12]Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Ting Dai:
An Empirical Study on Correlation between Coverage and Robustness for Deep Neural Networks. ICECCS 2020: 73-82 - [c11]Peixin Zhang, Jingyi Wang, Jun Sun, Guoliang Dong, Xinyu Wang, Xingen Wang, Jin Song Dong, Ting Dai:
White-box fairness testing through adversarial sampling. ICSE 2020: 949-960 - [c10]Guoliang Dong, Jingyi Wang, Jun Sun, Yang Zhang, Xinyu Wang, Ting Dai, Jin Song Dong, Xingen Wang:
Towards Interpreting Recurrent Neural Networks through Probabilistic Abstraction. ASE 2020: 499-510 - [i11]Pengfei Yang, Renjue Li, Jianlin Li, Cheng-Chao Huang, Jingyi Wang, Jun Sun, Bai Xue, Lijun Zhang:
Improving Neural Network Verification through Spurious Region Guided Refinement. CoRR abs/2010.07722 (2020) - [i10]Guoliang Dong, Jun Sun, Jingyi Wang, Xinyu Wang, Ting Dai:
Towards Repairing Neural Networks Correctly. CoRR abs/2012.01872 (2020)
2010 – 2019
- 2019
- [c9]Jingyi Wang, Guoliang Dong, Jun Sun, Xinyu Wang, Peixin Zhang:
Adversarial sample detection for deep neural network through model mutation testing. ICSE 2019: 1245-1256 - [i9]Guoliang Dong, Jingyi Wang, Jun Sun, Yang Zhang, Xinyu Wang, Ting Dai, Jin Song Dong:
Analyzing Recurrent Neural Network by Probabilistic Abstraction. CoRR abs/1909.10023 (2019) - [i8]Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Dai Ting:
There is Limited Correlation between Coverage and Robustness for Deep Neural Networks. CoRR abs/1911.05904 (2019) - 2018
- [j1]Jingyi Wang, Jun Sun, Qixia Yuan, Jun Pang:
Learning probabilistic models for model checking: an evolutionary approach and an empirical study. Int. J. Softw. Tools Technol. Transf. 20(6): 689-704 (2018) - [c8]Cyrille Jégourel, Jingyi Wang, Jun Sun:
Importance Sampling of Interval Markov Chains. DSN 2018: 303-313 - [c7]Jingyi Wang, Jun Sun, Yifan Jia, Shengchao Qin, Zhiwu Xu:
Towards 'Verifying' a Water Treatment System. FM 2018: 73-92 - [c6]Xinyu Wang, Jun Sun, Zhenbang Chen, Peixin Zhang, Jingyi Wang, Yun Lin:
Towards optimal concolic testing. ICSE 2018: 291-302 - [i7]Jingyi Wang, Jun Sun, Peixin Zhang, Xinyu Wang:
Detecting Adversarial Samples for Deep Neural Networks through Mutation Testing. CoRR abs/1805.05010 (2018) - [i6]Jingyi Wang, Guoliang Dong, Jun Sun, Xinyu Wang, Peixin Zhang:
Adversarial Sample Detection for Deep Neural Network through Model Mutation Testing. CoRR abs/1812.05793 (2018) - 2017
- [c5]Jingyi Wang, Jun Sun, Qixia Yuan, Jun Pang:
Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study. FASE 2017: 3-21 - [c4]Long H. Pham, Jun Sun, Lyly Tran Thi, Jingyi Wang, Xin Peng:
Learning Likely Invariants to Explain Why a Program Fails. ICECCS 2017: 70-79 - [c3]Jingyi Wang, Xiaohong Chen, Jun Sun, Shengchao Qin:
Improving Probability Estimation Through Active Probabilistic Model Learning. ICFEM 2017: 379-395 - [i5]Jingyi Wang, Jun Sun, Yifan Jia:
Toward 'verifying' a Water Treatment System. CoRR abs/1712.04155 (2017) - 2016
- [c2]Pingfan Kong, Yi Li, Xiaohong Chen, Jun Sun, Meng Sun, Jingyi Wang:
Towards Concolic Testing for Hybrid Systems. FM 2016: 460-478 - [c1]Manman Chen, Tian Huat Tan, Jun Sun, Jingyi Wang, Yang Liu, Jing Sun, Jin Song Dong:
Service Adaptation with Probabilistic Partial Models. ICFEM 2016: 122-140 - [i4]Jingyi Wang, Jun Sun, Qixia Yuan, Jun Pang:
Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study. CoRR abs/1605.08278 (2016) - [i3]Pingfan Kong, Yi Li, Xiaohong Chen, Jun Sun, Meng Sun, Jingyi Wang:
Towards Concolic Testing for Hybrid Systems. CoRR abs/1608.08754 (2016) - [i2]Jingyi Wang, Jun Sun, Shengchao Qin:
Verifying Complex Systems Probabilistically through Learning, Abstraction and Refinement. CoRR abs/1610.06371 (2016) - [i1]Jun Sun, Long H. Pham, Lyly Tran Thi, Jingyi Wang, Xin Peng:
Learning Likely Invariants to Explain Why a Program Fails. CoRR abs/1610.08607 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint