Jun Sun

Orcid: 0000-0002-3545-1392

Affiliations:
  • Singapore Management University, Singapore
  • Singapore University of Technology and Design, Singapore (former)
  • National University of Singapore, School of Computing, Singapore (PhD 2006)


According to our database1, Jun Sun authored at least 369 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Scoping Software Engineering for AI: The TSE Perspective.
IEEE Trans. Software Eng., November, 2024

sGuard+: Machine Learning Guided Rule-Based Automated Vulnerability Repair on Smart Contracts.
ACM Trans. Softw. Eng. Methodol., June, 2024

sFuzz2.0: Storage-access pattern guided smart contract fuzzing.
J. Softw. Evol. Process., April, 2024

Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples.
ACM Trans. Softw. Eng. Methodol., March, 2024

Better Pay Attention Whilst Fuzzing.
IEEE Trans. Software Eng., February, 2024

Seed Selection for Testing Deep Neural Networks.
ACM Trans. Softw. Eng. Methodol., January, 2024

xFuzz: Machine Learning Guided Cross-Contract Fuzzing.
IEEE Trans. Dependable Secur. Comput., 2024

Provably Secure Decisions Based on Potentially Malicious Information.
IEEE Trans. Dependable Secur. Comput., 2024

Partial Solution Based Constraint Solving Cache in Symbolic Execution.
Proc. ACM Softw. Eng., 2024

LLMScan: Causal Scan for LLM Misbehavior Detection.
CoRR, 2024

UniAdapt: A Universal Adapter for Knowledge Calibration.
CoRR, 2024

Adversarial Suffixes May Be Features Too!
CoRR, 2024

Do Influence Functions Work on Large Language Models?
CoRR, 2024

Are Existing Road Design Guidelines Suitable for Autonomous Vehicles?
CoRR, 2024

BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models.
CoRR, 2024

On-the-fly Synthesis for LTL over Finite Traces: An Efficient Approach that Counts.
CoRR, 2024

μDrive: User-Controlled Autonomous Driving.
CoRR, 2024

Towards Large Language Model Aided Program Refinement.
CoRR, 2024

Conformance Testing of Relational DBMS Against SQL Specifications.
CoRR, 2024

CodeR: Issue Resolving with Multi-Agent and Task Graphs.
CoRR, 2024

How Does Bayes Error Limit Probabilistic Robust Accuracy.
CoRR, 2024

Unified Neural Backdoor Removal with Only Few Clean Samples through Unlearning and Relearning.
CoRR, 2024

ALI-Agent: Assessing LLMs' Alignment with Human Values via Agent-based Evaluation.
CoRR, 2024

Evaluating and Mitigating Linguistic Discrimination in Large Language Models.
CoRR, 2024

Towards General Conceptual Model Editing via Adversarial Representation Engineering.
CoRR, 2024

Resilient Watermarking for LLM-Generated Codes.
CoRR, 2024

REDriver: Runtime Enforcement for Autonomous Vehicles.
CoRR, 2024

Experimenting a New Programming Practice with LLMs.
CoRR, 2024

PTE: Axiomatic Semantics based Compiler Testing.
CoRR, 2024

Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based Approach.
Proceedings of the 33rd USENIX Security Symposium, 2024

Property-Based Testing for Validating User Privacy-Related Functionalities in Social Media Apps.
Proceedings of the Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering, 2024

Certified Continual Learning for Neural Network Regression.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

ACAV: A Framework for Automatic Causality Analysis in Autonomous Vehicle Accident Recordings.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

REDriver: Runtime Enforcement for Autonomous Vehicles.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

CFP: A Reinforcement Learning Framework for Comprehensive Fairness-Performance Trade-Off in Machine Learning.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2024, 2024

Certified Quantization Strategy Synthesis for Neural Networks.
Proceedings of the Formal Methods - 26th International Symposium, 2024

Defending Large Language Models Against Jailbreak Attacks via Layer-specific Editing.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024

Certified Robust Accuracy of Neural Networks Are Bounded Due to Bayes Errors.
Proceedings of the Computer Aided Verification - 36th International Conference, 2024

2023
Boosting Adversarial Training in Safety-Critical Systems Through Boundary Data Selection.
IEEE Robotics Autom. Lett., December, 2023

Refinement-based Specification and Analysis of Multi-core ARINC 653 Using Event-B.
Formal Aspects Comput., December, 2023

Constructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing.
IEEE Trans. Software Eng., November, 2023

TestSGD: Interpretable Testing of Neural Networks against Subtle Group Discrimination.
ACM Trans. Softw. Eng. Methodol., November, 2023

Personal Information Protection in Government Data Openness Using Decision Tree Model.
J. Glob. Inf. Manag., November, 2023

