Yang Liu
Orcid: 0000-0001-7300-9215Affiliations:
- Nanyang Technological University, School of Computer Engineering, Singapore
- National University of Singapore, Singapore (former)
According to our database1,
Yang Liu
authored at least 746 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on ntu.edu.sg
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
ACM Comput. Surv., February, 2025
Nonlinear MIMO observable normal forms with output injection and output diffeomorphism.
Appl. Math. Comput., 2025
2024
Reinforcement Learning Based Online Request Scheduling Framework for Workload-Adaptive Edge Deep Learning Inference.
IEEE Trans. Mob. Comput., December, 2024
IEEE Trans. Big Data, December, 2024
IEEE Trans. Artif. Intell., November, 2024
It's All in the Touch: Authenticating Users With HOST Gestures on Multi-Touch Screen Devices.
IEEE Trans. Mob. Comput., October, 2024
IEEE Trans. Software Eng., August, 2024
IEEE Trans. Circuits Syst. Video Technol., August, 2024
ACM Trans. Softw. Eng. Methodol., July, 2024
Artif. Intell. Rev., July, 2024
DL4SC: a novel deep learning-based vulnerability detection framework for smart contracts.
Autom. Softw. Eng., June, 2024
Empir. Softw. Eng., April, 2024
COCL: An Intelligent Framework for Enhancing Deep Learning-Based Vulnerability Detection.
IEEE Trans. Ind. Informatics, March, 2024
CodeBERT-Attack: Adversarial attack against source code deep learning models via pre-trained model.
J. Softw. Evol. Process., March, 2024
Distributed Motion Control for Multiple Mobile Robots Using Discrete-Event Systems and Model Predictive Control.
IEEE Trans. Syst. Man Cybern. Syst., February, 2024
ACM Trans. Softw. Eng. Methodol., January, 2024
A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services.
IEEE Trans. Computers, January, 2024
IEEE Trans. Multim., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2024
Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines.
IEEE Trans. Dependable Secur. Comput., 2024
Adversarial Learning for Coordinate Regression Through $k$k-Layer Penetrating Representation.
IEEE Trans. Dependable Secur. Comput., 2024
Proc. ACM Softw. Eng., 2024
Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We?
Proc. ACM Softw. Eng., 2024
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection.
Proc. ACM Softw. Eng., 2024
CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection.
Proc. ACM Softw. Eng., 2024
Knowl. Based Syst., 2024
Efficient and Effective Universal Adversarial Attack against Vision-Language Pre-training Models.
CoRR, 2024
PackageIntel: Leveraging Large Language Models for Automated Intelligence Extraction in Package Ecosystems.
CoRR, 2024
PathSeeker: Exploring LLM Security Vulnerabilities with a Reinforcement Learning-Based Jailbreak Approach.
CoRR, 2024
SoVAR: Building Generalizable Scenarios from Accident Reports for Autonomous Driving Testing.
CoRR, 2024
Investigating Coverage Criteria in Large Language Models: An In-Depth Study Through Jailbreak Attacks.
CoRR, 2024
CoRR, 2024
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing.
CoRR, 2024
CoRR, 2024
NeuSemSlice: Towards Effective DNN Model Maintenance via Neuron-level Semantic Slicing.
CoRR, 2024
SPOLRE: Semantic Preserving Object Layout Reconstruction for Image Captioning System Testing.
CoRR, 2024
CoRR, 2024
Repairing Catastrophic-Neglect in Text-to-Image Diffusion Models via Attention-Guided Feature Enhancement.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph.
CoRR, 2024
CoRR, 2024
Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake.
CoRR, 2024
CoRR, 2024
PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation.
CoRR, 2024
Open-Source AI-based SE Tools: Opportunities and Challenges of Collaborative Software Learning.
CoRR, 2024
Peer-aided Repairer: Empowering Large Language Models to Repair Advanced Student Assignments.
CoRR, 2024
An Empirical Study of Automated Vulnerability Localization with Large Language Models.
CoRR, 2024
SoK: Comprehensive Analysis of Rug Pull Causes, Datasets, and Detection Tools in DeFi.
CoRR, 2024
Combining Fine-Tuning and LLM-based Agents for Intuitive Smart Contract Auditing with Justifications.
CoRR, 2024
FineWAVE: Fine-Grained Warning Verification of Bugs for Automated Static Analysis Tools.
CoRR, 2024
ACFIX: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts.
CoRR, 2024
CoRR, 2024
CoRR, 2024
LLMs Can Defend Themselves Against Jailbreaking in a Practical Manner: A Vision Paper.
CoRR, 2024
Your Large Language Model is Secretly a Fairness Proponent and You Should Prompt it Like One.
