Kexin Pei
Kexin Pei
Ph.D., Computer Science, Columbia University
Verified email at - Homepage
Cited by
Cited by
Deeptest: Automated testing of deep-neural-network-driven autonomous cars
Y Tian, K Pei, S Jana, B Ray
Proceedings of the 40th international conference on software engineering …, 2018
DeepXplore: Automated Whitebox Testing of Deep Learning Systems
K Pei, Y Cao, J Yang, S Jana
Proceedings of the 26th Symposium on Operating Systems Principles, 1--18, 2017
Formal security analysis of neural networks using symbolic intervals
S Wang, K Pei, J Whitehouse, J Yang, S Jana
27th {USENIX} Security Symposium ({USENIX} Security 18), 1599-1614, 2018
Efficient formal safety analysis of neural networks
S Wang, K Pei, J Whitehouse, J Yang, S Jana
Advances in Neural Information Processing Systems 31, 2018
Neuzz: Efficient fuzzing with neural program smoothing
D She, K Pei, D Epstein, J Yang, B Ray, S Jana
2019 IEEE Symposium on Security and Privacy (SP), 803-817, 2019
Hercule: Attack story reconstruction via community discovery on correlated log graph
K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang, L Si, X Zhang, ...
Proceedings of the 32Nd Annual Conference on Computer Security Applications …, 2016
Towards practical verification of machine learning: The case of computer vision systems
K Pei, L Zhu, Y Cao, J Yang, C Vondrick, S Jana
ICSE 2019 Workshop on Testing for Deep Learning and Deep Learning for …, 2019
HVLearn: Automated black-box analysis of hostname verification in SSL/TLS implementations
S Sivakorn, G Argyros, K Pei, AD Keromytis, S Jana
2017 IEEE Symposium on Security and Privacy (SP), 521-538, 2017
Python probabilistic type inference with natural language support
Z Xu, X Zhang, L Chen, K Pei, B Xu
Proceedings of the 2016 24th ACM SIGSOFT international symposium on …, 2016
Leaps: Detecting camouflaged attacks with statistical learning guided by program analysis
Z Gu, K Pei, Q Wang, L Si, X Zhang, D Xu
Proceedings of the 2015 45th Annual IEEE/IFIP International Conference on …, 2015
TREX: Learning Execution Semantics from Micro-Traces for Binary Similarity
K Pei, Z Xuan, J Yang, S Jana, B Ray
IEEE Transactions on Software Engineering, 2020
Private search on key-value stores with hierarchical indexes
H Hu, J Xu, X Xu, K Pei, B Choi, S Zhou
Proceedings of the 2014 IEEE 30th International Conference on Data …, 2014
XDA: Accurate, Robust Disassembly with Transfer Learning
K Pei, J Guan, D Williams-King, J Yang, S Jana
2021 Network and Distributed System Security Symposium (NDSS 2021), 2020
StateFormer: Fine-Grained Type Recovery from Binaries Using Generative State Modeling
K Pei, J Guan, M Broughton, Z Chen, S Yao, D Williams-King, ...
Proceedings of the 29th ACM Joint European Software Engineering Conference …, 2021
SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embeddings
X Jin, K Pei, JY Won, Z Lin
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
Bringing engineering rigor to Deep Learning
K Pei, S Wang, Y Tian, J Whitehouse, C Vondrick, Y Cao, B Ray, S Jana, ...
ACM SIGOPS Operating Systems Review 53 (1), 59-67, 2019
TraceFixer: Execution Trace-Driven Program Repair
I Bouzenia, Y Ding, K Pei, B Ray, M Pradel
arXiv preprint arXiv:2304.12743, 2023
Development of a Neural Network-Based Mathematical Operation Protocol for Embedded Hexadecimal Digits Using Neural Architecture Search (NAS)
V Robila, K Pei, J Yang
arXiv preprint arXiv:2211.15416, 2022
NeuDep: neural binary memory dependence analysis
K Pei, D She, M Wang, S Geng, Z Xuan, Y David, J Yang, S Jana, B Ray
Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022
Bridging statistical learning and formal reasoning for cyber attack detection
K Pei
Purdue University, 2016
The system can't perform the operation now. Try again later.
Articles 1–20