K-ST: A Formal Executable Semantics of the Structured Text Language for PLCs.
IEEE Trans. Software Eng., October, 2023

QuoTe: Quality-oriented Testing for Deep Learning Systems.
ACM Trans. Softw. Eng. Methodol., September, 2023

Specification-Based Autonomous Driving System Testing.
IEEE Trans. Software Eng., June, 2023

Achieving High MAP-Coverage Through Pattern Constraint Reduction.
IEEE Trans. Software Eng., 2023

Formalizing UML State Machines for Automated Verification - A Survey.
ACM Comput. Surv., 2023

Causality Analysis for Evaluating the Security of Large Language Models.
CoRR, 2023

Prompting Frameworks for Large Language Models: A Survey.
CoRR, 2023

Configuring Timing Parameters to Ensure Execution-Time Opacity in Timed Automata.
Proceedings of the First Workshop on Trends in Configurable Systems Analysis, 2023

Backdoor Attack through Machine Unlearning.
CoRR, 2023

Towards Certified Probabilistic Robustness with High Accuracy.
CoRR, 2023

How Generalizable are Deepfake Detectors? An Empirical Study.
CoRR, 2023

Towards Better Fairness-Utility Trade-off: A Comprehensive Measurement-Based Reinforcement Learning Framework.
CoRR, 2023

Fuzzing with Quantitative and Adaptive Hot-Bytes Identification.
CoRR, 2023

Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Learning Program Semantics for Vulnerability Detection via Vulnerability-Specific Inter-procedural Slicing.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Towards an Effective and Interpretable Refinement Approach for DNN Verification.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Testing Automated Driving Systems by Breaking Many Laws Efficiently.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Silent Compiler Bug De-duplication via Three-Dimensional Analysis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Semantic-Based Neural Network Repair.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

DeepArc: Modularizing Neural Networks for the Model Maintenance.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Finding Causally Different Tests for an Industrial Control System.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Two Sides of the Same Coin: Exploiting the Impact of Identifiers in Neural Code Comprehension.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Black-Box Fairness Testing with Shadow Models.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

An Idealist's Approach for Smart Contract Correctness.
Proceedings of the Formal Methods and Software Engineering, 2023

QEBVerif: Quantization Error Bound Verification of Neural Networks.
Proceedings of the Computer Aided Verification - 35th International Conference, 2023

Mitigating Membership Inference Attacks via Weighted Smoothing.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Experimental data for Distributed parametric model checking timed automata under non-Zenoness assumption.
Dataset, September, 2022

Automatic Fairness Testing of Neural Classifiers Through Adversarial Sampling.
IEEE Trans. Software Eng., 2022

Holistic Combination of Structural and Textual Code Information for Context Based API Recommendation.
IEEE Trans. Software Eng., 2022

Delta Debugging Microservice Systems with Parallel Optimization.
IEEE Trans. Serv. Comput., 2022

Guaranteeing Timed Opacity using Parametric Timed Model Checking.
ACM Trans. Softw. Eng. Methodol., 2022

Physical Adversarial Attack on a Robotic Arm.
IEEE Robotics Autom. Lett., 2022

A Quantum interpretation of separating conjunction for local reasoning of Quantum programs based on separation logic.
Proc. ACM Program. Lang., 2022

Preface.
J. Comput. Sci. Technol., 2022

Enjoy your observability: an industrial survey of microservice tracing and analysis.
Empir. Softw. Eng., 2022

"More Than Deep Learning": post-processing for API sequence recommendation.
Empir. Softw. Eng., 2022

QVIP: An ILP-based Formal Verification Approach for Quantized Neural Networks.
CoRR, 2022

S2TD: a Separation Logic Verifier that Supports Reasoning of the Absence and Presence of Bugs.
CoRR, 2022

CARBON: A Counterfactual Reasoning based Framework for Neural Code Comprehension Debiasing.
CoRR, 2022

Causality-based Neural Network Repair.
CoRR, 2022

K-ST: A Formal Executable Semantics of PLC Structured Text Language.
CoRR, 2022

Which neural network makes more explainable decisions? An approach towards measuring explainability.
Autom. Softw. Eng., 2022

Repairing Adversarial Texts Through Perturbation.
Proceedings of the Theoretical Aspects of Software Engineering, 2022

Adaptive fairness improvement based on causality analysis.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

ORIGAMI: Folding Data Structures to Reduce Timing Side-Channel Leakage.
Proceedings of the 20th ACM-IEEE International Conference on Formal Methods and Models for System Design, 2022

QVIP: An ILP-based Formal Verification Approach for Quantized Neural Networks.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

LawBreaker: An Approach for Specifying Traffic Laws and Fuzzing Autonomous Vehicles.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Causality-Based Neural Network Repair.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

