Search Results - "Vechev, Martin"
-
1
Reqomp: Space-constrained Uncomputation for Quantum Circuits
Published in Quantum (Vienna, Austria) (19-02-2024)“…Quantum circuits must run on quantum computers with tight limits on qubit and gate counts. To generate circuits respecting both limits, a promising opportunity…”
Get full text
Journal Article -
2
Abstraqt: Analysis of Quantum Circuits via Abstract Stabilizer Simulation
Published in Quantum (Vienna, Austria) (20-11-2023)“…Stabilizer simulation can efficiently simulate an important class of quantum circuits consisting exclusively of Clifford gates. However, all existing…”
Get full text
Journal Article -
3
AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation
Published in 2018 IEEE Symposium on Security and Privacy (SP) (01-05-2018)“…We present AI 2 , the first sound and scalable analyzer for deep neural networks. Based on overapproximation, AI 2 can automatically prove safety properties…”
Get full text
Conference Proceeding -
4
VerX: Safety Verification of Smart Contracts
Published in 2020 IEEE Symposium on Security and Privacy (SP) (01-05-2020)“…We present VerX, the first automated verifier able to prove functional properties of Ethereum smart contracts. VerX addresses an important problem as all…”
Get full text
Conference Proceeding -
5
ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs
Published in 2022 IEEE Symposium on Security and Privacy (SP) (01-05-2022)“…Data privacy is a key concern for smart contracts handling sensitive data. The existing work zkay addresses this concern by allowing developers without…”
Get full text
Conference Proceeding -
6
DP-Sniper: Black-Box Discovery of Differential Privacy Violations using Classifiers
Published in 2021 IEEE Symposium on Security and Privacy (SP) (01-05-2021)“…We present DP-Sniper, a practical black-box method that automatically finds violations of differential privacy.DP-Sniper is based on two key ideas: (i)…”
Get full text
Conference Proceeding -
7
From Principle to Practice: Vertical Data Minimization for Machine Learning
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19-05-2024)“…Aiming to train and deploy predictive models, organizations collect large amounts of detailed client data, risking the exposure of private information in the…”
Get full text
Conference Proceeding -
8
Robustness Certification for Point Cloud Models
Published in 2021 IEEE/CVF International Conference on Computer Vision (ICCV) (01-10-2021)“…The use of deep 3D point cloud models in safety-critical applications, such as autonomous driving, dictates the need to certify the robustness of these models…”
Get full text
Conference Proceeding -
9
Effective abstractions for verification under relaxed memory models
Published in Computer languages, systems & structures (01-01-2017)“…We present a new abstract interpretation based approach for automatically verifying concurrent programs running on relaxed memory models. Our approach is based…”
Get full text
Journal Article -
10
HLA I shield tumor skin T lymphocytes from NK-cell-mediated elimination
Published in European journal of cancer (1990) (01-09-2018)Get full text
Journal Article -
11
Abstraction-guided synthesis of synchronization
Published in International journal on software tools for technology transfer (01-10-2013)“…We present a novel framework for automatic inference of efficient synchronization in concurrent programs, a task known to be difficult and error-prone when…”
Get full text
Journal Article -
12
Large Language Models for Code: Security Hardening and Adversarial Testing
Published 16-08-2024“…Large language models (large LMs) are increasingly trained on massive codebases and used to generate code. However, LMs lack awareness of security and are…”
Get full text
Journal Article -
13
Efficient data race detection for async-finish parallelism
Published in Formal methods in system design (01-12-2012)“…A major productivity hurdle for parallel programming is the presence of data races . Data races can lead to all kinds of harmful program behaviors, including…”
Get full text
Journal Article -
14
A Unified Approach to Routing and Cascading for LLMs
Published 14-10-2024“…The widespread applicability of large language models (LLMs) has increased the availability of many fine-tuned models of various sizes targeting specific…”
Get full text
Journal Article -
15
Multi-Neuron Unleashes Expressivity of ReLU Networks Under Convex Relaxation
Published 09-10-2024“…Neural work certification has established itself as a crucial tool for ensuring the robustness of neural networks. Certification methods typically rely on…”
Get full text
Journal Article -
16
AlphaIntegrator: Transformer Action Search for Symbolic Integration Proofs
Published 03-10-2024“…We present the first correct-by-construction learning-based system for step-by-step mathematical integration. The key idea is to learn a policy, represented by…”
Get full text
Journal Article -
17
Polyrating: A Cost-Effective and Bias-Aware Rating System for LLM Evaluation
Published 01-09-2024“…Rating-based human evaluation has become an essential tool to accurately evaluate the impressive performance of large language models (LLMs). However, current…”
Get full text
Journal Article -
18
CTBENCH: A Library and Benchmark for Certified Training
Published 07-06-2024“…Training certifiably robust neural networks is an important but challenging task. While many algorithms for (deterministic) certified training have been…”
Get full text
Journal Article -
19
ConStat: Performance-Based Contamination Detection in Large Language Models
Published 25-05-2024“…Public benchmarks play an essential role in the evaluation of large language models. However, data contamination can lead to inflated performance, rendering…”
Get full text
Journal Article -
20
Watermark Stealing in Large Language Models
Published 29-02-2024“…LLM watermarking has attracted attention as a promising way to detect AI-generated content, with some works suggesting that current schemes may already be fit…”
Get full text
Journal Article