Yang Liu

According to our database1, Yang Liu authored at least 367 papers between 2006 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Mining Likely Analogical APIs Across Third-Party Libraries via Large-Scale Unsupervised API Semantics Embedding.
IEEE Trans. Software Eng., 2021

Exploring the Effects of Blur and Deblurring to Visual Object Tracking.
IEEE Trans. Image Process., 2021

A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2021

Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis.
IEEE Trans. Inf. Forensics Secur., 2021

An Isabelle/HOL Formalisation of the SPARC Instruction Set Architecture and the TSO Memory Model.
J. Autom. Reason., 2021

Auto-Exposure Fusion for Single-Image Shadow Removal.
CoRR, 2021

Countering Malicious DeepFakes: Survey, Battleground, and Horizon.
CoRR, 2021

ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications.
CoRR, 2021

2020
CANeleon: Protecting CAN Bus With Frame ID Chameleon.
IEEE Trans. Veh. Technol., 2020

METTLE: A METamorphic Testing Approach to Assessing and Validating Unsupervised Machine Learning Systems.
IEEE Trans. Reliab., 2020

Large-Scale Empirical Studies on Effort-Aware Security Vulnerability Prediction Methods.
IEEE Trans. Reliab., 2020

Information Theoretical Analysis of Unfair Rating Attacks Under Subjectivity.
IEEE Trans. Inf. Forensics Secur., 2020

BBB-CFI: Lightweight CFI Approach Against Code-Reuse Attacks Using Basic Block Information.
ACM Trans. Embed. Comput. Syst., 2020

Automated synthesis of local time requirement for service composition.
Softw. Syst. Model., 2020

Risk Management Framework for Machine Learning Security.
CoRR, 2020

SeqMobile: A Sequence Based Efficient Android Malware Detection System Using RNN on Mobile Devices.
CoRR, 2020

Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers.
CoRR, 2020

DeepTag: Robust Image Tagging for DeepFake Provenance.
CoRR, 2020

EfficientDeRain: Learning Pixel-wise Dilation Filtering for High-Efficiency Single-Image Deraining.
CoRR, 2020

Adversarial Exposure Attack on Diabetic Retinopathy Imagery.
CoRR, 2020

FakeRetouch: Evading DeepFakes Detection via the Guidance of Deliberate Noise.
CoRR, 2020

It's Raining Cats or Dogs? Adversarial Rain Attack on DNN Perception.
CoRR, 2020

Fairness Matters - A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems.
CoRR, 2020

A Survey of Smart Contract Formal Specification and Verification.
CoRR, 2020

Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack.
CoRR, 2020

Generating Adversarial Examples withControllable Non-transferability.
CoRR, 2020

Stealing Deep Reinforcement Learning Models for Fun and Profit.
CoRR, 2020

Multi-IF : An Approach to Anomaly Detection in Self-Driving Systems.
CoRR, 2020

Why an Android App is Classified as Malware? Towards Malware Classification Interpretation.
CoRR, 2020

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers.
CoRR, 2020

Guardauto: A Decentralized Runtime Protection System for Autonomous Driving.
CoRR, 2020

SNIFF: Reverse Engineering of Neural Networks with Fault Attacks.
CoRR, 2020

Towards Byzantine-resilient Learning in Decentralized Systems.
CoRR, 2020

ABBA: Saliency-Regularized Motion-Based Adversarial Blur Attack.
CoRR, 2020

FakeLocator: Robust Localization of GAN-Based Face Manipulations via Semantic Segmentation Networks with Bells and Whistles.
CoRR, 2020

A distributed method to avoid higher-order deadlocks in multi-robot systems.
Autom., 2020

How Are Performance Issues Caused and Resolved?-An Empirical Study from a Design Perspective.
Proceedings of the ICPE '20: ACM/SPEC International Conference on Performance Engineering, 2020

CORE: Automating Review Recommendation for Code Changes.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

Automatic Hot Patch Generation for Android Kernels.
Proceedings of the 29th USENIX Security Symposium, 2020

MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.
Proceedings of the 29th USENIX Security Symposium, 2020

MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs.
Proceedings of the 29th USENIX Security Symposium, 2020

Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Watch out! Motion is Blurring the Vision of Your Deep Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Amora: Black-box Adversarial Morphing Attack.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

