Skip to main content

Showing 1–49 of 49 results for author: Dong, J S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.17317  [pdf, ps, other

    cs.CR

    Beyond the Scope: Security Testing of Permission Management in Team Workspace

    Authors: Liuhuo Wan, Chuan Yan, Mark Huasong Meng, Kailong Wang, Haoyu Wang, Guangdong Bai, Jin Song Dong

    Abstract: Nowadays team workspaces are widely adopted for multi-user collaboration and digital resource management. To further broaden real-world applications, mainstream team workspaces platforms, such as Google Workspace and Microsoft OneDrive, allow third-party applications (referred to as add-ons) to be integrated into their workspaces, significantly extending the functionality of team workspaces. The p… ▽ More

    Submitted 18 June, 2025; originally announced June 2025.

  2. arXiv:2506.17315  [pdf, ps, other

    cs.CR cs.SE

    Tracking GPTs Third Party Service: Automation, Analysis, and Insights

    Authors: Chuan Yan, Liuhuo Wan, Bowei Guan, Fengqi Yu, Guangdong Bai, Jin Song Dong

    Abstract: ChatGPT has quickly advanced from simple natural language processing to tackling more sophisticated and specialized tasks. Drawing inspiration from the success of mobile app ecosystems, OpenAI allows developers to create applications that interact with third-party services, known as GPTs. GPTs can choose to leverage third-party services to integrate with specialized APIs for domain-specific applic… ▽ More

    Submitted 18 June, 2025; originally announced June 2025.

    Comments: The 1st International Workshop on LLM App Store Analysis (LLMapp 2025)

  3. arXiv:2506.07385  [pdf, ps, other

    cs.SE

    GUIPilot: A Consistency-based Mobile GUI Testing Approach for Detecting Application-specific Bugs

    Authors: Ruofan Liu, Xiwen Teoh, Yun Lin, Guanjie Chen, Ruofei Ren, Denys Poshyvanyk, Jin Song Dong

    Abstract: In this work, we propose GUIPilot, an approach for detecting inconsistencies between the mobile design and their implementations. The mobile design usually consists of design mock-ups that specify (1) the expected screen appearances (e.g., widget layouts, colors, and shapes) and (2) the expected screen behaviors, regarding how one screen can transition into another (e.g., labeled widgets with text… ▽ More

    Submitted 8 June, 2025; originally announced June 2025.

  4. arXiv:2506.04608  [pdf, ps, other

    cs.LG

    Ignoring Directionality Leads to Compromised Graph Neural Network Explanations

    Authors: Changsheng Sun, Xinke Li, Jin Song Dong

    Abstract: Graph Neural Networks (GNNs) are increasingly used in critical domains, where reliable explanations are vital for supporting human decision-making. However, the common practice of graph symmetrization discards directional information, leading to significant information loss and misleading explanations. Our analysis demonstrates how this practice compromises explanation fidelity. Through theoretica… ▽ More

    Submitted 4 June, 2025; originally announced June 2025.

    Journal ref: 2025 IEEE Security and Privacy (Workshops)

  5. arXiv:2505.18585  [pdf, ps, other

    cs.AI cs.CL cs.LO

    RvLLM: LLM Runtime Verification with Domain Knowledge

    Authors: Yedi Zhang, Sun Yi Emma, Annabelle Lee Jia En, Jin Song Dong

    Abstract: Large language models (LLMs) have emerged as a dominant AI paradigm due to their exceptional text understanding and generation capabilities. However, their tendency to generate inconsistent or erroneous outputs challenges their reliability, especially in high-stakes domains requiring accuracy and trustworthiness. Existing research primarily focuses on detecting and mitigating model misbehavior in… ▽ More

    Submitted 27 May, 2025; v1 submitted 24 May, 2025; originally announced May 2025.

    Comments: 12 pages, 2 figures

  6. arXiv:2505.11861  [pdf, ps, other

    cs.AI cs.CL

    Fair-PP: A Synthetic Dataset for Aligning LLM with Personalized Preferences of Social Equity

    Authors: Qi Zhou, Jie Zhang, Dongxia Wang, Qiang Liu, Tianlin Li, Jin Song Dong, Wenhai Wang, Qing Guo

    Abstract: Human preference plays a crucial role in the refinement of large language models (LLMs). However, collecting human preference feedback is costly and most existing datasets neglect the correlation between personalization and preferences. To address this issue, we introduce Fair-PP, a synthetic dataset of personalized preferences targeting social equity, derived from real-world social survey data, w… ▽ More

    Submitted 17 May, 2025; originally announced May 2025.

