Jingbo Wang

ORCID: 0000-0001-5877-2677
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Research Data Management Practices
  • Formal Methods in Verification
  • Security and Verification in Computing
  • Adversarial Robustness in Machine Learning
  • Software Testing and Debugging Techniques
  • Particle Detector Development and Performance
  • Cryptographic Implementations and Security
  • Neutrino Physics Research
  • Radiation Detection and Scintillator Technologies
  • Scientific Computing and Data Management
  • Astrophysics and Cosmic Phenomena
  • Ethics and Social Impacts of AI
  • Semantic Web and Ontologies
  • Statistical Methods and Inference
  • Parallel Computing and Optimization Techniques
  • Online Learning and Analytics
  • Intelligent Tutoring Systems and Adaptive Learning
  • Statistical Methods and Bayesian Inference
  • Recommender Systems and Techniques
  • Evolutionary Algorithms and Applications
  • E-Government and Public Services
  • Machine Learning and Data Classification
  • Advanced Causal Inference Techniques
  • Online and Blended Learning

Purdue University West Lafayette
2025

Beijing Information Science & Technology University
2023-2024

South Dakota School of Mines and Technology
2024

Institute of Semiconductors
2024

Chinese Academy of Sciences
2024

University of Southern California
2018-2023

Leighton (United States)
2023

Southern California University for Professional Studies
2018-2022

Carnegie Mellon University
2021-2022

Kunming University of Science and Technology
2021-2022

Abstract Drug response variations amongst different individuals/populations are influenced by several factors including allele frequency differences of single nucleotide polymorphisms (SNPs) that functionally affect drug-response genes. Here, we aim to identify drugs potentially exhibit population in using SNP data mining and analytics. Ninety-one pairwise-comparisons >22,000,000 SNPs from the 1000 Genomes Project, across 14 populations, were performed ‘population-differentiated’...

10.1038/s41397-019-0096-y article EN cc-by The Pharmacogenomics Journal 2019-10-02

As deep neural networks are increasingly being deployed in practice, their efficiency has become an important issue. While there compression techniques for reducing the network's size, energy consumption and computational requirement, they only demonstrate empirically that is no loss of accuracy, but lack formal guarantees compressed network, e.g., presence adversarial examples. Existing verification such as Reluplex, ReluVal, DeepPoly provide guarantees, designed analyzing a single network...

10.1145/3377811.3380337 preprint EN 2020-06-27

We propose a method for conducting algebraic program analysis (APA) incrementally in response to changes of the under analysis. APA is paradigm that consists two distinct steps: computing path expression succinctly summarizes set paths interest, and interpreting using properly-defined semantic algebra obtain properties interest. In this context, goal an incremental algorithm reduce time by leveraging intermediate results computed before changes. have made main contributions. First, we data...

10.1145/3704901 article EN Proceedings of the ACM on Programming Languages 2025-01-07

The code generation modules inside modern compilers, which use a limited number of CPU registers to store large program variables, may introduce side-channel leaks even in software equipped with state-of-the-art countermeasures. We propose analysis and transformation based method eliminate such leaks. Our has type-based technique for detecting leaks, leverages Datalog-based declarative domain-specific optimizations achieve high efficiency accuracy. It also mitigation the compiler's backend,...

10.1145/3338906.3338913 article EN 2019-08-09

Cyber-physical systems are often safety-critical in that violations of safety properties may lead to catastrophes. We propose a method enforce the with real-valued signals by synthesizing runtime enforcer called shield. Whenever system violates property, shield, composed system, makes correction instantaneously ensure no erroneous output is generated combined system. While techniques for Boolean shields well understood, they do not handle ubiquitous cyber-physical systems, meaning their...

10.23919/fmcad.2019.8894264 preprint EN 2019-10-01

As neural networks make their way into safety-critical systems, where misbehavior can lead to catastrophes, there is a growing interest in certifying the equivalence of two structurally similar - problem known as differential verification. For example, compression techniques are often used practice for deploying trained on computationally- and energy-constrained devices, which raises question how faithfully compressed network mimics original network. Unfortunately, existing methods either...

10.1145/3324884.3416560 article EN public-domain 2020-12-21

Data poisoning aims to compromise a machine learning based software component by contaminating its training set change prediction results for test inputs. Existing methods deciding data-poisoning robustness have either poor accuracy or long running time and, more importantly, they can only certify some of the truly-robust cases, but remain inconclusive when certification fails. In other words, cannot falsify truly-non-robust cases. To overcome this limitation, we propose systematic testing...

10.1145/3597926.3598129 article EN public-domain 2023-07-12

We propose a data-driven method for synthesizing static analyses to detect side-channel information leaks in cryptographic software. Compared the conventional way of manually crafting such analyzers, which can be tedious, error prone and suboptimal, our learning-based technique is not only automated but also provably sound. Our analyzer consists set type-inference rules learned from training data, i.e., example code snippets annotated with ground truth. Internally, we use syntax-guided...

10.1109/icse43902.2021.00079 article EN 2021-05-01

10.5281/zenodo.6450190 article EN cc-by Zenodo (CERN European Organization for Nuclear Research) 2022-06-24

Automated static dataflow analysis is an effective technique for detecting security critical issues like sensitive data leak, and vulnerability to injection attacks. Ensuring high precision recall requires that context, field object sensitive. However, it challenging attain scale large industrial code bases. Compositional style analyses in which individual software components are analyzed separately, independent from their usage contexts, compute reusable summaries of components. This...

10.1145/3611643.3613889 article EN cc-by 2023-11-30

We consider the problem of assessing changing performance levels individual students as they go through online courses. This student (SP) modeling is a critical step for building adaptive teaching systems. Specifically, we conduct study how to utilize various types and large amounts log data train accurate machine learning (ML) models that predict future students. first use four very sets made available recently from distinct intelligent tutoring Our results include new ML approach defines...

10.48550/arxiv.2109.01753 preprint EN other-oa arXiv (Cornell University) 2021-01-01

We propose a method for synthesizing invariants that can help verify relational properties over two programs or different executions of program. Applications such include verifying functional equivalence, non-interference security, and continuity properties. Our generates invariant candidates using syntax guided synthesis (SyGuS) then filters them an SMT-solver based verifier, to ensure they are both inductive sufficient the property at hand. To improve performance, we learning techniques:...

10.1145/3551349.3556942 article EN 2022-10-10

Quantum computing is an emerging field of research and technology that harnesses a science called quantum mechanics to create computers with revolutionary capabilities. Although existing are limited in size prone significant errors, future might be capable performing tasks were once considered unimaginable using even the world’s most powerful supercomputers. This means could revolutionize many important areas our lives! In this article, we will explore by first reviewing how current work....

10.3389/frym.2024.1335355 article EN Frontiers for Young Minds 2024-11-06

The government has always emphasized the decisive role of market mechanisms in resource allocation, but this is least obvious water resources market.To achieve goal promoting improvement supply structure and using thus improving efficiency, it necessary to consider both efficiency same source among different users cost between sources for user.Through creative use fuzzy optimization theory solve constructed Bi-level programming model, paper takes data Qingdao from 2011 2020 as an example...

10.15244/pjoes/150046 article EN Polish Journal of Environmental Studies 2022-09-12
Coming Soon ...