Ming Gu

According to our database1, Ming Gu authored at least 167 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
An Enhanced Reconfiguration for Deterministic Transmission in Time-Triggered Networks.
IEEE/ACM Trans. Netw., 2019

Synthesizing Fault-Tolerant Schedule for Time-Triggered Network Without Hot Backup.
IEEE Trans. Industrial Electronics, 2019

Dependable Model-driven Development of CPS: From Stateflow Simulation to Verified Implementation.
TCPS, 2019

Tolerating C Integer Error via Precision Elevation.
IEEE Trans. Computers, 2019

Go-clone: graph-embedding based clone detector for Golang.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

2018
Constructing Cost-Aware Functional Test-Suites Using Nested Differential Evolution Algorithm.
IEEE Trans. Evolutionary Computation, 2018

Temporal Coverage Analysis for Dynamic Verification.
IEEE Trans. on Circuits and Systems, 2018

Parallelizing SMT solving: Lazy decomposition and conciliation.
Artif. Intell., 2018

A Cyber-Physical System Framework for Early Detection of Paroxysmal Diseases.
IEEE Access, 2018

Which Defect Should Be Fixed First? Semantic Prioritization of Static Analysis Report.
Proceedings of the Software Analysis, Testing, and Evolution, 2018

Work-in-Progress: A Flattened Priority Framework for Mixed-Criticality Real-Time Systems.
Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium, 2018

Managing concurrent testing of data race with ComRaDe.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018

Fast Real-Time Scheduling for Ethernet-Based Train Control Networks.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Weak-assert: a weakness-oriented assertion recommendation toolkit for program analysis.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Model-based adaptation to extreme physical environments: a case study on mixed-criticality industrial ethernet.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Scalable Verification Framework for C Program.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

Energy-Efficient Automatic Train Driving by Learning Driving Patterns.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Data-Centered Runtime Verification of Wireless Medical Cyber-Physical System.
IEEE Trans. Industrial Informatics, 2017

Formal Modeling and Verification of a Rate-Monotonic Scheduling Implementation with Real-Time Maude.
IEEE Trans. Industrial Electronics, 2017

Verification of Implementations of Cryptographic Hash Functions.
IEEE Access, 2017

Path compression kd-trees with multi-layer parallel construction a case study on ray tracing.
Proceedings of the 21st ACM SIGGRAPH Symposium on Interactive 3D Graphics and Games, 2017

A language model for statements of software code.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

A static analysis tool with optimizations for reachability determination.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

IntPTI: automatic integer error repair with proper-type inference.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Handling scheduling uncertainties through traffic shaping in Time-Triggered train networks.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Vertex-Weighted Hypergraph Learning for Multi-View Object Classification.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Stochastic optimization of program obfuscation.
Proceedings of the 39th International Conference on Software Engineering, 2017

Assertion Recommendation for Formal Program Verification.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

A Constraint-Pattern Based Method for Reachability Determination.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Human experience knowledge induction based intelligent train driving.
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017

2016
Task and Participant Scheduling of Trading Platforms in Vehicular Participatory Sensing Networks.
Sensors, 2016

From Stateflow Simulation to Verified Implementation: A Verification Approach and A Real-Time Train Controller Design.
Proceedings of the 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), 2016

Tsmart-BIPEX: An Integrated Graphical Design Toolkit for Software Systems.
Proceedings of the MoDELS 2016 Demo and Poster Sessions co-located with ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2016), 2016

C Code Verification based on the Extended Labeled Transition System Model.
Proceedings of the MoDELS 2016 Demo and Poster Sessions co-located with ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2016), 2016

Model driven design of heterogeneous synchronous embedded systems.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Verifying simulink stateflow model: timed automata approach.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Automatic Integrity Checking of IFC Models relative to building Regulations.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2016

Taming Interrupts for Verifying Industrial Multifunction Vehicle Bus Controllers.
Proceedings of the FM 2016: Formal Methods, 2016

Safety-Assured Formal Model-Driven Design of the Multifunction Vehicle Bus Controller.
Proceedings of the FM 2016: Formal Methods, 2016

Improving Failure Detection by Automatically Generating Test Cases Near the Boundaries.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Automatic Fix for C Integer Errors by Precision Improvement.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

