Fu Song
Orcid: 0000-0002-0581-2679
According to our database1,
Fu Song
authored at least 93 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks.
ACM Trans. Softw. Eng. Methodol., June, 2024
ACM Trans. Softw. Eng. Methodol., March, 2024
Compositional Verification of First-Order Masking Countermeasures against Power Side-Channel Attacks.
ACM Trans. Softw. Eng. Methodol., March, 2024
EasyBC: A Cryptography-Specific Language for Security Analysis of Block Ciphers against Differential Cryptanalysis.
Proc. ACM Program. Lang., January, 2024
SAT-based Formal Verification of Fault Injection Countermeasures for Cryptographic Circuits.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
Proc. ACM Softw. Eng., 2024
A Proactive and Dual Prevention Mechanism against Illegal Song Covers empowered by Singing Voice Conversion.
CoRR, 2024
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2024
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the Formal Methods - 26th International Symposium, 2024
Compositional Verification of Cryptographic Circuits Against Fault Injection Attacks.
Proceedings of the Formal Methods - 26th International Symposium, 2024
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024
2023
Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks.
Proc. ACM Program. Lang., October, 2023
ACM Trans. Softw. Eng. Methodol., May, 2023
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition.
IEEE Trans. Dependable Secur. Comput., 2023
Frontiers Comput. Sci., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Don't Complete It! Preventing Unhelpful Code Completion for Productive and Sustainable Neural Code Completion Systems.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: ICSE 2023 Companion Proceedings, 2023
SCAGuard: Detection and Classification of Cache Side-Channel Attacks via Attack Behavior Modeling and Similarity Comparison.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023
Proceedings of the Computer Aided Verification - 35th International Conference, 2023
Proceedings of the Computer Aided Verification - 35th International Conference, 2023
Proceedings of the Automated Technology for Verification and Analysis, 2023
2022
IEEE Trans. Software Eng., 2022
Taking Care of the Discretization Problem: A Comprehensive Study of the Discretization Problem and a Black-Box Adversarial Attack in Discrete Integer Domain.
IEEE Trans. Dependable Secur. Comput., 2022
ESampler: Boosting sampling of satisfying assignments for Boolean formulas via derivation.
J. Syst. Archit., 2022
Int. J. Softw. Informatics, 2022
Model-based automated testing of JavaScript Web applications via longer test sequences.
Frontiers Comput. Sci., 2022
CoRR, 2022
CoRR, 2022
CoRR, 2022
CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
CLEVEREST: Accelerating CEGAR-based Neural Network Verification via Adversarial Attacks.
Proceedings of the Static Analysis - 29th International Symposium, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the Computer Aided Verification - 34th International Conference, 2022
2021
ACM Trans. Softw. Eng. Methodol., 2021
Advanced evasion attacks and mitigations on practical ML-based phishing website classifiers.
Int. J. Intell. Syst., 2021
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2021
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021
Eager Falsification for Accelerating Robustness Verification of Deep Neural Networks.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021
Peeking into the Gray Area of Mobile World: An Empirical Study of Unlabeled Android Apps.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021
Proceedings of the Computer Aided Verification - 33rd International Conference, 2021
2020
J. Comput. Sci. Technol., 2020
Accelerating Robustness Verification of Deep Neural Networks Guided by Target Labels.
CoRR, 2020
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020
2019
Verifying and Quantifying Side-channel Resistance of Masked Software Implementations.
ACM Trans. Softw. Eng. Methodol., 2019
Things You May Not Know About Adversarial Example: A Black-box Adversarial Image Attack.
CoRR, 2019
Model-based Automated Testing of JavaScript Web Applications via Longer Test Sequences.
CoRR, 2019
Proceedings of the 2019 International Symposium on Theoretical Aspects of Software Engineering, 2019
Quantitative Verification of Masked Arithmetic Programs Against Side-Channel Attacks.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2019
SMT-Based Bounded Schedulability Analysis of the Clock Constraint Specification Language.
Proceedings of the Fundamental Approaches to Software Engineering, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
Proceedings of the 2018 International Symposium on Theoretical Aspects of Software Engineering, 2018
SCInfer: Refinement-Based Verification of Software Countermeasures Against Side-Channel Attacks.
Proceedings of the Computer Aided Verification - 30th International Conference, 2018
Proceedings of the Computer Aided Verification - 30th International Conference, 2018
2017
Proceedings of the 11th International Symposium on Theoretical Aspects of Software Engineering, 2017
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2017
SPAIN: security patch analysis for binaries towards understanding the pain and pills.
Proceedings of the 39th International Conference on Software Engineering, 2017
Proceedings of the Formal Methods and Software Engineering, 2017
Proceedings of the 28th International Conference on Concurrency Theory, 2017
2016
Int. J. Netw. Secur., 2016
Inf. Comput., 2016
Proceedings of the Engineering Trustworthy Software Systems - Second International School, 2016
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
2015
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015
On Reachability Analysis of Pushdown Systems with Transductions: Application to Boolean Programs with Call-by-Reference.
Proceedings of the 26th International Conference on Concurrency Theory, 2015
Proceedings of the 26th International Conference on Concurrency Theory, 2015
2014
Int. J. Softw. Tools Technol. Transf., 2014
Proceedings of the 34th International Conference on Foundation of Software Technology and Theoretical Computer Science, 2014
Proceedings of the Programming Languages and Systems - 12th Asian Symposium, 2014
2013
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2013
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013
2012
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012
Proceedings of the FM 2012: Formal Methods, 2012