DeepRhythm: Exposing DeepFakes with Attentional Visual Heartbeat Rhythms.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementations.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Generating Concept based API Element Comparison Using a Knowledge Graph.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Marble: Model-based Robustness Analysis of Stateful Deep Learning Systems.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Cats Are Not Fish: Deep Learning Testing Calls for Out-Of-Distribution Awareness.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

How are Deep Learning Models Similar?: An Empirical Study on Clone Analysis of Deep Learning Software.
Proceedings of the ICPC '20: 28th International Conference on Program Comprehension, 2020

Patch based vulnerability matching for binary programs.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

An empirical study on ARM disassembly tools.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020

FakeSpotter: A Simple yet Robust Baseline for Spotting AI-Synthesized Fake Faces.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Generating Behavior-Diverse Game AIs with Evolutionary Multi-Objective Deep Reinforcement Learning.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Variable Precision Multi-granularity Rough Soft Sets Based on Multiple Thresholds.
Proceedings of the Learning Technologies and Systems, 2020

An Empirical Study of Usages, Updates and Risks of Third-Party Libraries in Java Projects.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

Towards characterizing adversarial defects of deep learning software from the lens of uncertainty.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

MemLock: memory usage guided fuzzing.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Typestate-guided fuzzer for discovering use-after-free vulnerabilities.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

An empirical assessment of security risks of global Android banking apps.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Butterfly Space: An Architectural Approach for Investigating Performance Issues.
Proceedings of the 2020 IEEE International Conference on Software Architecture, 2020

DesignDiff: Continuously Modeling Software Design Difference from Code Revisions.
Proceedings of the 2020 IEEE International Conference on Software Architecture, 2020

Privacy-Aware UAV Flights through Self-Configuring Motion Planning.
Proceedings of the 2020 IEEE International Conference on Robotics and Automation, 2020

SPARK: Spatial-Aware Online Incremental Attack Against Visual Tracking.
Proceedings of the Computer Vision - ECCV 2020, 2020

Generating Adversarial Examples for Holding Robustness of Source Code Processing Models.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Continuous Multiagent Control Using Collective Behavior Entropy for Large-Scale Home Energy Management.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
A Real-Time and Fully Distributed Approach to Motion Planning for Multirobot Systems.
IEEE Trans. Syst. Man Cybern. Syst., 2019

Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation.
IEEE Trans. Software Eng., 2019

Automatic Loop Summarization via Path Dependency Analysis.
IEEE Trans. Software Eng., 2019

Architecture-Based Behavioral Adaptation with Generated Alternatives and Relaxed Constraints.
IEEE Trans. Serv. Comput., 2019

Layered Object-Oriented Programming: Advanced VTable Reuse Attacks on Binary-Level Defense.
IEEE Trans. Inf. Forensics Secur., 2019

Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets.
IEEE Trans. Inf. Forensics Secur., 2019

Refinement-Based Specification and Security Analysis of Separation Kernels.
IEEE Trans. Dependable Secur. Comput., 2019

Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Automatic Detection and Repair Recommendation for Missing Checks.
J. Comput. Sci. Technol., 2019

A PSO-Based CEGAR Framework for Stochastic Model Checking.
Int. J. Softw. Eng. Knowl. Eng., 2019

Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks.
IACR Cryptol. ePrint Arch., 2019

A Countermeasure Against Statistical Ineffective Fault Analysis.
IACR Cryptol. ePrint Arch., 2019

What's Spain's Paris? Mining analogical libraries from Q&A discussions.
Empir. Softw. Eng., 2019

Doublade: Unknown Vulnerability Detection in Smart Contracts Via Abstract Signature Matching and Refined Detection Rules.
CoRR, 2019

Amora: Black-box Adversarial Morphing Attack.
CoRR, 2019

ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking.
CoRR, 2019

Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems.
CoRR, 2019

Spatial-aware Online Adversarial Perturbations Against Visual Object Tracking.
CoRR, 2019

Oracle-Supported Dynamic Exploit Generation for Smart Contracts.
CoRR, 2019

FakeSpotter: A Simple Baseline for Spotting AI-Synthesized Fake Faces.
CoRR, 2019

A formalisation of the SPARC TSO memory model for multi-core machine code.
CoRR, 2019

Machine Learning Testing: Survey, Landscapes and Horizons.
CoRR, 2019

Securing android applications via edge assistant third-party library detection.
Comput. Secur., 2019

