Follow
Kexin Pei
Kexin Pei
Assistant Professor, Computer Science, University of Chicago
Verified email at cs.uchicago.edu - Homepage
Title
Cited by
Cited by
Year
Deeptest: Automated testing of deep-neural-network-driven autonomous cars
Y Tian, K Pei, S Jana, B Ray
Proceedings of the 40th international conference on software engineering …, 2018
15472018
DeepXplore: Automated Whitebox Testing of Deep Learning Systems
K Pei, Y Cao, J Yang, S Jana
Proceedings of the 26th Symposium on Operating Systems Principles, 1--18, 2017
15472017
Formal security analysis of neural networks using symbolic intervals
S Wang, K Pei, J Whitehouse, J Yang, S Jana
27th USENIX Security Symposium (USENIX Security 18), 1599-1614, 2018
5392018
Efficient formal safety analysis of neural networks
S Wang, K Pei, J Whitehouse, J Yang, S Jana
Advances in Neural Information Processing Systems 31, 2018
4822018
Neuzz: Efficient fuzzing with neural program smoothing
D She, K Pei, D Epstein, J Yang, B Ray, S Jana
2019 IEEE Symposium on Security and Privacy (SP), 803-817, 2019
2702019
Hercule: Attack story reconstruction via community discovery on correlated log graph
K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang, L Si, X Zhang, ...
Proceedings of the 32Nd Annual Conference on Computer Security Applications …, 2016
1852016
Towards practical verification of machine learning: The case of computer vision systems
K Pei, L Zhu, Y Cao, J Yang, C Vondrick, S Jana
ICSE 2019 Workshop on Testing for Deep Learning and Deep Learning for …, 2019
1282019
HVLearn: Automated black-box analysis of hostname verification in SSL/TLS implementations
S Sivakorn, G Argyros, K Pei, AD Keromytis, S Jana
2017 IEEE Symposium on Security and Privacy (SP), 521-538, 2017
1052017
Python probabilistic type inference with natural language support
Z Xu, X Zhang, L Chen, K Pei, B Xu
Proceedings of the 2016 24th ACM SIGSOFT international symposium on …, 2016
1042016
TREX: Learning Execution Semantics from Micro-Traces for Binary Similarity
K Pei, Z Xuan, J Yang, S Jana, B Ray
IEEE Transactions on Software Engineering, 2020
96*2020
Swe-bench: Can language models resolve real-world github issues?
CE Jimenez, J Yang, A Wettig, S Yao, K Pei, O Press, K Narasimhan
arXiv preprint arXiv:2310.06770, 2023
862023
XDA: Accurate, Robust Disassembly with Transfer Learning
K Pei, J Guan, D Williams-King, J Yang, S Jana
2021 Network and Distributed System Security Symposium (NDSS 2021), 2020
582020
Leaps: Detecting camouflaged attacks with statistical learning guided by program analysis
Z Gu, K Pei, Q Wang, L Si, X Zhang, D Xu
Proceedings of the 2015 45th Annual IEEE/IFIP International Conference on …, 2015
542015
Symlm: Predicting function names in stripped binaries via context-sensitive execution-aware code embeddings
X Jin, K Pei, JY Won, Z Lin
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
502022
StateFormer: Fine-Grained Type Recovery from Binaries Using Generative State Modeling
K Pei, J Guan, M Broughton, Z Chen, S Yao, D Williams-King, ...
Proceedings of the 29th ACM Joint European Software Engineering Conference …, 2021
492021
Private search on key-value stores with hierarchical indexes
H Hu, J Xu, X Xu, K Pei, B Choi, S Zhou
Proceedings of the 2014 IEEE 30th International Conference on Data …, 2014
412014
Can Large Language Models Reason about Program Invariants?
K Pei, D Bieber, K Shi, C Sutton, P Yin
Fortieth International Conference on Machine Learning (ICML), 2023
302023
Traced: Execution-aware pre-training for source code
Y Ding, B Steenhoek, K Pei, G Kaiser, W Le, B Ray
Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024
162024
Smartinv: Multimodal learning for smart contract invariant inference
SJ Wang, K Pei, J Yang
2024 IEEE Symposium on Security and Privacy (SP), 126-126, 2024
42024
Language agents as hackers: Evaluating cybersecurity skills with capture the flag
J Yang, A Prabhakar, S Yao, K Pei, KR Narasimhan
Multi-Agent Security Workshop@ NeurIPS'23, 2023
42023
The system can't perform the operation now. Try again later.
Articles 1–20