Chenyi Zhang

According to our database1, Chenyi Zhang authored at least 42 papers between 2006 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Reference Abstract Domains and Applications to String Analysis.
Fundam. Inform., 2018

2017
Combining String Abstract Domains for JavaScript Analysis: An Evaluation.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2017

Improving the Scalability of Automatic Linearizability Checking in SPIN.
Proceedings of the Formal Methods and Software Engineering, 2017

2016
Trip Recommendation Meets Real-World Constraints: POI Availability, Diversity, and Traveling Time Uncertainty.
ACM Trans. Inf. Syst., 2016

POI recommendation through cross-region collaborative filtering.
Knowl. Inf. Syst., 2016

2015
An I/O Efficient Approach for Detecting All Accepting Cycles.
IEEE Trans. Software Eng., 2015

Distributed cross-media multiple binary subspace learning.
IJMIR, 2015

Personalized Trip Recommendation with POI Availability and Uncertain Traveling Time.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

Are Features Equally Representative? A Feature-Centric Recommendation.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Latent Tunnel Based Information Propagation in Microblog Networks.
Proceedings of the Social Network Analysis - Community Detection and Evolution, 2014

Latent Factor Transition for Dynamic Collaborative Filtering.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

Cross-language bug localization.
Proceedings of the 22nd International Conference on Program Comprehension, 2014

Distributed Binary Subspace Learning on large-scale cross media data.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

Content + Attributes: A Latent Factor Model for Recommending Scientific Papers in Heterogeneous Academic Networks.
Proceedings of the Advances in Information Retrieval, 2014

2013
Information flow in systems with schedulers, Part II: Refinement.
Theor. Comput. Sci., 2013

Information flow in systems with schedulers, Part I: Definitions.
Theor. Comput. Sci., 2013

Design and formal verification of a CEM protocol with transparent TTP.
Frontiers Comput. Sci., 2013

Path-Sensitive Data Flow Analysis Simplified.
Proceedings of the Formal Methods and Software Engineering, 2013

Information propagation in microblog networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Game-based verification of contract signing protocols with minimal messages.
ISSE, 2012

Large scale microblog mining using distributed MB-LDA.
Proceedings of the 21st World Wide Web Conference, 2012

An Algorithm for Probabilistic Alternating Simulation.
Proceedings of the SOFSEM 2012: Theory and Practice of Computer Science, 2012

Translating flowcharts to non-deterministic languages.
Proceedings of the ACM SIGPLAN 2012 Workshop on Partial Evaluation and Program Manipulation, 2012

A Type and Effect System for Determinism in Multithreaded Programs.
Proceedings of the Programming Languages and Systems, 2012

Intransitive noninterference in nondeterministic systems.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Probabilistic Alternating-Time Temporal Logic of Incomplete Information and Synchronous Perfect Recall.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
Verification of A Key Chain Based TTP Transparent CEM Protocol.
Electr. Notes Theor. Comput. Sci., 2011

Conditional Information Flow Policies and Unwinding Relations.
Proceedings of the Trustworthy Global Computing - 6th International Symposium, 2011

2010
A Trust-Augmented Voting Scheme for Collaborative Privacy Management.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

On Probabilistic Alternating Simulations.
Proceedings of the Theoretical Computer Science, 2010

The Complexity of Synchronous Notions of Information Flow Security.
Proceedings of the Foundations of Software Science and Computational Structures, 2010

Extending a Key-Chain Based Certified Email Protocol with Transparent TTP.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Information flow security - models, verification and schedulers.
PhD thesis, 2009

How to Work with Honest but Curious Judges? (Preliminary Report)
Proceedings of the Proceedings 7th International Workshop on Security Issues in Concurrency, 2009

Game-Based Verification of Multi-Party Contract Signing Protocols.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

2008
User-Input Dependence Analysis via Graph Reachability.
Proceedings of the Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 2008

Information Flow in Systems with Schedulers.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

2007
Algorithmic Verification of Noninterference Properties.
Electr. Notes Theor. Comput. Sci., 2007

Remarks on Testing Probabilistic Processes.
Electr. Notes Theor. Comput. Sci., 2007

Characterising Testing Preorders for Finite Probabilistic Processes.
Proceedings of the 22nd IEEE Symposium on Logic in Computer Science (LICS 2007), 2007

Scalar Outcomes Suffice for Finitary Probabilistic Testing.
Proceedings of the Programming Languages and Systems, 2007

2006
A Comparison of Semantic Models for Noninterference.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006


  Loading...