Author of the publication

AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation.

, , , , , and . IEEE Symposium on Security and Privacy, page 3-18. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fail-Secure Access Control., , , and . ACM Conference on Computer and Communications Security, page 1157-1168. ACM, (2014)Force Open: Lightweight black box file repair., , , and . Digit. Investig., (2017)Securify: Practical Security Analysis of Smart Contracts., , , , , and . CoRR, (2018)Decentralized Composite Access Control., , , and . POST, volume 8414 of Lecture Notes in Computer Science, page 245-264. Springer, (2014)Test execution checkpointing for web applications., , , , and . ISSTA, page 203-214. ACM, (2017)Probabilistic Verification of Network Configurations., , , , and . SIGCOMM, page 750-764. ACM, (2020)DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization., , , , and . ACM Conference on Computer and Communications Security, page 508-524. ACM, (2018)Toward Mission-Critical AI: Interpretable, Actionable, and Resilient AI., , , , , , , , and . CyCon, page 181-197. IEEE, (2023)Automated Discovery of Adaptive Attacks on Adversarial Defenses., , , and . NeurIPS, page 26858-26870. (2021)Execution Hijacking: Improving Dynamic Analysis by Flying off Course., , , and . ICST, page 200-209. IEEE Computer Society, (2011)