Qiang Wang

Orcid: 0000-0001-5649-8694

Affiliations:
  • PLA Academy of Military Science, Beijing, China
  • Southern University of Science and Technology, Shenzhen, China (former)
  • EPFL, School of Communication and Computer Science, Lausanne, Switzerland (former)


According to our database1, Qiang Wang authored at least 33 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Simulation-Based Validation for Autonomous Driving Systems.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

2022
Joint Optimization of Sensing, Decision-Making and Motion-Controlling for Autonomous Vehicles: A Deep Reinforcement Learning Approach.
IEEE Trans. Veh. Technol., 2022

A hybrid controller for safe and efficient longitudinal collision avoidance control.
J. Syst. Archit., 2022

Runtime Assurance of Learning-Based Lane Changing Control for Autonomous Driving Vehicles.
J. Circuits Syst. Comput., 2022

PATVD:Vulnerability Detection Based on Pre-training Techniques and Adversarial Training.
Proceedings of the IEEE Smartworld, 2022

Automated Reliability Analysis of Redundancy Architectures Using Statistical Model Checking.
Proceedings of the Knowledge Science, Engineering and Management, 2022

A Novel RVFL-Based Algorithm Selection Approach for Software Model Checking.
Proceedings of the Knowledge Science, Engineering and Management, 2022

Runtime Safety Assurance for Learning-enabled Control of Autonomous Driving Vehicles.
Proceedings of the 2022 International Conference on Robotics and Automation, 2022

2021
Formal Analysis of TSN Scheduler for Real-Time Communications.
IEEE Trans. Reliab., 2021

A Systematic Approach to Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking.
Secur. Commun. Networks, 2021

A comparative study of neural network techniques for automatic software vulnerability detection.
CoRR, 2021

A hybrid controller for safe and efficient collision avoidance control.
CoRR, 2021

Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking.
IEEE Access, 2021

CMSS: Collaborative Modeling of Safety and Security Requirements for Network Protocols.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Algorithm selection for software verification based on adversarial LSTM.
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021

2020
Formal Analysis of 5G EAP-TLS Authentication Protocol Using Proverif.
IEEE Access, 2020

A Comparative Study of Neural Network Techniques for Automatic Software Vulnerability Detection.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2020

Safe and efficient collision avoidance control for autonomous vehicles.
Proceedings of the 18th ACM/IEEE International Conference on Formal Methods and Models for System Design, 2020

Distributed and Parallel Ensemble Classification for Big Data Based on Kullback-Leibler Random Sample Partition.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Formal analysis of QUIC handshake protocol using ProVerif.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

Ensemble Neural Networks with Random Weights for Classification Problems.
Proceedings of the ACAI 2020: 3rd International Conference on Algorithms, 2020

2019
Online Sequential Extreme Learning Machine With Dynamic Forgetting Factor.
IEEE Access, 2019

Formal Verification of 5G-EAP-TLS Authentication Protocol.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2017
Algorithmic Verification of Component-based Systems.
PhD thesis, 2017

2016
Exploiting Symmetry for Efficient Verification of Infinite-State Component-Based Systems.
Proceedings of the Dependable Software Engineering: Theories, Tools, and Applications, 2016

Parameterized Systems in BIP: Design and Model Checking.
Proceedings of the 27th International Conference on Concurrency Theory, 2016

2015
Verification of Component-Based Systems via Predicate Abstraction and Simultaneous Set Reduction.
Proceedings of the Trustworthy Global Computing - 10th International Symposium, 2015

Automatic Fault Localization for BIP.
Proceedings of the Dependable Software Engineering: Theories, Tools, and Applications, 2015

SeBip: A Symbolic Executor for BIP.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

Formal Verification of Infinite-State BIP Models.
Proceedings of the Automated Technology for Verification and Analysis, 2015

2014
TOA: a tag-owner-assisting RFID authentication protocol toward access control and ownership transfer.
Secur. Commun. Networks, 2014

RFID seeking: Finding a lost tag rather than only detecting its missing.
J. Netw. Comput. Appl., 2014

2011
Key Privacy in McEliece Public Key Cryptosystem.
Proceedings of the IEEE 10th International Conference on Trust, 2011


  Loading...