An integrated Medical CPS for early detection of paroxysmal sympathetic hyperactivity.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

2015
First, Debug the Test Oracle.
IEEE Trans. Software Eng., 2015

Design of Mixed Synchronous/Asynchronous Systems with Multiple Clocks.
IEEE Trans. Parallel Distrib. Syst., 2015

Design and Optimization of Multiclocked Embedded Systems Using Formal Techniques.
IEEE Trans. Industrial Electronics, 2015

Scalable Verification of a Generic End-Around-Carry Adder for Floating-Point Units by Coq.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2015

Estimating the Volume of Solution Space for Satisfiability Modulo Linear Real Arithmetic.
Theory Comput. Syst., 2015

Generalized interface automata with multicast synchronization.
Frontiers Comput. Sci., 2015

VeRV: A temporal and data-concerned verification framework for the vehicle bus systems.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Reliability Analysis for a Data Flow in Event-Driven Wireless Sensor Networks.
Wireless Personal Communications, 2014

Symbolic Analysis of Programmable Logic Controllers.
IEEE Trans. Computers, 2014

Array Theory of Bounded Elements and its Applications.
J. Autom. Reasoning, 2014

Modeling a Heterogeneous Embedded System in Coloured Petri Nets.
J. Applied Mathematics, 2014

Functional Verification of High Performance Adders in COQ.
J. Applied Mathematics, 2014

Reliability analysis for chain topology wireless sensor networks with multiple-sending transmission scheme.
EURASIP J. Wireless Comm. and Networking, 2014

A New Barrier Certificate for Safety Verification of Hybrid Systems.
Comput. J., 2014

iDola: Bridge Modeling to Verification and Implementation of Interrupt-Driven Systems.
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

Application-Specific Architecture Selection for Embedded Systems via Schedulability Analysis.
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

Tsmart-GalsBlock: a toolkit for modeling, validation, and synthesis of multi-clocked embedded systems.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Clause Replication and Reuse in Incremental Temporal Induction.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

Optimal robust control for generalized fuzzy dynamical systems: A novel use on fuzzy uncertainties.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Control and Automation, 2014

2013
Bayesian-Network-Based Reliability Analysis of PLC Systems.
IEEE Trans. Industrial Electronics, 2013

A Unified Framework for DPLL(T) + Certificates.
J. Applied Mathematics, 2013

An Effective Heuristic-Based Approach for Partitioning.
J. Applied Mathematics, 2013

OntCheck: An Ontology-Driven Static Correctness Checking Tool for Component-Based Models.
J. Applied Mathematics, 2013

Probabilistic analysis of system outage in distributed antenna systems with composite channels.
EURASIP J. Wireless Comm. and Networking, 2013

Optimizing the SAT Decision Ordering of Bounded Model Checking by Structural Information.
Proceedings of the Seventh International Symposium on Theoretical Aspects of Software Engineering, 2013

System reliability calculation based on the run-time analysis of ladder program.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Design and optimization of multi-clocked embedded systems using formal technique.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Reusing Search Tree for Incremental SAT Solving of Temporal Induction.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

Modeling and Verification of Component-Based Systems with Data Passing Using BIP.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

Seamless Privacy: Privacy-Preserving Subgraph Counting in Interactive Social Network Analysis.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

Component-Based Modeling and Code Synthesis for Cyclic Programs.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Verification and Implementation of the Protocol Standard in Train Control System.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Exponential-Condition-Based Barrier Certificate Generation for Safety Verification of Hybrid Systems.
Proceedings of the Computer Aided Verification - 25th International Conference, 2013

Sequential dependency and reliability analysis of embedded systems.
Proceedings of the 18th Asia and South Pacific Design Automation Conference, 2013

2012
USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks.
IEEE Trans. Wireless Communications, 2012

Maxterm Covering for Satisfiability.
IEEE Trans. Computers, 2012

New strategies for reliability analysis of Programmable Logic Controllers.
Mathematical and Computer Modelling, 2012

Semantic characterization of programmable logic controller programs.
Mathematical and Computer Modelling, 2012

Obtaining more Karatsuba-like formulae over the binary field.
IET Information Security, 2012