CoRR, 2024
Groot: Adversarial Testing for Generative Text-to-Image Models with Tree-based Semantic Transformation.
CoRR, 2024
CoRR, 2024
FoolSDEdit: Deceptively Steering Your Edits Towards Targeted Attribute-aware Distribution.
CoRR, 2024
Improving Robustness of LiDAR-Camera Fusion Model against Weather Corruption from Fusion Strategy Perspective.
CoRR, 2024
Cheating Suffix: Targeted Attack to Text-To-Image Diffusion Models with Multi-Modal Priors.
CoRR, 2024
A Proactive and Dual Prevention Mechanism against Illegal Song Covers empowered by Singing Voice Conversion.
CoRR, 2024
CoRR, 2024
LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs' Vulnerability Reasoning.
CoRR, 2024
CoRR, 2024
MiniScope: Automated UI Exploration and Privacy Inconsistency Detection of MiniApps via Two-phase Iterative Hybrid Analysis.
CoRR, 2024
CoRR, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the IEEE International Conference on Software Analysis, 2024
Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts.
Proceedings of the 33rd USENIX Security Symposium, 2024
FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024
PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Enhancing Code Vulnerability Detection via Vulnerability-Preserving Data Augmentation.
Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, 2024
Is Aggregation the Only Choice? Federated Learning via Layer-wise Model Recombination.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Uncovering and Mitigating the Impact of Code Obfuscation on Dataset Annotation with Antivirus Engines.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open-Source Software.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
VSGT: Variational Spatial and Gaussian Temporal Graph Models for EEG-based Emotion Recognition.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
On Extracting Specialized Code Abilities from Large Language Models: A Feasibility Study.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Machine Learning is All You Need: A Simple Token-based Approach for Effective Code Clone Detection.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
VBH-GNN: Variational Bayesian Heterogeneous Graph Neural Networks for Cross-subject Emotion Recognition.
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Second Tiny Papers Track at ICLR 2024, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Architecture-Agnostic Iterative Black-Box Certified Defense Against Adversarial Patches.
Proceedings of the IEEE International Conference on Acoustics, 2024
MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation.
Proceedings of the 2024 IEEE/ACM First International Conference on AI Foundation Models and Software Engineering, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
AdaptiveFL: Adaptive Heterogeneous Federated Learning for Resource-Constrained AIoT Systems.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Personalization as a Shortcut for Few-Shot Backdoor Attack against Text-to-Image Diffusion Models.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Formal Aspects Comput., December, 2023
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis.
ACM Trans. Softw. Eng. Methodol., November, 2023
ACM Trans. Softw. Eng. Methodol., September, 2023
IEEE Trans. Pattern Anal. Mach. Intell., September, 2023
IEEE Trans. Software Eng., June, 2023
Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis.
IEEE Trans. Knowl. Data Eng., June, 2023
GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search.
IEEE Trans. Software Eng., April, 2023
IEEE Trans. Software Eng., April, 2023
IEEE Trans. Software Eng., March, 2023
IEEE Robotics Autom. Lett., March, 2023
Baton: symphony of random testing and concolic testing through machine learning and taint analysis.
Sci. China Inf. Sci., March, 2023
A Large-Scale Empirical Study of Real-Life Performance Issues in Open Source Projects.
IEEE Trans. Software Eng., February, 2023
IEEE Trans. Software Eng., February, 2023
Cooperative collision avoidance in multirobot systems using fuzzy rules and velocity obstacles.
Robotica, February, 2023
IEEE Des. Test, February, 2023
ACM Trans. Softw. Eng. Methodol., January, 2023
IEEE Trans. Intell. Transp. Syst., January, 2023
IEEE Trans. Software Eng., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Pattern Anal. Mach. Intell., 2023
Improving real-time of Jailhouse on embedded systems via bank and cache partitioning.
Int. J. Embed. Syst., 2023
ACM Comput. Surv., 2023
SA-Attack: Improving Adversarial Transferability of Vision-Language Pre-training Models via Self-Augmentation.
CoRR, 2023
OT-Attack: Enhancing Adversarial Transferability of Vision-Language Models via Optimal Transport Optimization.
CoRR, 2023
TranSegPGD: Improving Transferability of Adversarial Examples on Semantic Segmentation.
CoRR, 2023
Abstract Syntax Tree for Programming Language Understanding and Representation: How Far Are We?
CoRR, 2023
AdapterFL: Adaptive Heterogeneous Federated Learning for Resource-constrained Mobile Computing Systems.
CoRR, 2023
The Software Genome Project: Venture to the Genomic Pathways of Open Source Software and Its Applications.