How security bugs are fixed and what can be improved: an empirical study with Mozilla.
Sci. China Inf. Sci., 2019

DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

Locating vulnerabilities in binaries via memory layout recovering.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Cerebro: context-aware adaptive fuzzing for effective vulnerability detection.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

DeepStellar: model-based quantitative analysis of stateful deep learning systems.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement Learning.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Coverage-Guided Fuzzing for Feedforward Neural Networks.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

DeepMutation++: A Mutation Testing Framework for Deep Learning Systems.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and Platforms.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

A Quantitative Analysis Framework for Recurrent Neural Network.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

DeepHunter: a coverage-guided fuzz testing framework for deep neural networks.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

DiffChaser: Detecting Disagreements for Deep Neural Networks.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Learning Performance Optimization from Code Changes for Android Apps.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

ReCDroid: automatically reproducing Android application crashes from bug reports.
Proceedings of the 41st International Conference on Software Engineering, 2019

Localized or architectural: an empirical study of performance issues dichotomy.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Vultron: catching vulnerable smart contracts once and for all.
Proceedings of the 41st International Conference on Software Engineering: New Ideas and Emerging Results, 2019

Superion: grammar-aware greybox fuzzing.
Proceedings of the 41st International Conference on Software Engineering, 2019

A large-scale empirical study on industrial fake apps.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, 2019

Leopard: identifying vulnerable code for vulnerability assessment through program metrics.
Proceedings of the 41st International Conference on Software Engineering, 2019

StoryDroid: automated generation of storyboard for Android apps.
Proceedings of the 41st International Conference on Software Engineering, 2019

A Performance-Sensitive Malware Detection System on Mobile Platform.
Proceedings of the Formal Methods and Software Engineering, 2019

Secure Deep Learning Engineering: A Road Towards Quality Assurance of Intelligent Systems.
Proceedings of the Formal Methods and Software Engineering, 2019

Safe Inputs Approximation for Black-Box Systems.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

A Formally Verified Buddy Memory Allocation Model.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

A Parametric Rely-Guarantee Reasoning Framework for Concurrent Reactive Systems.
Proceedings of the Formal Methods - The Next 30 Years - Third World Congress, 2019

2018
Towards Model Checking Android Applications.
IEEE Trans. Software Eng., 2018

A Formal Specification and Verification Framework for Timed Security Protocols.
IEEE Trans. Software Eng., 2018

Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms.
IACR Cryptol. ePrint Arch., 2018

Fault Resilient Encoding Schemes in Software: How Far Can We Go?
IACR Cryptol. ePrint Arch., 2018

A UTP semantics for communicating processes with shared variables and its formal encoding in PVS.
Formal Aspects Comput., 2018

A multi-view context-aware approach to Android malware detection and malicious code localization.
Empir. Softw. Eng., 2018

DroidEcho: an in-depth dissection of malicious behaviors in Android applications.
Cybersecur., 2018

DeepCruiser: Automated Guided Testing for Stateful Deep Learning Systems.
CoRR, 2018

An Orchestrated Empirical Study on Deep Learning Frameworks and Platforms.
CoRR, 2018

An Event-based Compositional Reasoning Approach for Concurrent Reactive Systems.
CoRR, 2018

Secure Deep Learning Engineering: A Software Quality Assurance Perspective.
CoRR, 2018

Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer.
CoRR, 2018

Coverage-Guided Fuzzing for Deep Neural Networks.
CoRR, 2018

Combinatorial Testing for Deep Learning Systems.
CoRR, 2018

AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps.
CoRR, 2018

K-Rust: An Executable Formal Semantics for Rust.
CoRR, 2018

Executable Operational Semantics of Solidity.
CoRR, 2018

Towards Efficient Data-flow Test Data Generation.
CoRR, 2018

DeepGauge: Comprehensive and Multi-Granularity Testing Criteria for Gauging the Robustness of Deep Learning Systems.
CoRR, 2018

ROPSentry: Runtime defense against ROP attacks using hardware performance counters.
Comput. Secur., 2018

Anti-chain based algorithms for timed/probabilistic refinement checking.
Sci. China Inf. Sci., 2018

A distributed approach to robust control of multi-robot systems.
Autom., 2018

Are mobile banking apps secure? what can be improved?
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

