no code implementations • 11 Jul 2023 • Zhao Liu, Quanchen Zou, Tian Yu, Xuan Wang, Guozhu Meng, Kai Chen, Deyue Zhang
Guided by the constraints, ConFL is able to generate valid inputs that can pass the verification and explore deeper paths of kernel codes.
no code implementations • 21 Dec 2017 • Qixue Xiao, Kang Li, Deyue Zhang, Yier Jin
This paper presents a downscaling attack that targets the data scaling process in deep learning applications.