    Comments: under review

    MSC Class: 91C99 ACM Class: I.2.7; J.4

  7. arXiv:2505.08292  [pdf, ps, other

    cs.CR

    On the Account Security Risks Posed by Password Strength Meters

    Authors: Ming Xu, Weili Han, Jitao Yu, Jing Liu, Xinyi Zhang, Yun Lin, Jin Song Dong

    Abstract: Password strength meters (PSMs) have been widely used by websites to gauge password strength, encouraging users to create stronger passwords. Popular data-driven PSMs, e.g., based on Markov, Probabilistic Context-free Grammar (PCFG) and neural networks, alarm strength based on a model learned from real passwords. Despite their proven effectiveness, the secure utility that arises from the leakage o… ▽ More

    Submitted 13 May, 2025; originally announced May 2025.

  8. arXiv:2504.08222  [pdf, other

    cs.CV cs.AI

    F$^3$Set: Towards Analyzing Fast, Frequent, and Fine-grained Events from Videos

    Authors: Zhaoyu Liu, Kan Jiang, Murong Ma, Zhe Hou, Yun Lin, Jin Song Dong

    Abstract: Analyzing Fast, Frequent, and Fine-grained (F$^3$) events presents a significant challenge in video analytics and multi-modal LLMs. Current methods struggle to identify events that satisfy all the F$^3$ criteria with high accuracy due to challenges such as motion blur and subtle visual discrepancies. To advance research in video understanding, we introduce F$^3$Set, a benchmark that consists of vi… ▽ More

    Submitted 14 April, 2025; v1 submitted 10 April, 2025; originally announced April 2025.

    Comments: ICLR 2025; Website URL: https://lzyandy.github.io/f3set-website/

  9. arXiv:2504.00858  [pdf, other

    cs.CR cs.LG cs.SD

    Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems

    Authors: Weifei Jin, Yuxin Cao, Junjie Su, Derui Wang, Yedi Zhang, Minhui Xue, Jie Hao, Jin Song Dong, Yixian Yang

    Abstract: The widespread application of automatic speech recognition (ASR) supports large-scale voice surveillance, raising concerns about privacy among users. In this paper, we concentrate on using adversarial examples to mitigate unauthorized disclosure of speech privacy thwarted by potential eavesdroppers in speech communications. While audio adversarial examples have demonstrated the capability to misle… ▽ More

    Submitted 1 April, 2025; originally announced April 2025.

    Comments: Accept to USENIX Security 2025

  10. arXiv:2503.22575  [pdf, other

    cs.SE cs.AI

    On the Mistaken Assumption of Interchangeable Deep Reinforcement Learning Implementations

    Authors: Rajdeep Singh Hundal, Yan Xiao, Xiaochun Cao, Jin Song Dong, Manuel Rigger

    Abstract: Deep Reinforcement Learning (DRL) is a paradigm of artificial intelligence where an agent uses a neural network to learn which actions to take in a given environment. DRL has recently gained traction from being able to solve complex environments like driving simulators, 3D robotic control, and multiplayer-online-battle-arena video games. Numerous implementations of the state-of-the-art algorithms… ▽ More

    Submitted 28 March, 2025; originally announced March 2025.

    Comments: To be published in the 47th International Conference on Software Engineering (ICSE 2025)

    ACM Class: D.2.5; I.2.6

  11. arXiv:2502.16286  [pdf, other

    cs.CR cs.AI cs.LG

    Verification of Bit-Flip Attacks against Quantized Neural Networks

    Authors: Yedi Zhang, Lei Huang, Pengfei Gao, Fu Song, Jun Sun, Jin Song Dong

    Abstract: In the rapidly evolving landscape of neural network security, the resilience of neural networks against bit-flip attacks (i.e., an attacker maliciously flips an extremely small amount of bits within its parameter storage memory system to induce harmful behavior), has emerged as a relevant area of research. Existing studies suggest that quantization may serve as a viable defense against such attack… ▽ More

    Submitted 22 February, 2025; originally announced February 2025.