ExAIS: Executable AI Semantics.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

gDefects4DL: A Dataset of General Real-World Deep Learning Program Defects.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022

Verifying Neural Networks Against Backdoor Attacks.
Proceedings of the Computer Aided Verification - 34th International Conference, 2022

2021
Fault Analysis and Debugging of Microservice Systems: Industrial Survey, Benchmark System, and Empirical Study.
IEEE Trans. Software Eng., 2021

Automatically 'Verifying' Discrete-Time Complex Systems through Learning, Abstraction and Refinement.
IEEE Trans. Software Eng., 2021

Explaining Regressions via Alignment Slicing and Mending.
IEEE Trans. Software Eng., 2021

hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems.
Int. J. Crit. Infrastructure Prot., 2021

Distributed parametric model checking timed automata under non-Zenoness assumption.
Formal Methods Syst. Des., 2021

Better Pay Attention Whilst Fuzzing.
CoRR, 2021

Machine Learning Guided Cross-Contract Fuzzing.
CoRR, 2021

Fairness Testing of Deep Image Classification with Adequacy Metrics.
CoRR, 2021

A Topic Guided Pointer-Generator Model for Generating Natural Language Code Summaries.
CoRR, 2021

Assessing Code Clone Harmfulness: Indicators, Factors, and Counter Measures.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021

Improving Neural Network Verification through Spurious Region Guided Refinement.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2021

SGUARD: Towards Fixing Vulnerable Smart Contracts Automatically.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Code integrity attestation for PLCs using black box neural network predictions.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Graph-based seed object synthesis for search-based unit testing.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

HARS: Heuristic-Enhanced Adaptive Randomized Scheduling for Concurrency Testing.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Towards Repairing Neural Networks Correctly.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

FIGCPS: Effective Failure-inducing Input Generation for Cyber-Physical Systems with Deep Reinforcement Learning.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Collision Avoidance Testing for Autonomous Driving Systems on Complete Maps.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2021

Attack as defense: characterizing adversarial examples using robustness.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

Type and interval aware array constraint solving for symbolic execution.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

sVerify: Verifying Smart Contracts Through Lazy Annotation and Learning.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation, 2021

RobOT: Robustness-Oriented Testing for Deep Learning Systems.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Route Coverage Testing for Autonomous Vehicles via Map Modeling.
Proceedings of the IEEE International Conference on Robotics and Automation, 2021

Probabilistic Verification of Neural Networks Against Group Fairness.
Proceedings of the Formal Methods - 24th International Symposium, 2021

SpecTest: Specification-Based Compiler Testing.
Proceedings of the Fundamental Approaches to Software Engineering, 2021

Verification Assisted Gas Reduction for Smart Contracts.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021

2020
Automated synthesis of local time requirement for service composition.
Softw. Syst. Model., 2020

Towards Repairing Neural Networks Correctly.
CoRR, 2020

SOCRATES: Towards a Unified Platform for Neural Network Verification.
CoRR, 2020

SAGA: Efficient and Large-Scale Detection of Near-Miss Clones with GPU Acceleration.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

Systematic Classification of Attackers via Bounded Model Checking.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2020

Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Accelerating All-SAT Computation with Short Blocking Clauses.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Towards Generating Thread-Safe Classes Automatically.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Towards Interpreting Recurrent Neural Networks through Probabilistic Abstraction.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

ObjSim: efficient testing of cyber-physical systems.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

Active fuzzing for testing and securing cyber-physical systems.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

Recovering fitness gradients for interprocedural Boolean flags in search-based testing.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

What Makes Open Source Software Projects Impactful: A Data-Driven Approach.
Proceedings of the Internetware'20: 12th Asia-Pacific Symposium on Internetware, 2020

White-box fairness testing through adversarial sampling.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Symbolic verification of message passing interface programs.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

sFuzz: an efficient adaptive fuzzer for solidity smart contracts.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Learning Fault Models of Cyber Physical Systems.
Proceedings of the Formal Methods and Software Engineering, 2020

IFIX: Fixing Concurrency Bugs While They Are Introduced.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

Automatic Verification of Multi-threaded Programs by Inference of Rely-Guarantee Specifications.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

An Empirical Study on Correlation between Coverage and Robustness for Deep Neural Networks.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

A Generalized Formal Semantic Framework for Smart Contracts.
Proceedings of the Fundamental Approaches to Software Engineering, 2020

Provably Robust Decisions based on Potentially Malicious Sources of Information.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

Global PAC Bounds for Learning Discrete Time Markov Chains.
Proceedings of the Computer Aided Verification - 32nd International Conference, 2020