CoRR, 2023
Boosting Static Resource Leak Detection via LLM-based Resource-Oriented Intention Inference.
CoRR, 2023
CoRR, 2023
Event-based Compositional Reasoning of Information-Flow Security for Concurrent Systems.
CoRR, 2023
Protect Federated Learning Against Backdoor Attacks via Data-Free Trigger Generation.
CoRR, 2023
When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan.
CoRR, 2023
Towards Understanding the Capability of Large Language Models on Code Clone Detection: A Survey.
CoRR, 2023
An Empirical Study on the Effectiveness of Noisy Label Learning for Program Understanding.
CoRR, 2023
CoRR, 2023
CoRR, 2023
CoRR, 2023
Proceedings of the IEEE International Conference on Software Analysis, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Ubiquitous Security, 2023
Do NoT Open (DOT): A Unified Generic and Specialized Models for Detecting Malicious Email Attachments.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
GitFL: Uncertainty-Aware Real-Time Asynchronous Federated Learning Using Version Control.
Proceedings of the IEEE Real-Time Systems Symposium, 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Who is the Real Hero? Measuring Developer Contribution via Multi-Dimensional Data Integration.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
An Empirical Study on Fine-Tuning Large Language Models of Code for Automated Program Repair.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Comparison and Evaluation of Clone Detection Techniques with Different Code Representations.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
FLYOVER: A Model-Driven Method to Generate Diverse Highway Interchanges for Autonomous Vehicle Testing.
Proceedings of the IEEE International Conference on Robotics and Automation, 2023
Proceedings of the International Conference on Machine Learning, 2023
SDG-L: A Semiparametric Deep Gaussian Process based Framework for Battery Capacity Prediction.
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the 15th IEEE International Conference on Advanced Infocomm Technology, 2023
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023
An EEG Channel Selection Framework for Driver Drowsiness Detection via Interpretability Guidance.
Proceedings of the 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2023
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023
PumpChannel: An Efficient and Secure Communication Channel for Trusted Execution Environment on ARM-FPGA Embedded SoC.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023
Proceedings of the 7th ACM Computer Science in Cars Symposium, 2023
Proceedings of the Theories of Programming and Formal Methods, 2023
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Vulnerability Analysis, Robustness Verification, and Mitigation Strategy for Machine Learning-Based Power System Stability Assessment Model Under Adversarial Examples.
IEEE Trans. Smart Grid, 2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Software Eng., 2022
Research on Third-Party Libraries in Android Apps: A Taxonomy and Systematic Literature Review.
IEEE Trans. Software Eng., 2022
Why My App Crashes? Understanding and Benchmarking Framework-Specific Exceptions of Android Apps.
IEEE Trans. Software Eng., 2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Reliab., 2022
ACM Trans. Softw. Eng. Methodol., 2022
ReCDroid+: Automated End-to-End Crash Reproduction from Bug Reports for Android Apps.
ACM Trans. Softw. Eng. Methodol., 2022
Towards Robustness of Deep Program Processing Models - Detection, Estimation, and Enhancement.
ACM Trans. Softw. Eng. Methodol., 2022
ACM Trans. Softw. Eng. Methodol., 2022
Breaking Neural Reasoning Architectures With Metamorphic Relation-Based Adversarial Examples.
IEEE Trans. Neural Networks Learn. Syst., 2022
IEEE Trans. Multim., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
Softw. Pract. Exp., 2022
Online adaptation for autonomous unmanned systems driven by requirements satisfaction model.
Softw. Syst. Model., 2022
Neural Networks, 2022
Int. J. Comput. Vis., 2022
Empir. Softw. Eng., 2022
ACM Comput. Surv., 2022
CoRR, 2022
Cargo Ecosystem Dependency-Vulnerability Knowledge Graph Construction and Vulnerability Propagation Study.
CoRR, 2022
CoRR, 2022
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View.
CoRR, 2022
Modx: Binary Level Partial Imported Third-Party Library Detection through Program Modularization and Semantic Matching.
CoRR, 2022
Towards characterizing bug fixes through dependency-level changes in Apache Java open source projects.
Sci. China Inf. Sci., 2022
Proceedings of the IEEE International Conference on Software Analysis, 2022
Fair and accurate age prediction using distribution aware data curation and augmentation.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022
RegexScalpel: Regular Expression Denial of Service (ReDoS) Defense by Localize-and-Fix.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
KUBO: a framework for automated efficacy testing of anti-virus behavioral detection with procedure-based malware emulation.
