Membership inference (MI) attacks highlight a privacy weakness in presen...
We design and implement from scratch a new fuzzer called SIVO that refin...
Automatic patch generation can significantly reduce the window of exposu...
Neural networks are increasingly employed in safety-critical domains. Th...
Symbolic execution is a powerful technique for program analysis. However...
This paper introduces THUMT, an open-source toolkit for neural machine
t...
Recently, neural models have been proposed for headline generation by
le...
The attentional mechanism has proven to be effective in improving end-to...
We propose minimum risk training for end-to-end neural machine translati...