CoinWatch: A Clone-Based Approach For Detecting Vulnerabilities in Cryptocurrencies.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
Data for paper "Parametric Timed Model Checking for Guaranteeing Timed Opacity".
Dataset, June, 2019

Sequential Schemes for Frequentist Estimation of Properties in Statistical Model Checking.
ACM Trans. Model. Comput. Simul., 2019

Practical static analysis of context leaks in Android applications.
Softw. Pract. Exp., 2019

There is Limited Correlation between Coverage and Robustness for Deep Neural Networks.
CoRR, 2019

GasFuzz: Generating High Gas Consumption Inputs to Avoid Out-of-Gas Vulnerability.
CoRR, 2019

Analyzing Recurrent Neural Network by Probabilistic Abstraction.
CoRR, 2019

AI-boosted software automation: learning from human pair programmers.
Sci. China Inf. Sci., 2019

Generative API usage code recommendation with parameter concretization.
Sci. China Inf. Sci., 2019

Latent error prediction and fault localization for microservice applications by learning from system trace logs.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

MAP-Coverage: A Novel Coverage Criterion for Testing Thread-Safe Classes.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Adversarial sample detection for deep neural network through model mutation testing.
Proceedings of the 41st International Conference on Software Engineering, 2019

sCompile: Critical Path Identification and Analysis for Smart Contracts.
Proceedings of the Formal Methods and Software Engineering, 2019

Adaptive Randomized Scheduling for Concurrency Bug Detection.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

Concolic Testing Heap-Manipulating Programs.
Proceedings of the Formal Methods - The Next 30 Years - Third World Congress, 2019

Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Enhancing Symbolic Execution of Heap-Based Programs with Separation Logic for Test Input Generation.
Proceedings of the Automated Technology for Verification and Analysis, 2019

Parametric Timed Model Checking for Guaranteeing Timed Opacity.
Proceedings of the Automated Technology for Verification and Analysis, 2019

Compositional Verification of Heap-Manipulating Programs Through Property-Guided Learning.
Proceedings of the Programming Languages and Systems - 17th Asian Symposium, 2019

2018
An Adaptive Markov Strategy for Defending Smart Grid False Data Injection From Malicious Attackers.
IEEE Trans. Smart Grid, 2018

Towards Model Checking Android Applications.
IEEE Trans. Software Eng., 2018

A Formal Specification and Verification Framework for Timed Security Protocols.
IEEE Trans. Software Eng., 2018

CrowdService: Optimizing Mobile Crowdsourcing and Service Composition.
ACM Trans. Internet Techn., 2018

Efficient and Robust Emergence of Norms through Heuristic Collective Learning.
ACM Trans. Auton. Adapt. Syst., 2018

Learning probabilistic models for model checking: an evolutionary approach and an empirical study.
Int. J. Softw. Tools Technol. Transf., 2018

Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication.
IEEE Commun. Lett., 2018

A UTP semantics for communicating processes with shared variables and its formal encoding in PVS.
Formal Aspects Comput., 2018

Quantifying Attacker Capability Via Model Checking Multiple Properties (Extended Version).
CoRR, 2018

sCompile: Critical Path Identification and Analysis for Smart Contracts.
CoRR, 2018

Detecting Adversarial Samples for Deep Neural Networks through Mutation Testing.
CoRR, 2018

Executable Operational Semantics of Solidity.
CoRR, 2018

Frame Inference for Inductive Entailment Proofs in Separation Logic.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2018

Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Delta debugging microservice systems.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

PFix: fixing concurrency bugs based on memory access patterns.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Break the dead end of dynamic slicing: localizing data and control omission bug.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

On the Sequential Massart Algorithm for Statistical Model Checking.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Verification, 2018

Alignment Between Enterprise Green Supply Chain and Green Information System: An Analysis of Four Cases.
Proceedings of the 2018 IEEE International Conference on Industrial Engineering and Engineering Management, 2018

Understanding Influential Factors in Selecting Sustainable Third-party Logistics Providers: An Interpretive Structural Modeling and MICMAC Analysis.
Proceedings of the 2018 IEEE International Conference on Industrial Engineering and Engineering Management, 2018

Benchmarking microservice systems for software engineering research.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Towards optimal concolic testing.
Proceedings of the 40th International Conference on Software Engineering, 2018

Static analysis of context leaks in android applications.
Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, 2018

Testing heap-based programs with Java StarFinder.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

The Miles Before Formal Methods - A Case Study on Modeling and Analyzing a Passenger Lift System.
Proceedings of the Formal Methods and Software Engineering, 2018

Compositional Reasoning for Shared-Variable Concurrent Programs.
Proceedings of the Formal Methods - 22nd International Symposium, 2018