    Comments: 37 pages, 13 figures, 14 tables

  12. arXiv:2501.19180  [pdf, other

    cs.CR cs.AI

    Enhancing Model Defense Against Jailbreaks with Proactive Safety Reasoning

    Authors: Xianglin Yang, Gelei Deng, Jieming Shi, Tianwei Zhang, Jin Song Dong

    Abstract: Large language models (LLMs) are vital for a wide range of applications yet remain susceptible to jailbreak threats, which could lead to the generation of inappropriate responses. Conventional defenses, such as refusal and adversarial training, often fail to cover corner cases or rare domains, leaving LLMs still vulnerable to more sophisticated attacks. We propose a novel defense strategy, Safety… ▽ More

    Submitted 31 January, 2025; originally announced January 2025.

  13. arXiv:2501.18452  [pdf, other

    cs.LG cs.AI

    Clustering Properties of Self-Supervised Learning

    Authors: Xi Weng, Jianing An, Xudong Ma, Binhang Qi, Jie Luo, Xi Yang, Jin Song Dong, Lei Huang

    Abstract: Self-supervised learning (SSL) methods via joint embedding architectures have proven remarkably effective at capturing semantically rich representations with strong clustering properties, magically in the absence of label supervision. Despite this, few of them have explored leveraging these untapped properties to improve themselves. In this paper, we provide an evidence through various metrics tha… ▽ More

    Submitted 11 May, 2025; v1 submitted 30 January, 2025; originally announced January 2025.

    Comments: Accepted at ICML 2025

  14. arXiv:2501.16843  [pdf, other

    cs.CR

    Bones of Contention: Exploring Query-Efficient Attacks Against Skeleton Recognition Systems

    Authors: Yuxin Cao, Kai Ye, Derui Wang, Minhui Xue, Hao Ge, Chenxiong Qian, Jin Song Dong

    Abstract: Skeleton action recognition models have secured more attention than video-based ones in various applications due to privacy preservation and lower storage requirements. Skeleton data are typically transmitted to cloud servers for action recognition, with results returned to clients via Apps/APIs. However, the vulnerability of skeletal models against adversarial perturbations gradually reveals the… ▽ More

    Submitted 28 January, 2025; originally announced January 2025.

    Comments: 13 pages, 13 figures

  15. arXiv:2412.12722  [pdf, other

    cs.CV cs.AI cs.CR

    Defending LVLMs Against Vision Attacks through Partial-Perception Supervision

    Authors: Qi Zhou, Tianlin Li, Qing Guo, Dongxia Wang, Yun Lin, Yang Liu, Jin Song Dong

    Abstract: Recent studies have raised significant concerns regarding the vulnerability of Large Vision Language Models (LVLMs) to maliciously injected or perturbed input images, which can mislead their responses. Existing defense methods show that such vision attacks are sensitive to image modifications especially cropping, using majority voting across responses of modified images as corrected responses. How… ▽ More

    Submitted 17 December, 2024; originally announced December 2024.

  16. arXiv:2412.10872  [pdf, other

    cs.CR

    IntelEX: A LLM-driven Attack-level Threat Intelligence Extraction Framework

    Authors: Ming Xu, Hongtai Wang, Jiahao Liu, Yun Lin, Chenyang Xu Yingshi Liu, Hoon Wei Lim, Jin Song Dong

    Abstract: To combat increasingly sophisticated cyberattacks, a common practice is to transform unstructured cyber threat intelligence (CTI) reports into structured intelligence, facilitating threat-focused security tasks such as summarizing detection rules or simulating attack scenarios for red team exercises.

    Submitted 14 December, 2024; originally announced December 2024.

    Comments: 17 pages

  17. arXiv:2412.06512  [pdf, other

    cs.AI cs.CL cs.SE

    The Fusion of Large Language Models and Formal Methods for Trustworthy AI Agents: A Roadmap

    Authors: Yedi Zhang, Yufan Cai, Xinyue Zuo, Xiaokun Luan, Kailong Wang, Zhe Hou, Yifan Zhang, Zhiyuan Wei, Meng Sun, Jun Sun, Jing Sun, Jin Song Dong

    Abstract: Large Language Models (LLMs) have emerged as a transformative AI paradigm, profoundly influencing daily life through their exceptional language understanding and contextual generation capabilities. Despite their remarkable performance, LLMs face a critical challenge: the propensity to produce unreliable outputs due to the inherent limitations of their learning-based nature. Formal methods (FMs), o… ▽ More

    Submitted 9 December, 2024; originally announced December 2024.

