Property inference attacks on fully connected neural networks using permutation invariant representations K Ganju, Q Wang, W Yang, CA Gunter, N Borisov Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 551 | 2018 |

Detecting ai trojans using meta neural analysis X Xu, Q Wang, H Li, N Borisov, CA Gunter, B Li 2021 IEEE Symposium on Security and Privacy (SP), 103-120, 2021 | 331 | 2021 |

Fear and logging in the internet of things Q Wang, WU Hassan, A Bates, C Gunter Network and Distributed Systems Symposium, 2018 | 269 | 2018 |

You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ... NDSS, 2020 | 203 | 2020 |

Charting the attack surface of trigger-action IoT platforms Q Wang, P Datta, W Yang, S Liu, A Bates, CA Gunter Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 185 | 2019 |

Cross-app poisoning in software-defined networking BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ... Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 63 | 2018 |

Automatic analysis of consistency properties of distributed transaction systems in Maude S Liu, PC Ölveczky, M Zhang, Q Wang, J Meseguer Tools and Algorithms for the Construction and Analysis of Systems: 25th …, 2019 | 21 | 2019 |

Read atomic transactions with prevention of lost updates: ROLA and its formal analysis S Liu, PC Ölveczky, Q Wang, I Gupta, J Meseguer Formal Aspects of Computing 31, 503-540, 2019 | 19 | 2019 |

ROLA: A New Distributed Transaction Protocol and Its Formal Analysis. S Liu, PC Ölveczky, K Santhanam, Q Wang, I Gupta, J Meseguer FASE, 77-93, 2018 | 18 | 2018 |

Formal modeling and analysis of the Walter transactional data store S Liu, PC Ölveczky, Q Wang, J Meseguer Rewriting Logic and Its Applications: 12th International Workshop, WRLA 2018 …, 2018 | 15 | 2018 |

Generating correct-by-construction distributed implementations from formal Maude designs S Liu, A Sandur, J Meseguer, PC Ölveczky, Q Wang NASA Formal Methods: 12th International Symposium, NFM 2020, Moffett Field …, 2020 | 14 | 2020 |

Extracting URLs from JavaScript via program analysis Q Wang, J Zhou, Y Chen, Y Zhang, J Zhao Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013 | 12 | 2013 |

Graph learning for interactive threat detection in heterogeneous smart home rule data G Wang, N Ivanov, B Chen, Q Wang, TV Nguyen, Q Yan Proceedings of the ACM on Management of Data 1 (1), 1-27, 2023 | 11 | 2023 |

Towards systematic parallel programming of graph problems via tree decomposition and tree parallelism Q Wang, M Chen, Y Liu, Z Hu Proceedings of the 2nd ACM SIGPLAN workshop on Functional high-performance …, 2013 | 5 | 2013 |

Provenance tracing in the internet of things Q Wang, WU Hassan, A Bates, C Gunter Proceedings of the 9th USENIX Conference on Theory and Practice of …, 2017 | 3 | 2017 |

Automatic transformation of formal maude designs into correct-by-construction distributed implementations S Liu, A Sandur, J Meseguer, PC Olveczky, Q Wang Technical report, 2019 | 2 | 2019 |

A New Distributed Transaction Protocol and Its Formal Analysis in Maude S Liu, PC Olveczky, K Santhanam, Q Wang, I Gupta, J Meseguer | 1 | 2018 |

ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security K Mukherjee, J Wiedemeier, Q Wang, J Kamimura, JJ Rhee, J Wei, Z Li, ... International Conference on Applied Cryptography and Network Security, 241-268, 2024 | | 2024 |