Fang Yu

According to our database1, Fang Yu authored at least 126 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Complex Negotiation Model for Multi-Echelon Supply Chain Networks.
IEEE Trans. Engineering Management, 2019

DFT Calculations of the Structural, Mechanical, and Electronic Properties of TiV Alloy Under High Pressure.
Symmetry, 2019

Analyzing Auditory Evoked Cortical Response to Noise-suppressed Speech in Cochlear Implant Users Using Mismatch Negativity.
Proceedings of the 2019 9th International IEEE/EMBS Conference on Neural Engineering (NER), 2019

HiSeqGAN: Hierarchical Sequence Synthesis and Prediction.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Deep Learning, 2019

2018
A First-Order Logic Framework of Major Choosing Decision Making With an Uncertain Reasoning Function.
IEEE Trans. Systems, Man, and Cybernetics: Systems, 2018

The total ionizing dose response of leading-edge FDSOI MOSFETs.
Microelectronics Reliability, 2018

Internet of things for smart ports: Technologies and challenges.
IEEE Instrum. Meas. Mag., 2018

Quantitative quality estimation of cloud-based streaming services.
Computer Communications, 2018

Improving Reliability of Deduplication-Based Storage Systems with Per-File Parity.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

Parameterized model counting for string and numeric constraints.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

A symbolic model checking approach to the analysis of string and length constraints.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

An ERP Study to Evaluate the Quality of Speech Processed by Wiener Filtering.
Proceedings of the 11th International Symposium on Chinese Spoken Language Processing, 2018

Static detection of API call vulnerabilities in iOS executables.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Tracking Supply Chain Process Variability with Unsupervised Cluster Traversal.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Malware Family Characterization with Recurrent Neural Network and GHSOM Using System Calls.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

Biparti Majority Learning with Tensors.
Proceedings of the 2018 IEEE International Congress on Big Data, 2018

2017
Advancing Alzheimer's research: A review of big data promises.
I. J. Medical Informatics, 2017

A game theoretical approach for distributed resource allocation with uncertainty.
Int. J. Intelligent Computing and Cybernetics, 2017

Virtual screening of B-Raf kinase inhibitors: A combination of pharmacophore modelling, molecular docking, 3D-QSAR model and binding free energy calculation studies.
Computational Biology and Chemistry, 2017

A dynamic portrait analysis of grid equipment.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Content-Sensitive Data Compression for IoT Streaming Services.
Proceedings of the IEEE International Congress on Internet of Things, 2017

Adaptive Social Network Services: The Practice of 9EMBA.COM.
Proceedings of the IEEE International Conference on Edge Computing, 2017

A Parallel Majority Learning Algorithm for Anomaly Detection.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

An Effective Distributed GHSOM Algorithm for Unsupervised Clustering on Big Data.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

String Analysis for Software Verification and Security.
Springer, ISBN: 978-3-319-68668-4, 2017

2016
Quantum advice enhances social optimality in three-party conflicting interest games.
Quantum Information & Computation, 2016

Optimal sanitization synthesis for web application vulnerability repair.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

AppReco: Behavior-Aware Recommendation for iOS Mobile Applications.
Proceedings of the IEEE International Conference on Web Services, 2016

String Analysis via Automata Manipulation with Logic Circuit Representation.
Proceedings of the Computer Aided Verification - 28th International Conference, 2016

Simulating Time-Varying Demand Services with Queuing Models.
Proceedings of the IEEE International Conference on Services Computing, 2016

Gnafuy: A Framework for Ubiquitous Mobile Computation.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Structural Stability of Supersonic Contact Discontinuities in Three-Dimensional Compressible Steady Flows.
SIAM J. Math. Analysis, 2015

Enhancing user privacy in SARG04-based private database query protocols.
Quantum Information Processing, 2015

A method for estimating and removing streaking artifacts in quantitative susceptibility mapping.
NeuroImage, 2015

Coupling effects of mechanical vibrations and thermal cycling on reliability of CCGA solder joints.
Microelectronics Reliability, 2015

Confident difference criterion: a new Bayesian differentially expressed gene selection algorithm with applications.
BMC Bioinformatics, 2015

Network-traffic anomaly detection with incremental majority learning.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

Space Connection: A New 3D Tele-immersion Platform for Web-Based Gesture-Collaborative Games and Services.
Proceedings of the 4th IEEE/ACM International Workshop on Games and Software Engineering, 2015

VISO: Characterizing Malicious Behaviors of Virtual Machines with Unsupervised Clustering.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Comparison of decoupling resistors and capacitors for increasing the single event upset resistance of SRAM cells.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