Modeling and Validation of PLC-Controlled Systems: A Case Study.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

Reliability Analysis of PLC Systems by Bayesian Network.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Uncertain Model and Algorithm for Hardware/Software Partitioning.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2012

2011
A novel fault diagnosis mechanism for wireless sensor networks.
Mathematical and Computer Modelling, 2011

Energy-Efficient Key Distribution Using Electrocardiograph Biometric Set for Secure Communications in Wireless Body Healthcare Networks.
J. Medical Systems, 2011

Formalisation and verification of programmable logic controllers timers in Coq.
IET Software, 2011

Formal modeling and synthesis of programmable logic controllers.
Computers in Industry, 2011

Competent predicate abstraction in model checking.
SCIENCE CHINA Information Sciences, 2011

MENs: Multi-user Emergency Navigation System Using.
Ad Hoc & Sensor Wireless Networks, 2011

An Efficient Resolution Based Algorithm for SAT.
Proceedings of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2011

Proving Computational Geometry Algorithms in TLA+2.
Proceedings of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2011

Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing.
Proceedings of the Information Security Practice and Experience, 2011

Domain-Driven Probabilistic Analysis of Programmable Logic Controllers.
Proceedings of the Formal Methods and Software Engineering, 2011

De-Anonymizing Dynamic Social Networks.
Proceedings of the Global Communications Conference, 2011

Directional diagnosis for wireless sensor networks.
Proceedings of the Distributed Computing in Sensor Systems, 2011

2010
Integrating Evolutionary Computation with Abstraction Refinement for Model Checking.
IEEE Trans. Computers, 2010

BodySec: synchronized key distribution using biometric slots for wireless body sensor networks.
Mobile Computing and Communications Review, 2010

Trust Based Routing for Misbehavior Detection in Ad Hoc Networks.
JNW, 2010

Overlap-free Karatsuba-Ofman polynomial multiplication algorithms.
IET Information Security, 2010

Field programmable gate array prototyping of end-around carry parallel prefix tree architectures.
IET Computers & Digital Techniques, 2010

Long-term large-scale sensing in the forest: recent advances and future directions of GreenOrbs.
Frontiers Comput. Sci. China, 2010

Specifying and verifying PLC systems with TLA+ : A case study.
Computers & Mathematics with Applications, 2010

Parameterized Specification and Verification of PLC Systems in Coq.
Proceedings of the 4th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2010

Compositional Abstraction Refinement for Timed Systems.
Proceedings of the 4th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2010

A Refinement-Based Validation Method for Programmable Logic Controllers.
Proceedings of the 10th International Conference on Quality Software, 2010

Evaluating Importance of Websites on News Topics.
Proceedings of the PRICAI 2010: Trends in Artificial Intelligence, 2010

DAWN: Energy efficient data aggregation in WSN with mobile sinks.
Proceedings of the 18th International Workshop on Quality of Service, 2010

A Domain-related Authority Model for Web Pages based on Source and Related Information.
Proceedings of the ICSOFT 2010, 2010

Specifying Time-Sensitive Systems with TLA+.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

On Array Theory of Bounded Elements.
Proceedings of the Computer Aided Verification, 22nd International Conference, 2010

A Brief Survey on De-anonymization Attacks in Online Social Networks.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
Modeling job shop scheduling with batches and setup times by timed Petri nets.
Mathematical and Computer Modelling, 2009

Formal modeling and analysis of a narrow bandwidth protocol for establishing and terminating connections.
Mathematical and Computer Modelling, 2009

QoS Requirement Generation and Algorithm Selection for Composite Service Based on Reference Vector.
J. Comput. Sci. Technol., 2009

n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
J. Comput. Sci. Technol., 2009

Obtaining More Karatsuba-Like Formulae over The Binary Field.
IACR Cryptology ePrint Archive, 2009

Workflow-based resource allocation to optimize overall performance of composite services.
Future Generation Comp. Syst., 2009

Heuristic-Guided Abstraction Refinement.
Comput. J., 2009

Specifying and Verifying PLC Systems with TLA+.
Proceedings of the TASE 2009, 2009