Towards 'Verifying' a Water Treatment System.
Proceedings of the Formal Methods - 22nd International Symposium, 2018

Importance Sampling of Interval Markov Chains.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
Language Inclusion Checking of Timed Automata with Non-Zenoness.
IEEE Trans. Software Eng., 2017

Battery-Aware Mobile Data Service.
IEEE Trans. Mob. Comput., 2017

Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique.
IEEE Trans. Inf. Forensics Secur., 2017

Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate.
Mob. Inf. Syst., 2017

Hiding Information Into Voice-Over-IP Streams Using Adaptive Bitrate Modulation.
IEEE Commun. Lett., 2017

Toward 'verifying' a Water Treatment System.
CoRR, 2017

Parametric Model Checking Timed Automata Under Non-Zenoness Assumption.
Proceedings of the NASA Formal Methods - 9th International Symposium, 2017

O2O service composition with social collaboration.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

FiB: squeezing loop invariants by interpolation between Forward/Backward predicate transformers.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Mining implicit design templates for actionable code reuse.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Automatic loop-invariant generation and refinement through selective sampling.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

JSFox: integrating static and dynamic type analysis of JavaScript programs.
Proceedings of the 39th International Conference on Software Engineering, 2017

Feedback-based debugging.
Proceedings of the 39th International Conference on Software Engineering, 2017

Improving Probability Estimation Through Active Probabilistic Model Learning.
Proceedings of the Formal Methods and Software Engineering, 2017

Assertion Generation Through Active Learning.
Proceedings of the Formal Methods and Software Engineering, 2017

Classification-Based Parameter Synthesis for Parametric Timed Automata.
Proceedings of the Formal Methods and Software Engineering, 2017

A Verification Framework for Stateful Security Protocols.
Proceedings of the Formal Methods and Software Engineering, 2017

Learning Likely Invariants to Explain Why a Program Fails.
Proceedings of the 22nd International Conference on Engineering of Complex Computer Systems, 2017

Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study.
Proceedings of the Fundamental Approaches to Software Engineering, 2017

A Decidable Fragment in Separation Logic with Inductive Predicates and Arithmetic.
Proceedings of the Computer Aided Verification - 29th International Conference, 2017

2016
Improved EGT-Based Robustness Analysis of Negotiation Strategies in Multiagent Systems via Model Checking.
IEEE Trans. Hum. Mach. Syst., 2016

Formalizing and verifying stochastic system architectures using Monterey Phoenix.
Softw. Syst. Model., 2016

Compositional Reasoning for Shared-variable Concurrent Programs.
CoRR, 2016

Verifying Complex Systems Probabilistically through Learning, Abstraction and Refinement.
CoRR, 2016

IBED: Combining IBEA and DE for optimal feature selection in software product line engineering.
Appl. Soft Comput., 2016

Regular Symmetry Patterns.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2016

Designing minimal effective normative systems with the help of lightweight formal methods.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

CrowdService: serving the individuals through mobile crowdsourcing and service composition.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Optimizing selection of competing services with probabilistic hierarchical refinement.
Proceedings of the 38th International Conference on Software Engineering, 2016

Scaling BDD-based Timed Verification with Simulation Reduction.
Proceedings of the Formal Methods and Software Engineering, 2016

Service Adaptation with Probabilistic Partial Models.
Proceedings of the Formal Methods and Software Engineering, 2016

Improving Quality of Use Case Documents through Learning and User Interaction.
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016

Towards Using Concurrent Java API Correctly.
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016

Automated Verification of Timed Security Protocols with Clock Drift.
Proceedings of the FM 2016: Formal Methods, 2016

Towards Concolic Testing for Hybrid Systems.
Proceedings of the FM 2016: Formal Methods, 2016

Towards Learning and Verifying Invariants of Cyber-Physical Systems by Code Mutation.
Proceedings of the FM 2016: Formal Methods, 2016

Satisfiability Modulo Heap-Based Programs.
Proceedings of the Computer Aided Verification - 28th International Conference, 2016

2015
A Systematic Study on Explicit-State Non-Zenoness Checking for Timed Automata.
IEEE Trans. Software Eng., 2015

Regular Symmetry Patterns (Technical Report).
CoRR, 2015

Event and Strategy Analytics.
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015

TLV: abstraction through testing, learning, and validation.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Formalizing and verifying stochastic system architectures using Monterey Phoenix (SoSyM abstract).
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

Interpolation Guided Compositional Verification (T).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

Detection and classification of malicious JavaScript via attack behavior modelling.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Optimizing selection of competing features via feedback-directed evolutionary algorithms.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Reliability assessment for distributed systems via communication abstraction and refinement.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