Proceedings of the 13th International Workshop on Automating Test Case Design, 2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Has My Release Disobeyed Semantic Versioning? Static Detection Based on Semantic Differencing.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
ModX: Binary Level Partially Imported Third-Party Library Detection via Program Modularization and Semantic Matching.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
A Formal Methodology for Verifying Side-Channel Vulnerabilities in Cache Architectures.
Proceedings of the Formal Methods and Software Engineering, 2022
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022
Can You Spot the Chameleon? Adversarially Camouflaging Images from Co-Salient Object Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
More Secure Collaborative APIs resistant to Flush-Based Cache Attacks on Cortex-A9 Based Automotive System.
Proceedings of the Computer Science in Cars Symposium, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 8th International Conference on Big Data Computing and Communications, 2022
2021
Vulnerability Assessment of Deep Reinforcement Learning Models for Power System Topology Optimization.
IEEE Trans. Smart Grid, 2021
Erratum to "Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search With Emulation".
IEEE Trans. Software Eng., 2021
IEEE Trans. Software Eng., 2021
Mining Likely Analogical APIs Across Third-Party Libraries via Large-Scale Unsupervised API Semantics Embedding.
IEEE Trans. Software Eng., 2021
Why an Android App Is Classified as Malware: Toward Malware Classification Interpretation.
ACM Trans. Softw. Eng. Methodol., 2021
CSim<sup><i>2</i></sup>: Compositional Top-down Verification of Concurrent Systems using Rely-Guarantee.
ACM Trans. Program. Lang. Syst., 2021
IEEE Trans. Image Process., 2021
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2021
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Computers, 2021
J. Comput. Secur., 2021
An Isabelle/HOL Formalisation of the SPARC Instruction Set Architecture and the TSO Memory Model.
J. Autom. Reason., 2021
Int. J. Softw. Eng. Knowl. Eng., 2021
Neurocomputing, 2021
Advanced evasion attacks and mitigations on practical ML-based phishing website classifiers.
Int. J. Intell. Syst., 2021
CoRR, 2021
CoRR, 2021
Boosting the Capability of Intelligent Vulnerability Detection by Training in a Human-Learning Manner.
CoRR, 2021
A Survey on Scenario-Based Testing for Automated Driving Systems in High-Fidelity Simulation.
CoRR, 2021
GraphSearchNet: Enhancing GNNs via Capturing Global Dependency for Semantic Code Search.
CoRR, 2021
Research on Third-Party Libraries in AndroidApps: A Taxonomy and Systematic LiteratureReview.
CoRR, 2021
When NAS Meets Watermarking: Ownership Verification of DNN Models via Cache Side Channels.
CoRR, 2021
IEEE Access, 2021
Design and Synthesis of Inductorless Passive Cell Operating as Stop-Band Negative Group Delay Function.
IEEE Access, 2021
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
AdvFilter: Predictive Perturbation-aware Filtering against Adversarial Attack via Multi-domain Learning.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Systematic Testing of Autonomous Driving Systems Using Map Topology-Based Scenario Classification.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Proceedings of the IEEE Intelligent Vehicles Symposium, 2021
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021
Peeking into the Gray Area of Mobile World: An Empirical Study of Unlabeled Android Apps.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021
A Unified Anomaly Detection Methodology for Lane-Following of Autonomous Driving Systems.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Proceedings of the 22nd Annual Conference of the International Speech Communication Association, Interspeech 2021, Brno, Czechia, August 30, 2021
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Proceedings of the IEEE International Conference on Robotics and Automation, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the 9th International Conference on Learning Representations, 2021
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
EfficientDeRain: Learning Pixel-wise Dilation Filtering for High-Efficiency Single-Image Deraining.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
IEEE Trans. Veh. Technol., 2020
METTLE: A METamorphic Testing Approach to Assessing and Validating Unsupervised Machine Learning Systems.
IEEE Trans. Reliab., 2020
Large-Scale Empirical Studies on Effort-Aware Security Vulnerability Prediction Methods.
IEEE Trans. Reliab., 2020
IEEE Trans. Inf. Forensics Secur., 2020
BBB-CFI: Lightweight CFI Approach Against Code-Reuse Attacks Using Basic Block Information.
ACM Trans. Embed. Comput. Syst., 2020
IEEE Trans. Circuits Syst., 2020
Softw. Syst. Model., 2020
SeqMobile: A Sequence Based Efficient Android Malware Detection System Using RNN on Mobile Devices.
CoRR, 2020
CoRR, 2020
EfficientDeRain: Learning Pixel-wise Dilation Filtering for High-Efficiency Single-Image Deraining.
CoRR, 2020
CoRR, 2020
CoRR, 2020
Fairness Matters - A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems.
CoRR, 2020
CoRR, 2020
CoRR, 2020
Why an Android App is Classified as Malware? Towards Malware Classification Interpretation.