CLEAR: A confidential and Lifetime-Aware Routing Protocol for wireless sensor network.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks.
Proceedings of the MSN 2009, 2009

Formal Specification and Code Generation of Programable Logic Controllers.
Proceedings of the 14th IEEE International Conference on Engineering of Complex Computer Systems, 2009

Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Data mining based decomposition for assume-guarantee reasoning.
Proceedings of 9th International Conference on Formal Methods in Computer-Aided Design, 2009

Translation-Based Model Checking for PLC Programs.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Formalization and Verification of PLC Timers in Coq.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Anonymous user communication for privacy protection in wireless metropolitan mesh networks.
Proceedings of the 2009 ACM Symposium on Information, 2009

Towards Energy-Efficient Secure Communications Using Biometric Key Distribution in Wireless Biomedical Healthcare Networks.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

Extracting Content from Web Pages Using the Sliding Window.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009

2008
Effective Predicate Abstraction for Program Verification.
Proceedings of the Second IEEE/IFIP International Symposium on Theoretical Aspects of Software Engineering, 2008

Modeling and analysis of stage machinery control systems by timed colored Petri nets.
Proceedings of the IEEE Third International Symposium on Industrial Embedded Systems, 2008

Verifying programmable logic controllers with abstraction.
Proceedings of the IEEE Third International Symposium on Industrial Embedded Systems, 2008

Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

A Maximum Weight Heuristic Method for Abstract State Computation.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Modeling and Analysis of Real-Life Job Shop Scheduling Problems by Petri nets.
Proceedings of the Proceedings 41st Annual Simulation Symposium (ANSS-41 2008), 2008

2007
Modelling and verification of program logic controllers using timed automata.
IET Software, 2007

Overlap-free Karatsuba-Ofman Polynomial Multiplication Algorithms.
IACR Cryptology ePrint Archive, 2007

Effective heuristics for counterexample-guided abstraction refinement.
Proceedings of the 17th ACM Great Lakes Symposium on VLSI 2007, 2007

2006
Probabilistic optimization for FPGA board level routing problems.
IEEE Trans. on Circuits and Systems, 2006

Congestion estimation for hexagonal routing.
Int. J. Comput. Math., 2006

A combinatorial congestion estimation approach with generalized detours.
Computers & Mathematics with Applications, 2006

An Efficient Algorithm for Fingercode-Based Biometric Identification.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Minimal Threshold Closure.
Proceedings of the Computer Security, 2006

Verifying Java Programs By Theorem Prover HOL.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

A Probabilistic Learning Approach for Counterexample Guided Abstraction Refinement.
Proceedings of the Automated Technology for Verification and Analysis, 2006

2005
Efficient vector quantization using genetic algorithm.
Neural Computing and Applications, 2005

Multiterminal net assignments by scatter search.
Mathematical and Computer Modelling, 2005

On Theoretical Upper Bounds for Routing Estimation.
J. UCS, 2005

On synthesis of 3 × 3 reversible logic functions.
Int. J. Comput. Math., 2005

Probabilistic Estimation for Routing Space.
Comput. J., 2005

Secure Anonymous Communication with Conditional Traceability.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2005

A Hierachical Method for Wiring and Congestion Prediction.
Proceedings of the 2005 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2005), 2005

Segmented channel routing with pin rearrangements via satisfiability.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

A SOM-wavelet networks for face identification.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Adaptive matching wavelet networks for face recognition.
Proceedings of the 2005 International Conference on Image Processing, 2005

An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Integrating Collaborate and Content-Based Filtering for Personalized Information Recommendation.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A stochastic model for cellassignments in PCS networks.
Mathematical and Computer Modelling, 2004

A comparative study on search strategies for cell assignments.
Int. J. Comput. Math., 2004

Anomaly Detection in Grid Computing Based on Vector Quantization.
Proceedings of the Grid and Cooperative Computing, 2004

Enhancing the Scalability of the Community Authorization Service for Virtual Organizations.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Security middleware for enhancing interoperability of Public Key Infrastructure.
Computers & Security, 2003

Lightweight security for mobile commerce transactions.
Computer Communications, 2003

Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services.
Proceedings of the Applied Cryptography and Network Security, 2003


  Loading...