2014
Coding-based quantum private database query using entanglement.
Quantum Information & Computation, 2014

Automated Classification of Radiology Reports to Facilitate Retrospective Study in Radiology.
J. Digital Imaging, 2014

Automata-based symbolic string analysis for vulnerability detection.
Formal Methods in System Design, 2014

Topological pattern discovery and feature extraction for fraudulent financial reporting.
Expert Syst. Appl., 2014

Study on Fuzzy Comprehensive Evaluation Model of Education E-government Performance in Colleges and Universities.
Proceedings of the Rough Sets and Knowledge Technology - 9th International Conference, 2014

Resistant learning on the envelope bulk for identifying anomalous patterns.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

Patcher: An Online Service for Detecting, Viewing and Patching Web Application Vulnerabilities.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Securing KVM-Based Cloud Systems via Virtualization Introspection.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Intention and Origination: An Inside Look at Large-Scale Bot Queries.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Clustering iOS executable using self-organizing maps.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

Handwritten character recognition with sequential convolutional neural network.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2013

Early security classification of skype users via machine learning.
Proceedings of the AISec'13, 2013

SocialWatch: detection of online service abuse via large-scale social graphs.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

A control policy for γ-nets without reachability analysis and siphon enumeration.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

Quantitative Analysis of Cloud-Based Streaming Services.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
Study on the Design of Automatic Cotton Bale Inspecting Management System.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

Host Fingerprinting and Tracking on the Web: Privacy and Security Implications.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Symbolic consistency checking of OpenMp parallel programs.
Proceedings of the SIGPLAN/SIGBED Conference on Languages, 2012

Enumeration of reachable and other states of simple version of Systems of Simple Sequential Processes with Resources (S3PR).
Proceedings of the 21st IEEE International Symposium on Industrial Electronics, 2012

Game Theory Based Multi-attribute Negotiation between MA and MSAs.
Proceedings of the Advances in Production Management Systems. Competitive Manufacturing for Innovative Products and Services, 2012

Innocent by association: early recognition of legitimate users.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Knowing your enemy: understanding and detecting malicious web advertising.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Populated IP addresses: classification and applications.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Global exponential synchronization of fuzzy cellular neural networks with delays and reaction-diffusion terms.
Neurocomputing, 2011

Session reports for SIGCOMM 2010.
Computer Communication Review, 2011

Heat-seeking honeypots: design and experience.
Proceedings of the 20th International Conference on World Wide Web, 2011

deSEO: Combating Search-Result Poisoning.
Proceedings of the 20th USENIX Security Symposium, 2011

String Abstractions for String Verification.
Proceedings of the Model Checking Software, 2011

Nemor: A congestion-aware protocol for anonymous peer-based content distribution.
Proceedings of the 2011 IEEE International Conference on Peer-to-Peer Computing, 2011

A Multi-agent Based Negotiation for Supply Chain Network Using Game Theory.
Proceedings of the Advances in Production Management Systems. Value Networks: Innovation, Technologies, and Management, 2011

Patching vulnerabilities with sanitization synthesis.
Proceedings of the 33rd International Conference on Software Engineering, 2011

A Temporal Logic for the Interaction of Strategies.
Proceedings of the CONCUR 2011 - Concurrency Theory - 22nd International Conference, 2011

2010
Fast Packet Pattern-Matching Algorithms.
Proceedings of the Algorithms for Next Generation Networks, 2010

SBotMiner: large scale search bot detection.
Proceedings of the Third International Conference on Web Search and Web Data Mining, 2010

Relational String Verification Using Multi-track Automata.
Proceedings of the Implementation and Application of Automata, 2010

Searching the Searchers with SearchAudit.
Proceedings of the 19th USENIX Security Symposium, 2010

Stranger: An Automata-Based String Analysis Tool for PHP.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2010

Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

On Network-level Clusters for Spam Detection.
Proceedings of the Network and Distributed System Security Symposium, 2010

Modular verification of synchronization with reentrant locks.
Proceedings of the 8th ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE 2010), 2010

How to tell an airport from a home: techniques and applications.
Proceedings of the 9th ACM Workshop on Hot Topics in Networks. HotNets 2010, Monterey, CA, USA - October 20, 2010

A knowledge-based decision making tool in competitive environments.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

2009
Symbolic String Verification: Combining String Analysis and Size Analysis.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2009

De-anonymizing the internet using unreliable IDs.
Proceedings of the ACM SIGCOMM 2009 Conference on Applications, 2009