CoRR, 2020
FakeLocator: Robust Localization of GAN-Based Face Manipulations via Semantic Segmentation Networks with Bells and Whistles.
CoRR, 2020
Autom., 2020
How Are Performance Issues Caused and Resolved?-An Empirical Study from a Design Perspective.
Proceedings of the ICPE '20: ACM/SPEC International Conference on Performance Engineering, 2020
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs.
Proceedings of the 29th USENIX Security Symposium, 2020
Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementations.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
How are Deep Learning Models Similar?: An Empirical Study on Clone Analysis of Deep Learning Software.
Proceedings of the ICPC '20: 28th International Conference on Program Comprehension, 2020
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Generating Behavior-Diverse Game AIs with Evolutionary Multi-Objective Deep Reinforcement Learning.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Proceedings of the Learning Technologies and Systems, 2020
An Empirical Study of Usages, Updates and Risks of Third-Party Libraries in Java Projects.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020
Towards characterizing adversarial defects of deep learning software from the lens of uncertainty.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Proceedings of the 2020 IEEE International Conference on Software Architecture, 2020
Proceedings of the 2020 IEEE International Conference on Software Architecture, 2020
Proceedings of the 2020 IEEE International Conference on Robotics and Automation, 2020
SeqMobile: An Efficient Sequence-Based Malware Detection System Using RNN on Mobile Devices.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020
Proceedings of the Computer Vision - ECCV 2020, 2020
Generating Adversarial Examples for Holding Robustness of Source Code Processing Models.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
Continuous Multiagent Control Using Collective Behavior Entropy for Large-Scale Home Energy Management.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
A Real-Time and Fully Distributed Approach to Motion Planning for Multirobot Systems.
IEEE Trans. Syst. Man Cybern. Syst., 2019
IEEE Trans. Software Eng., 2019
IEEE Trans. Software Eng., 2019
Architecture-Based Behavioral Adaptation with Generated Alternatives and Relaxed Constraints.
IEEE Trans. Serv. Comput., 2019
Layered Object-Oriented Programming: Advanced VTable Reuse Attacks on Binary-Level Defense.
IEEE Trans. Inf. Forensics Secur., 2019
Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets.
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Dependable Secur. Comput., 2019
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
J. Comput. Sci. Technol., 2019
Int. J. Softw. Eng. Knowl. Eng., 2019
Int. J. Comput. Sci. Eng., 2019
Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks.
IACR Cryptol. ePrint Arch., 2019
Empir. Softw. Eng., 2019
Des. Autom. Embed. Syst., 2019
Doublade: Unknown Vulnerability Detection in Smart Contracts Via Abstract Signature Matching and Refined Detection Rules.
CoRR, 2019
CoRR, 2019
CoRR, 2019
Comput. Secur., 2019
How security bugs are fixed and what can be improved: an empirical study with Mozilla.
Sci. China Inf. Sci., 2019
An Alterable Weight Minimum Spanning Tree Method for Electrical Collector System Planning in Tidal Current Generation Farms.
IEEE Access, 2019
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019
Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement Learning.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and Platforms.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019
Proceedings of the 41st International Conference on Software Engineering, 2019
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019
Proceedings of the 41st International Conference on Software Engineering: New Ideas and Emerging Results, 2019
Proceedings of the 41st International Conference on Software Engineering, 2019
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, 2019
Leopard: identifying vulnerable code for vulnerability assessment through program metrics.
Proceedings of the 41st International Conference on Software Engineering, 2019
Proceedings of the 41st International Conference on Software Engineering, 2019
Proceedings of the Formal Methods and Software Engineering, 2019
Secure Deep Learning Engineering: A Road Towards Quality Assurance of Intelligent Systems.
Proceedings of the Formal Methods and Software Engineering, 2019
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019
Proceedings of the Formal Methods - The Next 30 Years - Third World Congress, 2019
2018
IEEE Trans. Software Eng., 2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
A UTP semantics for communicating processes with shared variables and its formal encoding in PVS.
Formal Aspects Comput., 2018
A multi-view context-aware approach to Android malware detection and malicious code localization.
Empir. Softw. Eng., 2018
Cybersecur., 2018
CoRR, 2018
CoRR, 2018
CoRR, 2018
CoRR, 2018
A Validation and Quality Assessment Method with Metamorphic Relations for Unsupervised Machine Learning Software.
CoRR, 2018
AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps.
CoRR, 2018
DeepGauge: Comprehensive and Multi-Granularity Testing Criteria for Gauging the Robustness of Deep Learning Systems.