    Comments: 24 pages, 4 figures

  18. arXiv:2411.15587  [pdf, other

    cs.SE

    ConAIR:Consistency-Augmented Iterative Interaction Framework to Enhance the Reliability of Code Generation

    Authors: Jinhao Dong, Jun Sun, Wenjie Zhang, Jin Song Dong, Dan Hao

    Abstract: Code generation techniques generate code snippets automatically based on the problem requirements in natural language. Recently, large language models (LLMs) achieve the SOTA performance on code generation. However, LLMs still struggle at times to generate accurate code, which diminishes their promised efficiency as developers must spend significant effort evaluating and debugging the generated co… ▽ More

    Submitted 23 November, 2024; originally announced November 2024.

  19. arXiv:2410.19245  [pdf, other

    cs.SE cs.CV cs.MA

    MaCTG: Multi-Agent Collaborative Thought Graph for Automatic Programming

    Authors: Zixiao Zhao, Jing Sun, Zhe Hou, Zhiyuan Wei, Cheng-Hao Cai, Miao Qiao, Jin Song Dong

    Abstract: With the rapid advancement of Large Language Models (LLMs), LLM-based approaches have demonstrated strong problem-solving capabilities across various domains. However, in automatic programming, a single LLM is typically limited to function-level code generation, while multi-agent systems composed of multiple LLMs often suffer from inefficient task planning. This lack of structured coordination can… ▽ More

    Submitted 21 April, 2025; v1 submitted 24 October, 2024; originally announced October 2024.

  20. arXiv:2410.06848  [pdf, other

    cs.LG

    Forgetting Through Transforming: Enabling Federated Unlearning via Class-Aware Representation Transformation

    Authors: Qi Guo, Zhen Tian, Minghao Yao, Yong Qi, Saiyu Qi, Yun Li, Jin Song Dong

    Abstract: Federated Unlearning (FU) enables clients to selectively remove the influence of specific data from a trained federated learning model, addressing privacy concerns and regulatory requirements. However, existing FU methods often struggle to balance effective erasure with model utility preservation, especially for class-level unlearning in non-IID settings. We propose Federated Unlearning via Class-… ▽ More

    Submitted 9 October, 2024; originally announced October 2024.

  21. arXiv:2409.10411  [pdf, ps, other

    cs.CR cs.SE

    Assessing Privacy Compliance of Android Third-Party SDKs

    Authors: Mark Huasong Meng, Chuan Yan, Qing Zhang, Zeyu Wang, Kailong Wang, Sin Gee Teo, Guangdong Bai, Jin Song Dong

    Abstract: Third-party Software Development Kits (SDKs) are widely adopted in Android app development, to effortlessly accelerate development pipelines and enhance app functionality. However, this convenience raises substantial concerns about unauthorized access to users' privacy-sensitive information, which could be further abused for illegitimate purposes like user tracking or monetization. Our study offer… ▽ More

    Submitted 18 June, 2025; v1 submitted 16 September, 2024; originally announced September 2024.

    Comments: 14 pages

  22. arXiv:2409.05028  [pdf, other

    cs.SE cs.CL

    LLM-based Abstraction and Concretization for GUI Test Migration

    Authors: Yakun Zhang, Chen Liu, Xiaofei Xie, Yun Lin, Jin Song Dong, Dan Hao, Lu Zhang

    Abstract: GUI test migration aims to produce test cases with events and assertions to test specific functionalities of a target app. Existing migration approaches typically focus on the widget-mapping paradigm that maps widgets from source apps to target apps. However, since different apps may implement the same functionality in different ways, direct mapping may result in incomplete or buggy test cases, th… ▽ More

    Submitted 8 September, 2024; originally announced September 2024.

  23. CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature

    Authors: Chenyan Liu, Yufan Cai, Yun Lin, Yuhuan Huang, Yunrui Pei, Bo Jiang, Ping Yang, Jin Song Dong, Hong Mei

    Abstract: Recent years have seen the development of LLM-based code generation. Compared to generating code in a software project, incremental code edits are empirically observed to be more frequent. The emerging code editing approaches usually formulate the problem as generating an edit based on known relevant prior edits and context. However, practical code edits can be more complicated. First, an editing… ▽ More

    Submitted 3 August, 2024; originally announced August 2024.