An Adaptive Markov Strategy for Effective Network Intrusion Detection.
Proceedings of the 27th IEEE International Conference on Tools with Artificial Intelligence, 2015

GPU Accelerated On-the-Fly Reachability Checking.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

All Your Sessions Are Belong to Us: Investigating Authenticator Leakage through Backup Channels on Android.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

Verifying Parameterized Timed Security Protocols.
Proceedings of the FM 2015: Formal Methods, 2015

Heuristic Collective Learning for Efficient and Robust Emergence of Social Norms.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

2014
Learning Assumptions for CompositionalVerification of Timed Systems.
IEEE Trans. Software Eng., 2014

Towards Formal Modelling and Verification of Pervasive Computing Systems.
Trans. Comput. Collect. Intell., 2014

Parameter synthesis for hierarchical concurrent real-time systems.
Real Time Syst., 2014

Complexity of the Soundness Problem of Workflow Nets.
Fundam. Informaticae, 2014

Model checking approach to automated planning.
Formal Methods Syst. Des., 2014

Model checking with fairness assumptions using PAT.
Frontiers Comput. Sci., 2014

Towards verification of computation orchestration.
Formal Aspects Comput., 2014

Stateful Security Protocol Verification.
CoRR, 2014

Automated runtime recovery for QoS-based service composition.
Proceedings of the 23rd International World Wide Web Conference, 2014

Are Timed Automata Bad for a Specification Language? Language Inclusion Checking for Timed Automata.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2014

RaPiD: a toolkit for reliability analysis of non-deterministic systems.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Automatic early defects detection in use case documents.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

Event Analytics.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2014, 2014

Clonepedia: Summarizing Code Clones by Common Syntactic Context for Software Maintenance.
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014

Detecting differences across multiple instances of code clones.
Proceedings of the 36th International Conference on Software Engineering, 2014

VeriWS: a tool for verification of combined functional and non-functional requirements of web service composition.
Proceedings of the 36th International Conference on Software Engineering, 2014

GPU Accelerated Counterexample Generation in LTL Model Checking.
Proceedings of the Formal Methods and Software Engineering, 2014

TAuth: Verifying Timed Security Protocols.
Proceedings of the Formal Methods and Software Engineering, 2014

Practical Analysis Framework for Software-Based Attestation Scheme.
Proceedings of the Formal Methods and Software Engineering, 2014

SCC-Based Improved Reachability Analysis for Markov Decision Processes.
Proceedings of the Formal Methods and Software Engineering, 2014

A Hybrid Model of Connectors in Cyber-Physical Systems.
Proceedings of the Formal Methods and Software Engineering, 2014

Symbolic Analysis of an Electric Vehicle Charging Protocol.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

Adaptive Defending Strategy for Smart Grid Attacks.
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014

Diamonds Are a Girl's Best Friend: Partial Order Reduction for Timed Automata with Abstractions.
Proceedings of the Computer Aided Verification - 26th International Conference, 2014

Towards a Combination of CafeOBJ and PAT.
Proceedings of the Specification, Algebra, and Software, 2014

An extensive model checking framework for multi-agent systems.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

2013
Verifying Linearizability via Optimized Refinement Checking.
IEEE Trans. Software Eng., 2013

Modeling and verifying hierarchical real-time systems using stateful timed CSP.
ACM Trans. Softw. Eng. Methodol., 2013

State Space Reduction for Sensor Networks Using Two-Level Partial Order Reduction.
Proceedings of the Verification, 2013

USMMC: a self-contained model checker for UML state machines.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Towards Formal Modeling and Verification of Cloud Architectures: A Case Study on Hadoop.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Social-Loc: improving indoor localization with social sensing.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Constraint-based automatic symmetry detection.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

TzuYu: Learning stateful typestates.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Automatically partition software into least privilege components using dynamic data dependency analysis.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Combining model checking and testing with an application to reliability prediction and distribution.
Proceedings of the International Symposium on Software Testing and Analysis, 2013

Improved Reachability Analysis in DTMC via Divide and Conquer.
Proceedings of the Integrated Formal Methods, 10th International Conference, 2013

A Formal Semantics for Complete UML State Machines with Communications.
Proceedings of the Integrated Formal Methods, 10th International Conference, 2013

Dynamic synthesis of local time requirement for service composition.
Proceedings of the 35th International Conference on Software Engineering, 2013

Build your own model checker in one month.
Proceedings of the 35th International Conference on Software Engineering, 2013

Improving Model Checking Stateful Timed CSP with non-Zenoness through Clock-Symmetry Reduction.
Proceedings of the Formal Methods and Software Engineering, 2013

A UTP Semantics for Communicating Processes with Shared Variables.
Proceedings of the Formal Methods and Software Engineering, 2013

vTRUST: A Formal Modeling and Verification Framework for Virtualization Systems.
Proceedings of the Formal Methods and Software Engineering, 2013

