Property inference attacks on fully connected neural networks using permutation invariant representations K Ganju, Q Wang, W Yang, CA Gunter, N Borisov Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 452 | 2018 |

Detecting ai trojans using meta neural analysis X Xu, Q Wang, H Li, N Borisov, CA Gunter, B Li 2021 IEEE Symposium on Security and Privacy (SP), 103-120, 2021 | 253 | 2021 |

Fear and logging in the internet of things Q Wang, WU Hassan, A Bates, C Gunter Network and Distributed Systems Symposium, 2018 | 244 | 2018 |

You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ... NDSS, 2020 | 152 | 2020 |

Charting the attack surface of trigger-action IoT platforms Q Wang, P Datta, W Yang, S Liu, A Bates, CA Gunter Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 148 | 2019 |

Cross-app poisoning in software-defined networking BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ... Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 55 | 2018 |

Automatic analysis of consistency properties of distributed transaction systems in Maude S Liu, PC Ölveczky, M Zhang, Q Wang, J Meseguer Tools and Algorithms for the Construction and Analysis of Systems: 25th …, 2019 | 19 | 2019 |

ROLA: A New Distributed Transaction Protocol and Its Formal Analysis. S Liu, PC Ölveczky, K Santhanam, Q Wang, I Gupta, J Meseguer FASE, 77-93, 2018 | 18 | 2018 |

Read atomic transactions with prevention of lost updates: ROLA and its formal analysis S Liu, PC Ölveczky, Q Wang, I Gupta, J Meseguer Formal Aspects of Computing 31, 503-540, 2019 | 15 | 2019 |

Formal modeling and analysis of the Walter transactional data store S Liu, PC Ölveczky, Q Wang, J Meseguer Rewriting Logic and Its Applications: 12th International Workshop, WRLA 2018 …, 2018 | 15 | 2018 |

Generating correct-by-construction distributed implementations from formal Maude designs S Liu, A Sandur, J Meseguer, PC Ölveczky, Q Wang NASA Formal Methods: 12th International Symposium, NFM 2020, Moffett Field …, 2020 | 13 | 2020 |

Extracting URLs from JavaScript via program analysis Q Wang, J Zhou, Y Chen, Y Zhang, J Zhao Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013 | 11 | 2013 |

Towards systematic parallel programming of graph problems via tree decomposition and tree parallelism Q Wang, M Chen, Y Liu, Z Hu Proceedings of the 2nd acm sigplan workshop on functional high-performance …, 2013 | 6 | 2013 |

Graph Learning for Interactive Threat Detection in Heterogeneous Smart Home Rule Data G Wang, N Ivanov, B Chen, Q Wang, TV Nguyen, Q Yan Proceedings of the ACM on Management of Data 1 (1), 1-27, 2023 | 5 | 2023 |

Provenance tracing in the internet of things Q Wang, WU Hassan, A Bates, C Gunter Proceedings of the 9th USENIX Conference on Theory and Practice of …, 2017 | 3 | 2017 |

Automatic transformation of formal maude designs into correct-by-construction distributed implementations S Liu, A Sandur, J Meseguer, PC Olveczky, Q Wang Technical report, 2019 | 2 | 2019 |

A New Distributed Transaction Protocol and Its Formal Analysis in Maude S Liu, PC Olveczky, K Santhanam, Q Wang, I Gupta, J Meseguer | 1 | 2018 |