    Comments: 13 pages, 7 figures

  24. arXiv:2407.17215  [pdf, other

    cs.SE cs.LO

    Formalizing UML State Machines for Automated Verification -- A Survey

    Authors: Étienne André, Shuang Liu, Yang Liu, Christine Choppy, Jun Sun, Jin Song Dong

    Abstract: The Unified Modeling Language (UML) is a standard for modeling dynamic systems. UML behavioral state machines are used for modeling the dynamic behavior of object-oriented designs. The UML specification, maintained by the Object Management Group (OMG), is documented in natural language (in contrast to formal language). The inherent ambiguity of natural languages may introduce inconsistencies in th… ▽ More

    Submitted 24 July, 2024; originally announced July 2024.

    Comments: This is the author version of the manuscript of the same name published in ACM Computing Surveys

    Journal ref: ACM Computing Surveys, Volume 55, Issue 13s, Article No.: 277, Pages 1-47, 2023

  25. arXiv:2407.02073  [pdf, other

    cs.LG

    Contribution Evaluation of Heterogeneous Participants in Federated Learning via Prototypical Representations

    Authors: Qi Guo, Minghao Yao, Zhen Tian, Saiyu Qi, Yong Qi, Yun Lin, Jin Song Dong

    Abstract: Contribution evaluation in federated learning (FL) has become a pivotal research area due to its applicability across various domains, such as detecting low-quality datasets, enhancing model robustness, and designing incentive mechanisms. Existing contribution evaluation methods, which primarily rely on data volume, model similarity, and auxiliary test datasets, have shown success in diverse scena… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

  26. arXiv:2406.18616  [pdf, other

    cs.SE cs.AI cs.CL

    Towards Large Language Model Aided Program Refinement

    Authors: Yufan Cai, Zhe Hou, Xiaokun Luan, David Miguel Sanan Baena, Yun Lin, Jun Sun, Jin Song Dong

    Abstract: Program refinement involves correctness-preserving transformations from formal high-level specification statements into executable programs. Traditional verification tool support for program refinement is highly interactive and lacks automation. On the other hand, the emergence of large language models (LLMs) enables automatic code generations from informal natural language specifications. However… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

    ACM Class: K.6.3

  27. arXiv:2405.15135  [pdf, other

    cs.LG

    Exploring the Evolution of Hidden Activations with Live-Update Visualization

    Authors: Xianglin Yang, Jin Song Dong

    Abstract: Monitoring the training of neural networks is essential for identifying potential data anomalies, enabling timely interventions and conserving significant computational resources. Apart from the commonly used metrics such as losses and validation accuracies, the hidden representation could give more insight into the model progression. To this end, we introduce SentryCam, an automated, real-time vi… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: Preprint

  28. arXiv:2405.14169  [pdf, other

    cs.CV

    Towards Transferable Attacks Against Vision-LLMs in Autonomous Driving with Typography

    Authors: Nhat Chung, Sensen Gao, Tuan-Anh Vu, Jie Zhang, Aishan Liu, Yun Lin, Jin Song Dong, Qing Guo

    Abstract: Vision-Large-Language-Models (Vision-LLMs) are increasingly being integrated into autonomous driving (AD) systems due to their advanced visual-language reasoning capabilities, targeting the perception, prediction, planning, and control mechanisms. However, Vision-LLMs have demonstrated susceptibilities against various types of adversarial attacks, which would compromise their reliability and safet… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: 12 pages, 5 tables, 5 figures, work in progress

  29. arXiv:2405.00074  [pdf, ps, other

    cs.LG

    PAODING: A High-fidelity Data-free Pruning Toolkit for Debloating Pre-trained Neural Networks

    Authors: Mark Huasong Meng, Hao Guan, Liuhuo Wan, Sin Gee Teo, Guangdong Bai, Jin Song Dong

    Abstract: We present PAODING, a toolkit to debloat pretrained neural network models through the lens of data-free pruning. To preserve the model fidelity, PAODING adopts an iterative process, which dynamically measures the effect of deleting a neuron to identify candidates that have the least impact to the output layer. Our evaluation shows that PAODING can significantly reduce the model size, generalize on… ▽ More

    Submitted 18 June, 2025; v1 submitted 30 April, 2024; originally announced May 2024.

    Comments: 3 pages

  30. arXiv:2310.00399  [pdf, other

    cs.SE

    Empirical Study on Transformer-based Techniques for Software Engineering

    Authors: Yan Xiao, Xinyue Zuo, Lei Xue, Kailong Wang, Jin Song Dong, Ivan Beschastnikh

    Abstract: Many Transformer-based pre-trained models for code have been developed and applied to code-related tasks. In this paper, we review the existing literature, examine the suitability of model architectures for different tasks, and look at the generalization ability of models on different datasets, and their resource consumption. We examine three very representative pre-trained models for code: Code… ▽ More

    Submitted 30 September, 2023; originally announced October 2023.

