The past three decades have witnessed notable success in designing effic...
A transpiler converts code from one programming language to another. Man...
Membership inference (MI) attacks highlight a privacy weakness in presen...
Classification tasks on labeled graph-structured data have many importan...
Programming by Example (PBE) is a program synthesis paradigm in which th...
Analyzing structural properties of social networks, such as identifying ...
Verifying security properties of deep neural networks (DNNs) is becoming...
Neural networks are increasingly employed in safety-critical domains. Th...