BotGraph: Large Scale Spamming Botnet Detection.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

The effectiveness of intelligent scheduling for multicast video-on-demand.
Proceedings of the 17th International Conference on Multimedia 2009, 2009

Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses.
Proceedings of the ASE 2009, 2009

An Algorithm Evaluating System Stability to Process.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

2008
Symbolic String Verification: An Automata-Based Approach.
Proceedings of the Model Checking Software, 2008

Modular verification of web services using efficient symbolic encoding and summarization.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

Spamming botnets: signatures and characteristics.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

Designing an Efficient Hardware Implication Accelerator for SAT Solving.
Proceedings of the Theory and Applications of Satisfiability Testing, 2008

Target Localization for Autonomous Soccer Robot Based on Vision Perception.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

A practical reconfigurable hardware accelerator for Boolean satisfiability solvers.
Proceedings of the 45th Design Automation Conference, 2008

Knowledge-Based Major Choosing Decision Making for Remote Students.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
A PLSA-Based Approach for Building User Profile and Implementing Personalized Recommendation.
Proceedings of the Advances in Data and Web Management, 2007

Automated size analysis for OCL.
Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007

How dynamic are IP addresses?
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007

2006
TCTL Inevitability Analysis of Dense-Time Systems: From Theory to Engineering.
IEEE Trans. Software Eng., 2006

Efficient Multimatch Packet Classification for Network Security Applications.
IEEE Journal on Selected Areas in Communications, 2006

Sat-based Model Checking for Region Automata.
Int. J. Found. Comput. Sci., 2006

On Spiking Neural P Systems and Partially Blind Counter Machines.
Proceedings of the Unconventional Computation, 5th International Conference, 2006

Algorithms to accelerate multiple regular expressions matching for deep packet inspection.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

Study of Parametric Relation in Ant Colony Optimization Approach to Traveling Salesman Problem.
Proceedings of the Computational Intelligence and Bioinformatics, 2006

Fast and memory-efficient regular expression matching for deep packet inspection.
Proceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2006

2005
Efficient Multimatch Packet Classification and Lookup with TCAM.
IEEE Micro, 2005

Symbolic simulation of industrial real-time and embedded systems -experiments with the bluetooth baseband communication protocol.
J. Embedded Computing, 2005

Efficient Exact Spare Allocation via Boolean Satisfiability.
Proceedings of the 20th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2005), 2005

SSA: a power and memory efficient scheme to multi-match packet classification.
Proceedings of the 2005 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2005

2004
BDD-Based Safety-Analysis of Concurrent Software with Pointer Data Structures Using Graph Automorphism Symmetry Reduction.
IEEE Trans. Software Eng., 2004

Securing web application code by static analysis and runtime protection.
Proceedings of the 13th international conference on World Wide Web, 2004

Efficient multi-match packet classification with TCAM.
Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects, 2004

Bounded Model Checking for Region Automata.
Proceedings of the Formal Techniques, 2004

Verifying Web Applications Using Bounded Model Checking.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Toward Unbounded Model Checking for Region Automata.
Proceedings of the Automated Technology for Verification and Analysis: Second International Conference, 2004

2003
QoS-adaptive proxy caching for multimedia streaming over the Internet.
IEEE Trans. Circuits Syst. Video Techn., 2003

Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table.
MONET, 2003

TCTL Inevitability Analysis of Dense-Time Systems.
Proceedings of the Implementation and Application of Automata, 2003

OVL Assertion-Checking of Embedded Software with Dense-Time Semantics.
Proceedings of the Real-Time and Embedded Computing Systems and Applications, 2003

Symbolic Simulation of Real-Time Concurrent Systems.
Proceedings of the Real-Time and Embedded Computing Systems and Applications, 2003

Numerical Coverage Estimation for the Symbolic Simulation of Real-Time Systems.
Proceedings of the Formal Techniques for Networked and Distributed Systems - FORTE 2003, 23rd IFIP WG 6.1 International Conference, Berlin, Germany, September 29, 2003

2002
GHT: a geographic hash table for data-centric storage.
Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, 2002

2001
Network-Adaptive Cache Management Schemes for Mixed Media.
Proceedings of the Advances in Multimedia Information Processing, 2001

2000
Hierachically Classifying Chinese Web Documents without Dictionary Support and Segmentation Procedure.
Proceedings of the Web-Age Information Management, First International Conference, 2000

An Effective Approach to Mining Exeption Class Association Rules.
Proceedings of the Web-Age Information Management, First International Conference, 2000


  Loading...