  31. Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective

    Authors: Mark Huasong Meng, Guangdong Bai, Sin Gee Teo, Zhe Hou, Yan Xiao, Yun Lin, Jin Song Dong

    Abstract: Neural networks have been widely applied in security applications such as spam and phishing detection, intrusion prevention, and malware detection. This black-box method, however, often has uncertainty and poor explainability in applications. Furthermore, neural networks themselves are often vulnerable to adversarial attacks. For those reasons, there is a high demand for trustworthy and rigorous m… ▽ More

    Submitted 11 October, 2022; v1 submitted 24 June, 2022; originally announced June 2022.

  32. arXiv:2206.02083  [pdf, other

    cs.SE cs.PL

    Geometric Theory for Program Testing

    Authors: Bernhard Moller, Tony Hoare, Zhe Hou, Jin Song Dong

    Abstract: Formal methods for verification of programs are extended to testing of programs. Their combination is intended to lead to benefits in reliable program development, testing, and evolution. Our geometric theory of testing is intended to serve as the specification of a testing environment, included as the last stage of a toolchain that assists professional programmers, amateurs, and students of Compu… ▽ More

    Submitted 4 June, 2022; originally announced June 2022.

  33. Supervised Robustness-preserving Data-free Neural Network Pruning

    Authors: Mark Huasong Meng, Guangdong Bai, Sin Gee Teo, Jin Song Dong

    Abstract: When deploying pre-trained neural network models in real-world applications, model consumers often encounter resource-constraint platforms such as mobile and smart devices. They typically use the pruning technique to reduce the size and complexity of the model, generating a lighter one with less resource consumption. Nonetheless, most existing pruning methods are proposed with the premise that the… ▽ More

    Submitted 18 June, 2025; v1 submitted 2 April, 2022; originally announced April 2022.

    Comments: 10 pages

  34. arXiv:2203.10714  [pdf, other

    cs.CL

    A Prompting-based Approach for Adversarial Example Generation and Robustness Enhancement

    Authors: Yuting Yang, Pei Huang, Juan Cao, Jintao Li, Yun Lin, Jin Song Dong, Feifei Ma, Jian Zhang

    Abstract: Recent years have seen the wide application of NLP models in crucial areas such as finance, medical treatment, and news media, raising concerns of the model robustness and vulnerabilities. In this paper, we propose a novel prompt-based adversarial attack to compromise NLP models and robustness enhancement technique. We first construct malicious prompts for each instance and generate adversarial ex… ▽ More

    Submitted 20 March, 2022; originally announced March 2022.

  35. arXiv:2201.02504  [pdf, other

    cs.CL cs.AI cs.CR

    Repairing Adversarial Texts through Perturbation

    Authors: Guoliang Dong, Jingyi Wang, Jun Sun, Sudipta Chattopadhyay, Xinyu Wang, Ting Dai, Jie Shi, Jin Song Dong

    Abstract: It is known that neural networks are subject to attacks through adversarial perturbations, i.e., inputs which are maliciously crafted through perturbations to induce wrong predictions. Furthermore, such attacks are impossible to eliminate, i.e., the adversarial perturbation is still possible after applying mitigation methods such as adversarial training. Multiple approaches have been developed to… ▽ More

    Submitted 28 December, 2021; originally announced January 2022.

  36. arXiv:2201.01155  [pdf, other

    cs.LG cs.AI cs.CV cs.SE

    DeepVisualInsight: Time-Travelling Visualization for Spatio-Temporal Causality of Deep Classification Training

    Authors: Xianglin Yang, Yun Lin, Ruofan Liu, Zhenfeng He, Chao Wang, Jin Song Dong, Hong Mei

    Abstract: Understanding how the predictions of deep learning models are formed during the training process is crucial to improve model performance and fix model defects, especially when we need to investigate nontrivial training strategies such as active learning, and track the root cause of unexpected training results such as performance degeneration. In this work, we propose a time-travelling visual sol… ▽ More

    Submitted 31 December, 2021; originally announced January 2022.