CoRR, 2018
Comput. Secur., 2018
Sci. China Inf. Sci., 2018
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018
Tell them apart: distilling technology differences from crowd-scale comparison discussions.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018
Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering, 2018
Proceedings of the Tenth Asia-Pacific Symposium on Internetware, 2018
Proceedings of the Tenth Asia-Pacific Symposium on Internetware, 2018
Proceedings of the Image and Graphics Technologies and Applications, 2018
Proceedings of the IEEE Third International Workshop on Dynamic Software Documentation, 2018
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
Proceedings of the 40th International Conference on Software Engineering, 2018
From UI design image to GUI skeleton: a neural machine translator to bootstrap mobile GUI implementation.
Proceedings of the 40th International Conference on Software Engineering, 2018
Proceedings of the 40th International Conference on Software Engineering, 2018
Apk2vec: Semi-Supervised Multi-view Representation Learning for Profiling Android Applications.
Proceedings of the IEEE International Conference on Data Mining, 2018
SGXlinger: A New Side-Channel Attack Vector Based on Interrupt Latency Against Enclave Execution.
Proceedings of the 36th IEEE International Conference on Computer Design, 2018
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2018, 2018
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2018, 2018
Proceedings of the Formal Methods - 22nd International Symposium, 2018
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Syst. Man Cybern. Syst., 2017
IEEE Trans. Reliab., 2017
Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique.
IEEE Trans. Inf. Forensics Secur., 2017
Context-Aware, Adaptive, and Scalable Android Malware Detection Through Online Learning.
IEEE Trans. Emerg. Top. Comput. Intell., 2017
By the Community & For the Community: A Deep Learning Approach to Assist Collaborative Editing in Q&A Sites.
Proc. ACM Hum. Comput. Interact., 2017
AndroVault: Constructing Knowledge Graph from Millions of Android Apps for Automated Analysis.
CoRR, 2017
Context-aware, Adaptive and Scalable Android Malware Detection through Online Learning (extended version).
CoRR, 2017
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017
FiB: squeezing loop invariants by interpolation between Forward/Backward predicate transformers.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017
Proceedings of the Interactive Theorem Proving - 8th International Conference, 2017
SPAIN: security patch analysis for binaries towards understanding the pain and pills.
Proceedings of the 39th International Conference on Software Engineering, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
A distributed approach to automated manufacturing systems with complex structures using Petri nets.
Proceedings of the 2017 IEEE International Conference on Robotics and Automation, 2017
Static and dynamic partitions of inequalities and their application in supervisor simplification.
Proceedings of the 2017 IEEE International Conference on Robotics and Automation, 2017
Proceedings of the Formal Methods and Software Engineering, 2017
No-Jump-into-Basic-Block: Enforce Basic Block CFI on the Fly for Real-world Binaries.
Proceedings of the 54th Annual Design Automation Conference, 2017
A robust control approach to automated manufacturing systems allowing failures and reworks with Petri nets.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017
Decentralized supervisory control of Generalized Mutual Exclusion Constraints in Petri Nets.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017
Robust control of automated manufacturing systems with complex structures using Petri Nets.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017
2016
A Fine-Grained Control Flow Integrity Approach Against Runtime Memory Attacks for Embedded Systems.
IEEE Trans. Very Large Scale Integr. Syst., 2016
Formal Specification and Analysis of Partitioning Operating Systems by Integrating Ontology and Refinement.
IEEE Trans. Ind. Informatics, 2016
Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware.
IEEE Trans. Inf. Forensics Secur., 2016
Improved EGT-Based Robustness Analysis of Negotiation Strategies in Multiagent Systems via Model Checking.
IEEE Trans. Hum. Mach. Syst., 2016
Polynomially Complex Synthesis of Distributed Supervisors for Large-Scale AMSs Using Petri Nets.
IEEE Trans. Control. Syst. Technol., 2016
Supervisor Simplification in FMSs: Comparative Studies and New Results Using Petri Nets.
IEEE Trans. Control. Syst. Technol., 2016
Int. J. Softw. Tools Technol. Transf., 2016
Softw. Syst. Model., 2016
J. Artif. Intell. Res., 2016
Neurocomputing, 2016
subgraph2vec: Learning Distributed Representations of Rooted Sub-graphs from Large Graphs.
CoRR, 2016
IBED: Combining IBEA and DE for optimal feature selection in software product line engineering.
Appl. Soft Comput., 2016
A formal model for the SPARCv8 ISA and a proof of non-interference for the LEON3 processor.
Arch. Formal Proofs, 2016
Reasoning About Information Flow Security of Separation Kernels with Channel-Based Communication.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2016
Proceedings of the 10th International Conference on Software, 2016
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016
Semantic modelling of Android malware for effective malware comprehension, detection, and classification.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016
Optimizing selection of competing services with probabilistic hierarchical refinement.
