Junfeng Yang
Junfeng Yang
Associate Professor of Computer Science, Columbia University
Verified email at - Homepage
Cited by
Cited by
Deepxplore: Automated whitebox testing of deep learning systems
K Pei, Y Cao, J Yang, S Jana
proceedings of the 26th Symposium on Operating Systems Principles, 1-18, 2017
An empirical study of operating systems errors
A Chou, J Yang, B Chelf, S Hallem, D Engler
Proceedings of the eighteenth ACM symposium on Operating systems principles …, 2001
Formal security analysis of neural networks using symbolic intervals
S Wang, K Pei, J Whitehouse, J Yang, S Jana
27th USENIX Security Symposium (USENIX Security 18), 1599-1614, 2018
Towards making systems forget with machine unlearning
Y Cao, J Yang
2015 IEEE symposium on security and privacy, 463-480, 2015
Efficient formal safety analysis of neural networks
S Wang, K Pei, J Whitehouse, J Yang, S Jana
Advances in neural information processing systems 31, 2018
Using model checking to find serious file system errors
J Yang, P Twohey, D Engler, M Musuvathi
ACM Transactions on Computer Systems (TOCS) 24 (4), 393-423, 2006
MODIST: Transparent model checking of unmodified distributed systems
J Yang, T Chen, M Wu, Z Xu, X Liu, H Lin, M Yang, F Long, L Zhang, ...
Proceedings of the 6th USENIX symposium on Networked systems design and …, 2009
Neuzz: Efficient fuzzing with neural program smoothing
D She, K Pei, D Epstein, J Yang, B Ray, S Jana
2019 IEEE Symposium on Security and Privacy (SP), 803-817, 2019
Explode: a lightweight, general system for finding serious storage system errors
J Yang, C Sar, D Engler
Proceedings of the 7th symposium on Operating systems design and …, 2006
Metric learning for adversarial robustness
C Mao, Z Zhong, J Yang, C Vondrick, B Ray
Advances in neural information processing systems 32, 2019
Shuffler: fast and deployable continuous code {re-randomization}
D Williams-King, G Gobieski, K Williams-King, JP Blake, X Yuan, P Colp, ...
12th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2016
Correlation exploitation in error ranking
T Kremenek, K Ashcraft, J Yang, D Engler
ACM SIGSOFT Software Engineering Notes 29 (6), 83-93, 2004
Stable deterministic multithreading through schedule memoization
H Cui, J Wu, C Tsai, J Yang
9th OSDI, 2010
Automatically generating malicious disks using symbolic execution
J Yang, C Sar, P Twohey, C Cadar, D Engler
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-257, 2006
Efficiently, effectively detecting mobile app bugs with appdoctor
G Hu, X Yuan, Y Tang, J Yang
Proceedings of the Ninth European Conference on Computer Systems, 1-15, 2014
Fingerprinting event logs for system management troubleshooting
R Panigrahy, C Verbowski, Y Xie, J Yang, D Yuan
US Patent 8,069,374, 2011
Practical software model checking via dynamic interface reduction
H Guo, M Wu, L Zhou, G Hu, J Yang, L Zhang
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
Towards practical verification of machine learning: The case of computer vision systems
K Pei, L Zhu, Y Cao, J Yang, C Vondrick, S Jana
arXiv preprint arXiv:1712.01785, 2017
Overload control for scaling wechat microservices
H Zhou, M Chen, Q Lin, Y Wang, X She, S Liu, R Gu, BC Ooi, J Yang
Proceedings of the ACM Symposium on Cloud Computing, 149-161, 2018
Parrot: A practical runtime for deterministic, stable, and reliable threads
H Cui, J Simsa, YH Lin, H Li, B Blum, X Xu, J Yang, GA Gibson, RE Bryant
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20