Verification of Functional and Non-functional Requirements of Web Service Composition.
Proceedings of the Formal Methods and Software Engineering, 2013

TTM/PAT: Specifying and Verifying Timed Transition Models.
Proceedings of the Formal Techniques for Safety-Critical Systems, 2013

PSyHCoS: Parameter Synthesis for Hierarchical Concurrent Real-Time Systems.
Proceedings of the Computer Aided Verification - 25th International Conference, 2013

CELL: A Compositional Verification Framework.
Proceedings of the Automated Technology for Verification and Analysis, 2013

Multi-core Model Checking Algorithms for LTL Verification with Fairness Assumptions.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

2012
Timed Automata.
Proceedings of the Handbook of Finite State Based Models and Applications., 2012

Formal modeling and validation of Stateflow diagrams.
Int. J. Softw. Tools Technol. Transf., 2012

SeVe: automatic tool for verification of security protocols.
Frontiers Comput. Sci. China, 2012

Planning as Model Checking Tasks.
Proceedings of the 35th Annual IEEE Software Engineering Workshop, 2012

Improving indoor localization with social interactions.
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012

Probabilistic Model Checking Multi-agent Behaviors in Dispersion Games Using Counter Abstraction.
Proceedings of the PRIMA 2012: Principles and Practice of Multi-Agent Systems, 2012

Analyzing multi-agent systems with probabilistic model checking approach.
Proceedings of the 34th International Conference on Software Engineering, 2012

More Anti-chain Based Refinement Checking.
Proceedings of the Formal Methods and Software Engineering, 2012

An Analytical and Experimental Comparison of CSP Extensions and Tools.
Proceedings of the Formal Methods and Software Engineering, 2012

Symbolic Model-Checking of Stateful Timed CSP Using BDD and Digitization.
Proceedings of the Formal Methods and Software Engineering, 2012

Automatic Generation of Provably Correct Embedded Systems.
Proceedings of the Formal Methods and Software Engineering, 2012

Formal Analysis of Pervasive Computing Systems.
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012

Translating PDDL into CSP# - The PAT Approach.
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012

Model Checking Software Architecture Design.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

Improved BDD-Based Discrete Analysis of Timed Systems.
Proceedings of the FM 2012: Formal Methods, 2012

Automatic Compositional Verification of Timed Systems.
Proceedings of the FM 2012: Formal Methods, 2012

A Model Checker for Hierarchical Probabilistic Real-Time Systems.
Proceedings of the Computer Aided Verification - 24th International Conference, 2012

Using Monterey Phoenix to Formalize and Verify System Architectures.
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012

Complexity of the Soundness Problem of Bounded Workflow Nets.
Proceedings of the Application and Theory of Petri Nets - 33rd International Conference, 2012

2011
Towards bug-free implementation for wireless sensor networks.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011

A model checking framework for hierarchical systems.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

PAT 3: An Extensible Architecture for Building Multi-domain Model Checkers.
Proceedings of the IEEE 22nd International Symposium on Software Reliability Engineering, 2011

Towards a Model Checker for NesC and Wireless Sensor Networks.
Proceedings of the Formal Methods and Software Engineering, 2011

Differencing Labeled Transition Systems.
Proceedings of the Formal Methods and Software Engineering, 2011

Verification of Orchestration Systems Using Compositional Partial Order Reduction.
Proceedings of the Formal Methods and Software Engineering, 2011

PRTS: An Approach for Model Checking Probabilistic Real-Time Hierarchical Systems.
Proceedings of the Formal Methods and Software Engineering, 2011

On Combining State Space Reductions with Global Fairness Assumptions.
Proceedings of the FM 2011: Formal Methods, 2011

An Efficient Algorithm for Learning Event-Recording Automata.
Proceedings of the Automated Technology for Verification and Analysis, 2011

2010
A verification system for interval-based specification languages.
ACM Trans. Softw. Eng. Methodol., 2010

Analyzing hierarchical complex real-time systems.
Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2010

SpecDiff: debugging formal specifications.
Proceedings of the ASE 2010, 2010

Model Checking Hierarchical Probabilistic Systems.
Proceedings of the Formal Methods and Software Engineering, 2010

Model Checking a Model Checker: A Code Contract Combined Approach.
Proceedings of the Formal Methods and Software Engineering, 2010

Developing Model Checkers Using PAT.
Proceedings of the Automated Technology for Verification and Analysis, 2010

Model-Based Methods for Linking Web Service Choreography and Orchestration.
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010

2009
A formal framework for modeling and validating Simulink diagrams.
Formal Aspects Comput., 2009

Integrating Specification and Programs for System Modeling and Verification.
Proceedings of the TASE 2009, 2009