Proceedings of the 38th International Conference on Software Engineering, 2016
Proceedings of the 38th International Conference on Software Engineering, 2016
Robust control of automated manufacturing systems with assembly operations using petri nets.
Proceedings of the 2016 IEEE International Conference on Robotics and Automation, 2016
Proceedings of the Formal Methods and Software Engineering, 2016
Automated Requirements Validation for ATP Software via Specification Review and Testing.
Proceedings of the Formal Methods and Software Engineering, 2016
Proceedings of the Formal Methods and Software Engineering, 2016
Concurrent On-the-Fly SCC Detection for Automata-Based Model Checking with Fairness Assumption.
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016
An Executable Formalisation of the SPARCv8 Instruction Set Architecture: A Case Study for the LEON3 Processor.
Proceedings of the FM 2016: Formal Methods, 2016
Critical stages and their application in large scale automated manufacturing systems via Petri nets.
Proceedings of the 15th European Control Conference, 2016
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016
GPU-Accelerated Value Iteration for the Computation of Reachability Probabilities in MDPs.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Critical stages and their identification in large scale automated manufacturing systems via Petri nets.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2016
Proceedings of the Autonomous Agents and Multiagent Systems - AAMAS 2016 Workshops, - Visionary Papers, 2016
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
2015
IEEE Trans. Software Eng., 2015
Supervisor Synthesis and Performance Improvement for Automated Manufacturing Systems by Using Petri Nets.
IEEE Trans. Ind. Informatics, 2015
Maximally Permissive Distributed Control of Large Scale Automated Manufacturing Systems Modeled With Petri Nets.
IEEE Trans. Control. Syst. Technol., 2015
Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2015
Proceedings of the Thirty-First Conference on Uncertainty in Artificial Intelligence, 2015
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015
Formalizing and verifying stochastic system architectures using Monterey Phoenix (SoSyM abstract).
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015
Optimizing selection of competing features via feedback-directed evolutionary algorithms.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015
Reliability assessment for distributed systems via communication abstraction and refinement.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015
Event-based formalization of safety-critical operating system standards: An experience report on ARINC 653 using Event-B.
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015
Quantifying Robustness of Trust Systems against Collusive Unfair Rating Attacks Using Information Theory.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015
Proceedings of the 27th IEEE International Conference on Tools with Artificial Intelligence, 2015
Supervisor design and simplification for Automated Manufacturing Systems using colored Petri nets.
Proceedings of the IEEE International Conference on Robotics and Automation, 2015
Supervisors and their simplification in automated manufacturing systems via Petri nets.
Proceedings of the IEEE International Conference on Robotics and Automation, 2015
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015
Verifying FreeRTOS' Cyclic Doubly Linked List Implementation: From Abstract Specification to Machine Code.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015
Proceedings of the FM 2015: Formal Methods, 2015
Proceedings of the FM 2015: Formal Methods, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
A Petri net-based distributed control of automated manufacturing systems with assembly operations.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2015
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2015
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
2014
IEEE Trans. Software Eng., 2014
Trans. Comput. Collect. Intell., 2014
IEEE Trans Autom. Sci. Eng., 2014
Real Time Syst., 2014
Int. J. Hum. Comput. Stud., 2014
IEICE Trans. Inf. Syst., 2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Are Timed Automata Bad for a Specification Language? Language Inclusion Checking for Timed Automata.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2014
Proceedings of the Structured Object-Oriented Formal Language and Method, 2014
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014
Proceedings of the Theoretical Aspects of Computing - ICTAC 2014, 2014
Clonepedia: Summarizing Code Clones by Common Syntactic Context for Software Maintenance.
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014
Proceedings of the 36th International Conference on Software Engineering, 2014
VeriWS: a tool for verification of combined functional and non-functional requirements of web service composition.
Proceedings of the 36th International Conference on Software Engineering, 2014
Distributed supervisor synthesis for automated manufacturing systems using Petri nets.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014
Proceedings of the Formal Methods and Software Engineering, 2014
Proceedings of the Formal Methods and Software Engineering, 2014
Proceedings of the Formal Methods and Software Engineering, 2014
Proceedings of the Formal Methods and Software Engineering, 2014
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014
Proceedings of the FM 2014: Formal Methods, 2014
Proceedings of the FM 2014: Formal Methods, 2014
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms.
Proceedings of the FM 2014: Formal Methods, 2014
Diamonds Are a Girl's Best Friend: Partial Order Reduction for Timed Automata with Abstractions.