    Comments: Accepted in AAAI'22

  37. arXiv:2110.02718  [pdf, other

    cs.LG

    Generalizing Neural Networks by Reflecting Deviating Data in Production

    Authors: Yan Xiao, Yun Lin, Ivan Beschastnikh, Changsheng Sun, David S. Rosenblum, Jin Song Dong

    Abstract: Trained with a sufficiently large training and testing dataset, Deep Neural Networks (DNNs) are expected to generalize. However, inputs may deviate from the training dataset distribution in real deployments. This is a fundamental issue with using a finite dataset. Even worse, real inputs may change over time from the expected distribution. Taken together, these issues may lead deployed DNNs to mis… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

  38. arXiv:2109.12389  [pdf, other

    cs.SE

    RegMiner: Towards Constructing a Large Regression Dataset from Code Evolution History

    Authors: Xuezhi Song, Yun Lin, Siang Hwee Ng, Yijian Wu, Xin Peng, Jin Song Dong, Hong Mei

    Abstract: Bug datasets consisting of real-world bugs are important artifacts for researchers and programmers, which lay empirical and experimental foundation for various SE/PL research such as fault localization, software testing, and program repair. All known state-of-the-art datasets are constructed manually, which inevitably limits their scalability, representativeness, and the support for the emerging d… ▽ More

    Submitted 4 July, 2022; v1 submitted 25 September, 2021; originally announced September 2021.

    Comments: ISSTA'22

  39. arXiv:2107.08176  [pdf, other

    cs.LG cs.AI cs.CY

    Automatic Fairness Testing of Neural Classifiers through Adversarial Sampling

    Authors: Peixin Zhang, Jingyi Wang, Jun Sun, Xinyu Wang, Guoliang Dong, Xingen Wang, Ting Dai, Jin Song Dong

    Abstract: Although deep learning has demonstrated astonishing performance in many applications, there are still concerns about its dependability. One desirable property of deep learning applications with societal impact is fairness (i.e., non-discrimination). Unfortunately, discrimination might be intrinsically embedded into the models due to the discrimination in the training data. As a countermeasure, fai… ▽ More

    Submitted 29 July, 2021; v1 submitted 16 July, 2021; originally announced July 2021.

  40. arXiv:2103.02371  [pdf, other

    cs.SE

    Self-Checking Deep Neural Networks in Deployment

    Authors: Yan Xiao, Ivan Beschastnikh, David S. Rosenblum, Changsheng Sun, Sebastian Elbaum, Yun Lin, Jin Song Dong

    Abstract: The widespread adoption of Deep Neural Networks (DNNs) in important domains raises questions about the trustworthiness of DNN outputs. Even a highly accurate DNN will make mistakes some of the time, and in settings like self-driving vehicles these mistakes must be quickly detected and properly dealt with in deployment. Just as our community has developed effective techniques and mechanisms to moni… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

    Journal ref: 43rd International Conference on Software Engineering (ICSE2021)

  41. arXiv:2103.02191  [pdf, other

    cs.LO

    Extracting Optimal Explanations for Ensemble Trees via Logical Reasoning

    Authors: Gelin Zhang, Zhe Hou, Yanhong Huang, Jianqi Shi, Hadrien Bride, Jin Song Dong, Yongsheng Gao

    Abstract: Ensemble trees are a popular machine learning model which often yields high prediction performance when analysing structured data. Although individual small decision trees are deemed explainable by nature, an ensemble of large trees is often difficult to understand. In this work, we propose an approach called optimised explanation (OptExplain) that faithfully extracts global explanations of ensemb… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

  42. arXiv:2005.05520  [pdf, other

    cs.DM cs.FL

    N-PAT: A Nested Model-Checker

    Authors: Hadrien Bride, Cheng-Hao Cai, Jin Song Dong, Rajeev Gore, Zhé Hóu, Brendan Mahony, Jim McCarthy

    Abstract: N-PAT is a new model-checking tool that supports the verification of nested-models, i.e. models whose behaviour depends on the results of verification tasks. In this paper, we describe its operation and discuss mechanisms that are tailored to the efficient verification of nested-models. Further, we motivate the advantages of N-PAT over traditional model-checking tools through a network security ca… ▽ More

    Submitted 11 May, 2020; originally announced May 2020.

