-
Communication Bounds for the Distributed Experts Problem. [Paper] [Code]
Zhihao Jia, Qi Pang, Trung Tran, David Woodruff, Zhihao Zhang, Wenting Zheng. (alphabetical order)
NeurIPS 24, to appear.
-
No Free Lunch in LLM Watermarking: Trade-offs in Watermarking Design Choices. [Paper] [Code]
Qi Pang, Shengyuan Hu, Wenting Zheng, Virginia Smith.
NeurIPS 24, to appear.
-
BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers. [Paper] [Code]
Qi Pang, Jinhao Zhu, Helen Möllering, Wenting Zheng, Thomas Schneider.
IEEE S&P 24.
-
MPCDiff: Testing and Repairing MPC-Hardened Deep Learning Models. [Paper] [Code]
Qi Pang, Yuanyuan Yuan, Shuai Wang.
NDSS 24.
-
Secure Federated Correlation Test and Entropy Estimation. [Paper] [Code]
Qi Pang*, Lun Wang*, Shuai Wang, Wenting Zheng, Dawn Song.
ICML 23.
-
Qi Pang, Yuanyuan Yuan, Shuai Wang, Wenting Zheng.
IEEE S&P 23.
-
Byzantine-Robust Federated Learning with Optimal Rates and Privacy Guarantee. [Paper] [Code]
Banghua Zhu*, Lun Wang*, Qi Pang*, Shuai Wang, Jiantao Jiao, Dawn Song, Michael I. Jordan.
AISTATS 23.
-
MDPFuzz: Testing Models Solving Markov Decision Processes. [Paper] [Code]
Qi Pang, Yuanyuan Yuan, Shuai Wang.
ISSTA 22.
-
Automated Side Channel Analysis of Media Software with Manifold Learning. [Paper] [Code]
Yuanyuan Yuan, Qi Pang, Shuai Wang.
USENIX Security 22.
-
PRIVGUARD: Privacy Regulation Compliance Made Easier. [Paper] [Code]
Lun Wang, Usmann Khan, Joseph Near, Qi Pang, Jithendaraa Subramanian, Neel Somani, Peng Gao, Andrew Low, Dawn Song.
USENIX Security 22.
-
mID: Tracing Screen Photos via Moiré Patterns. [Paper]
Yushi Cheng, Xiaoyu Ji, Lixu Wang*, Qi Pang*, Yi-Chao Chen, Wenyuan Xu.
USENIX Security 21.
-
Towards Practical Differentially Private Causal Graph Discovery. [Paper] [Code]
Lun Wang, Qi Pang, Dawn Song.
NeurIPS 20.
|