Proceedings of the Computer Aided Verification - 26th International Conference, 2014
Simplifying supervisory controllers of automated manufacturing systems via Petri net modeling and multiset analysis.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014
A comparative approach to supervisor simplification in automated manufacturing systems using Petri nets.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014
Proceedings of the Specification, Algebra, and Software, 2014
Proceedings of the Automated Technology for Verification and Analysis, 2014
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014
2013
IEEE Trans. Software Eng., 2013
ACM Trans. Softw. Eng. Methodol., 2013
Proceedings of the Verification, 2013
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013
Towards Formal Modeling and Verification of Cloud Architectures: A Case Study on Hadoop.
Proceedings of the IEEE Ninth World Congress on Services, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013
Automatically partition software into least privilege components using dynamic data dependency analysis.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013
Combining model checking and testing with an application to reliability prediction and distribution.
Proceedings of the International Symposium on Software Testing and Analysis, 2013
Proceedings of the Integrated Formal Methods, 10th International Conference, 2013
Proceedings of the Integrated Formal Methods, 10th International Conference, 2013
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013
Proceedings of the 35th International Conference on Software Engineering, 2013
Proceedings of the 35th International Conference on Software Engineering, 2013
Improving Model Checking Stateful Timed CSP with non-Zenoness through Clock-Symmetry Reduction.
Proceedings of the Formal Methods and Software Engineering, 2013
Proceedings of the Formal Methods and Software Engineering, 2013
Proceedings of the Formal Methods and Software Engineering, 2013
Verification of Functional and Non-functional Requirements of Web Service Composition.
Proceedings of the Formal Methods and Software Engineering, 2013
Proceedings of the Formal Techniques for Safety-Critical Systems, 2013
Proceedings of the Computer Aided Verification - 25th International Conference, 2013
Supervisor synthesis and performance improvement for automated manufacturing systems by using Petri nets.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013
Proceedings of the Automated Technology for Verification and Analysis, 2013
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013
2012
Proceedings of the Handbook of Finite State Based Models and Applications., 2012
Int. J. Softw. Tools Technol. Transf., 2012
Simul., 2012
Frontiers Comput. Sci. China, 2012
Proceedings of the 35th Annual IEEE Software Engineering Workshop, 2012
Probabilistic Model Checking Multi-agent Behaviors in Dispersion Games Using Counter Abstraction.
Proceedings of the PRIMA 2012: Principles and Practice of Multi-Agent Systems, 2012
Proceedings of the 34th International Conference on Software Engineering, 2012
Proceedings of the Formal Methods and Software Engineering, 2012
Proceedings of the Formal Methods and Software Engineering, 2012
Proceedings of the Formal Methods and Software Engineering, 2012
Proceedings of the Formal Methods and Software Engineering, 2012
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012
Proceedings of the FM 2012: Formal Methods, 2012
Proceedings of the FM 2012: Formal Methods, 2012
Proceedings of the Computer Aided Verification - 24th International Conference, 2012
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012
Proceedings of the Application and Theory of Petri Nets - 33rd International Conference, 2012
2011
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011
Proceedings of the IEEE 22nd International Symposium on Software Reliability Engineering, 2011
Proceedings of the Formal Methods and Software Engineering, 2011
Proceedings of the Formal Methods and Software Engineering, 2011
Proceedings of the Formal Methods and Software Engineering, 2011
Proceedings of the Formal Methods and Software Engineering, 2011
Proceedings of the FM 2011: Formal Methods, 2011
Proceedings of the Automated Technology for Verification and Analysis, 2011
2010
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010
Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2010
Proceedings of the Formal Methods and Software Engineering, 2010
Proceedings of the Formal Methods and Software Engineering, 2010
Proceedings of the Automated Technology for Verification and Analysis, 2010
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010
2009
Proceedings of the TASE 2009, 2009
Formal Verification of Scalable NonZero Indicators.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009
Proceedings of the Formal Methods and Software Engineering, 2009
Proceedings of the Formal Methods and Software Engineering, 2009
Proceedings of the FM 2009: Formal Methods, 2009
Proceedings of the FM 2009: Formal Methods, 2009
Proceedings of the Computer Aided Verification, 21st International Conference, 2009
2008
Frontiers Comput. Sci. China, 2008
Proceedings of the Second IEEE/IFIP International Symposium on Theoretical Aspects of Software Engineering, 2008
Proceedings of the Leveraging Applications of Formal Methods, 2008
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008
Proceedings of the Formal Methods and Software Engineering, 2008
2006
Proceedings of the Formal Methods and Software Engineering, 2006
2005
Proceedings of the International Workshop on Web Languages and Formal Methods, 2005