Verification of Population Ring Protocols in PAT.
Proceedings of the TASE 2009, 2009

Towards Expressive Specification and Efficient Model Checking.
Proceedings of the TASE 2009, 2009

Formal Verification of Scalable NonZero Indicators.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

Verifying Stateful Timed CSP Using Implicit Clocks and Zone Abstraction.
Proceedings of the Formal Methods and Software Engineering, 2009

Scalable Multi-core Model Checking Fairness Enhanced Systems.
Proceedings of the Formal Methods and Software Engineering, 2009

Fair Model Checking with Process Counter Abstraction.
Proceedings of the FM 2009: Formal Methods, 2009

Model Checking Linearizability via Refinement.
Proceedings of the FM 2009: Formal Methods, 2009

PAT: Towards Flexible Verification under Fairness.
Proceedings of the Computer Aided Verification, 21st International Conference, 2009

2008
Timed Automata Patterns.
IEEE Trans. Software Eng., 2008

Compositional encoding for bounded model checking.
Frontiers Comput. Sci. China, 2008

Bounded Model Checking of Compositional Processes.
Proceedings of the Second IEEE/IFIP International Symposium on Theoretical Aspects of Software Engineering, 2008

Model Checking CSP Revisited: Introducing a Process Analysis Toolkit.
Proceedings of the Leveraging Applications of Formal Methods, 2008

An analyzer for extended compositional process algebras.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

A verification system for timed interval calculus.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

Specifying and Verifying Event-Based Fairness Enhanced Systems.
Proceedings of the Formal Methods and Software Engineering, 2008

Specifying and Verifying Sensor Networks: An Experiment of Formal Methods.
Proceedings of the Formal Methods and Software Engineering, 2008

A Scalable Approach to Multi-style Architectural Modeling and Verification.
Proceedings of the 13th International Conference on Engineering of Complex Computer Systems (ICECCS 2008), March 31 2008, 2008

A Formal Model of Semantic Web Service Ontology (WSMO) Execution.
Proceedings of the 13th International Conference on Engineering of Complex Computer Systems (ICECCS 2008), March 31 2008, 2008

How Users Respond to Authentication Methods: A Study of Security Readiness.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
Realizing Live Sequence Charts in SystemVerilog.
Proceedings of the First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering, 2007

Machine-Assisted Proof Support for Validation Beyond Simulink.
Proceedings of the Formal Methods and Software Engineering, 2007

A Formal Semantic Model of the Semantic Web Service Ontology (WSMO).
Proceedings of the 12th International Conference on Engineering of Complex Computer Systems (ICECCS 2007), 2007

2006
Design Synthesis from Interaction and State-Based Specifications.
IEEE Trans. Software Eng., 2006

Reasoning support for Semantic Web ontology family languages using Alloy.
Multiagent Grid Syst., 2006

Reasoning About ORA-SS Data Models Using the Semantic Web.
J. Data Semant., 2006

Validating Semistructured Data Using OWL.
Proceedings of the Advances in Web-Age Information Management, 2006

Context Awareness Systems Design and Reasoning.
Proceedings of the Leveraging Applications of Formal Methods, 2006

Verification of Computation Orchestration Via Timed Automata.
Proceedings of the Formal Methods and Software Engineering, 2006

A Reasoning Method for Timed CSP Based on Constraint Solving.
Proceedings of the Formal Methods and Software Engineering, 2006

2005
Algorithmic Design Using Object-Z for Twig XML Queries Evaluation.
Proceedings of the International Workshop on Web Languages and Formal Methods, 2005

Visualizing and Simulating Semantic Web Services Ontologies.
Proceedings of the Formal Methods and Software Engineering, 2005

Model Checking Live Sequence Charts.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

Extracting FSMs from Object-Z Specifications with History Invariants.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

Synthesis of Distributed Processes from Scenario-Based Specifications.
Proceedings of the FM 2005: Formal Methods, 2005

A Tools Environment for Developing and Reasoning about Ontologies.
Proceedings of the 12th Asia-Pacific Software Engineering Conference (APSEC 2005), 2005

2004
Generating MSCs from an Integrated Formal Specification Language.
Proceedings of the Integrated Formal Methods, 4th International Conference, 2004

Timed Patterns: TCOZ to Timed Automata.
Proceedings of the Formal Methods and Software Engineering, 2004

2003
Analysing Web Ontology in Alloy: A Military Case Study.
Proceedings of the Fifteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2003), 2003

2002
XML-Based Static Type Checking and Dynamic Visualization for TCOZ.
Proceedings of the Formal Methods and Software Engineering, 2002


  Loading...