  43. Automated synthesis of local time requirement for service composition

    Authors: Étienne André, Tian Huat Tan, Manman Chen, Shuang Liu, Jun Sun, Yang Liu, Jin Song Dong

    Abstract: Service composition aims at achieving a business goal by composing existing service-based applications or components. The response time of a service is crucial especially in time critical business environments, which is often stated as a clause in service level agreements between service providers and service users. To meet the guaranteed response time requirement of a composite service, it is imp… ▽ More

    Submitted 18 March, 2020; originally announced March 2020.

    Comments: This is a pre-print of an article published in the International Journal on Software and Systems Modeling (SoSyM)

  44. arXiv:1911.05904  [pdf, other

    cs.LG cs.SE stat.ML

    There is Limited Correlation between Coverage and Robustness for Deep Neural Networks

    Authors: Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Dai Ting

    Abstract: Deep neural networks (DNN) are increasingly applied in safety-critical systems, e.g., for face recognition, autonomous car control and malware detection. It is also shown that DNNs are subject to attacks such as adversarial perturbation and thus must be properly tested. Many coverage criteria for DNN since have been proposed, inspired by the success of code coverage criteria for software programs.… ▽ More

    Submitted 13 November, 2019; originally announced November 2019.

  45. arXiv:1910.01382  [pdf, other

    cs.LG cs.LO stat.ML

    Silas: High Performance, Explainable and Verifiable Machine Learning

    Authors: Hadrien Bride, Zhe Hou, Jie Dong, Jin Song Dong, Ali Mirjalili

    Abstract: This paper introduces a new classification tool named Silas, which is built to provide a more transparent and dependable data analytics service. A focus of Silas is on providing a formal foundation of decision trees in order to support logical analysis and verification of learned prediction models. This paper describes the distinct features of Silas: The Model Audit module formally verifies the pr… ▽ More

    Submitted 3 October, 2019; originally announced October 2019.

  46. arXiv:1910.01380  [pdf, other

    cs.AI

    GRAVITAS: A Model Checking Based Planning and Goal Reasoning Framework for Autonomous Systems

    Authors: Hadrien Bride, Jin Song Dong, Ryan Green, Zhe Hou, Brendan Mahony, Martin Oxenham

    Abstract: While AI techniques have found many successful applications in autonomous systems, many of them permit behaviours that are difficult to interpret and may lead to uncertain results. We follow the "verification as planning" paradigm and propose to use model checking techniques to solve planning and goal reasoning problems for autonomous systems. We give a new formulation of Goal Task Network (GTN) t… ▽ More

    Submitted 3 October, 2019; originally announced October 2019.

  47. arXiv:1909.10023  [pdf, other

    cs.LG stat.ML

    Towards Interpreting Recurrent Neural Networks through Probabilistic Abstraction

    Authors: Guoliang Dong, Jingyi Wang, Jun Sun, Yang Zhang, Xinyu Wang, Ting Dai, Jin Song Dong, Xingen Wang

    Abstract: Neural networks are becoming a popular tool for solving many real-world problems such as object recognition and machine translation, thanks to its exceptional performance as an end-to-end solution. However, neural networks are complex black-box models, which hinders humans from interpreting and consequently trusting them in making critical decisions. Towards interpreting neural networks, several a… ▽ More

    Submitted 27 September, 2020; v1 submitted 22 September, 2019; originally announced September 2019.

    Comments: Accepted by ASE 2020

  48. arXiv:1906.11203  [pdf, other

    cs.LO

    A formalisation of the SPARC TSO memory model for multi-core machine code

    Authors: Zhe Hou, David Sanan, Alwen Tiu, Yang Liu, Jin Song Dong

    Abstract: SPARC processors have many applications in mission-critical industries such as aviation and space engineering. Hence, it is important to provide formal frameworks that facilitate the verification of hardware and software that run on or interface with these processors. This paper presents the first mechanised SPARC Total Store Ordering (TSO) memory model which operates on top of an abstract model o… ▽ More

    Submitted 24 June, 2019; originally announced June 2019.

    Comments: 15 pages + 2 pages of references

  49. arXiv:1403.2237  [pdf, other

    cs.CR

    Stateful Security Protocol Verification

    Authors: Li Li, Jun Pang, Yang Liu, Jun Sun, Jin Song Dong

    Abstract: A long-standing research problem in security protocol design is how to efficiently verify security protocols with tamper-resistant global states. In this paper, we address this problem by first proposing a protocol specification framework, which explicitly represents protocol execution states and state transformations. Secondly, we develop an algorithm for verifying security properties by utilizin… ▽ More

    Submitted 10 March, 2014; originally announced March 2014.