Fang Yu

Orcid: 0000-0002-2776-9624

Affiliations:
  • National Chengchi University, Department of Management Information Systems, Taipei City, Taiwan
  • University of California, Santa Barbara, Department of Computer Science, CA, USA (former, PhD 2010)
  • Academia Sinica, Institute of Information Science, Taipei, Taiwan (former)


According to our database1, Fang Yu authored at least 51 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Sugar-coated poison defense on deepfake face-swapping attacks.
Proceedings of the 5th ACM/IEEE International Conference on Automation of Software Test (AST 2024), 2024

2023
DeepSHAP Summary for Adversarial Example Detection.
Proceedings of the IEEE/ACM International Workshop on Deep Learning for Testing and Testing for Deep Learning, 2023

POSTER: On searching information leakage of Python model execution to detect adversarial examples.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2021
PyCT: A Python Concolic Tester.
Proceedings of the Programming Languages and Systems - 19th Asian Symposium, 2021

2020
Symbolic Gas Vulnerability Detection and Attack Synthesis.
Proceedings of the 24th Pacific Asia Conference on Information Systems, 2020

Runtime Hook on Blockchain and Smart Contract Systems.
Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, 2020

2019
HiSeqGAN: Hierarchical Sequence Synthesis and Prediction.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Deep Learning, 2019

2018
Quantitative quality estimation of cloud-based streaming services.
Comput. Commun., 2018

Parameterized model counting for string and numeric constraints.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

A symbolic model checking approach to the analysis of string and length constraints.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Static detection of API call vulnerabilities in iOS executables.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

2017
Content-Sensitive Data Compression for IoT Streaming Services.
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017

String Analysis for Software Verification and Security.
Springer, ISBN: 978-3-319-68668-4, 2017

2016
Optimal sanitization synthesis for web application vulnerability repair.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

String Analysis via Automata Manipulation with Logic Circuit Representation.
Proceedings of the Computer Aided Verification - 28th International Conference, 2016

2015
Network-traffic anomaly detection with incremental majority learning.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

Space Connection: A New 3D Tele-immersion Platform for Web-Based Gesture-Collaborative Games and Services.
Proceedings of the 4th IEEE/ACM International Workshop on Games and Software Engineering, 2015

2014
Automata-based symbolic string analysis for vulnerability detection.
Formal Methods Syst. Des., 2014

Topological pattern discovery and feature extraction for fraudulent financial reporting.
Expert Syst. Appl., 2014

Resistant learning on the envelope bulk for identifying anomalous patterns.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

Patcher: An Online Service for Detecting, Viewing and Patching Web Application Vulnerabilities.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Clustering iOS executable using self-organizing maps.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

A control policy for γ-nets without reachability analysis and siphon enumeration.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

Quantitative Analysis of Cloud-Based Streaming Services.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
Symbolic consistency checking of OpenMp parallel programs.
Proceedings of the SIGPLAN/SIGBED Conference on Languages, 2012

Enumeration of reachable and other states of simple version of Systems of Simple Sequential Processes with Resources (S3PR).
Proceedings of the 21st IEEE International Symposium on Industrial Electronics, 2012

2011
Relational String Verification Using Multi-Track Automata.
Int. J. Found. Comput. Sci., 2011

String Abstractions for String Verification.
Proceedings of the Model Checking Software, 2011

Patching vulnerabilities with sanitization synthesis.
Proceedings of the 33rd International Conference on Software Engineering, 2011

A Temporal Logic for the Interaction of Strategies.
Proceedings of the CONCUR 2011 - Concurrency Theory - 22nd International Conference, 2011

2010
Stranger: An Automata-Based String Analysis Tool for PHP.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2010

Modular verification of synchronization with reentrant locks.
Proceedings of the 8th ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE 2010), 2010

2009
Symbolic String Verification: Combining String Analysis and Size Analysis.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2009

Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses.
Proceedings of the ASE 2009, 2009

2008
On spiking neural P systems and partially blind counter machines.
Nat. Comput., 2008

Symbolic String Verification: An Automata-Based Approach.
Proceedings of the Model Checking Software, 2008

Modular verification of web services using efficient symbolic encoding and summarization.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

2007
Automated size analysis for OCL.
Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007

2006
TCTL Inevitability Analysis of Dense-Time Systems: From Theory to Engineering.
IEEE Trans. Software Eng., 2006

Sat-based Model Checking for Region Automata.
Int. J. Found. Comput. Sci., 2006

2005
Symbolic simulation of industrial real-time and embedded systems -experiments with the bluetooth baseband communication protocol.
J. Embed. Comput., 2005

Efficient Exact Spare Allocation via Boolean Satisfiability.
Proceedings of the 20th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2005), 2005

2004
BDD-Based Safety-Analysis of Concurrent Software with Pointer Data Structures Using Graph Automorphism Symmetry Reduction.
IEEE Trans. Software Eng., 2004

Securing web application code by static analysis and runtime protection.
Proceedings of the 13th international conference on World Wide Web, 2004

Bounded Model Checking for Region Automata.
Proceedings of the Formal Techniques, 2004

Verifying Web Applications Using Bounded Model Checking.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Toward Unbounded Model Checking for Region Automata.
Proceedings of the Automated Technology for Verification and Analysis: Second International Conference, 2004

2003
TCTL Inevitability Analysis of Dense-Time Systems.
Proceedings of the Implementation and Application of Automata, 2003

OVL Assertion-Checking of Embedded Software with Dense-Time Semantics.
Proceedings of the Real-Time and Embedded Computing Systems and Applications, 2003

Symbolic Simulation of Real-Time Concurrent Systems.
Proceedings of the Real-Time and Embedded Computing Systems and Applications, 2003

Numerical Coverage Estimation for the Symbolic Simulation of Real-Time Systems.
Proceedings of the Formal Techniques for Networked and Distributed Systems - FORTE 2003, 23rd IFIP WG 6.1 International Conference, Berlin, Germany, September 29, 2003


  Loading...