FOT: a versatile, configurable, extensible fuzzing framework.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

DeepGauge: multi-granularity testing criteria for deep learning systems.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Tell them apart: distilling technology differences from crowd-scale comparison discussions.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

ClDiff: generating concise linked code differences.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Efficiently manifesting asynchronous programming errors in Android apps.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

DeepMutation: Mutation Testing of Deep Learning Systems.
Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering, 2018

DangDone: Eliminating Dangling Pointers via Intermediate Pointers.
Proceedings of the Tenth Asia-Pacific Symposium on Internetware, 2018

Vanguard: Detecting Missing Checks for Prognosing Potential Vulnerabilities.
Proceedings of the Tenth Asia-Pacific Symposium on Internetware, 2018

Automatic Generation of API Documentations for Open-Source Projects.
Proceedings of the IEEE Third International Workshop on Dynamic Software Documentation, 2018

Detecting missing checks for identifying insufficient attack protections.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Large-scale analysis of framework-specific exceptions in Android apps.
Proceedings of the 40th International Conference on Software Engineering, 2018

From UI design image to GUI skeleton: a neural machine translator to bootstrap mobile GUI implementation.
Proceedings of the 40th International Conference on Software Engineering, 2018

Speedoo: prioritizing performance optimization opportunities.
Proceedings of the 40th International Conference on Software Engineering, 2018

Apk2vec: Semi-Supervised Multi-view Representation Learning for Profiling Android Applications.
Proceedings of the IEEE International Conference on Data Mining, 2018

SGXlinger: A New Side-Channel Attack Vector Based on Interrupt Latency Against Enclave Execution.
Proceedings of the 36th IEEE International Conference on Computer Design, 2018

Compositional Reasoning for Shared-Variable Concurrent Programs.
Proceedings of the Formal Methods - 22nd International Symposium, 2018

A Permission-Dependent Type System for Secure Information Flow Analysis.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

Hawkeye: Towards a Desired Directed Grey-box Fuzzer.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Practical Fault Attack on Deep Neural Networks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Collision and Deadlock Avoidance in Multirobot Systems: A Distributed Approach.
IEEE Trans. Syst. Man Cybern. Syst., 2017

Detecting Bugs of Concurrent Programs With Program Invariants.
IEEE Trans. Reliab., 2017

Battery-Aware Mobile Data Service.
IEEE Trans. Mob. Comput., 2017

Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique.
IEEE Trans. Inf. Forensics Secur., 2017

Context-Aware, Adaptive, and Scalable Android Malware Detection Through Online Learning.
IEEE Trans. Emerg. Top. Comput. Intell., 2017

By the Community & For the Community: A Deep Learning Approach to Assist Collaborative Editing in Q&A Sites.
Proc. ACM Hum. Comput. Interact., 2017

AndroVault: Constructing Knowledge Graph from Millions of Android Apps for Automated Analysis.
CoRR, 2017

High-Assurance Separation Kernels: A Survey on Formal Methods.
CoRR, 2017

graph2vec: Learning Distributed Representations of Graphs.
CoRR, 2017

Context-aware, Adaptive and Scalable Android Malware Detection through Online Learning (extended version).
CoRR, 2017

CSimpl: A Rely-Guarantee-Based Framework for Verifying Concurrent Programs.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2017

Skyfire: Data-Driven Seed Generation for Fuzzing.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Loopster: static loop termination analysis.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Guided, stochastic model-based GUI testing of Android apps.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Steelix: program-state based binary fuzzing.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

FiB: squeezing loop invariants by interpolation between Forward/Backward predicate transformers.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Mining implicit design templates for actionable code reuse.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Proof Tactics for Assertions in Separation Logic.
Proceedings of the Interactive Theorem Proving - 8th International Conference, 2017

SPAIN: security patch analysis for binaries towards understanding the pain and pills.
Proceedings of the 39th International Conference on Software Engineering, 2017

Feedback-based debugging.
Proceedings of the 39th International Conference on Software Engineering, 2017

A distributed approach to automated manufacturing systems with complex structures using Petri nets.
Proceedings of the 2017 IEEE International Conference on Robotics and Automation, 2017

Static and dynamic partitions of inequalities and their application in supervisor simplification.
Proceedings of the 2017 IEEE International Conference on Robotics and Automation, 2017

A Verification Framework for Stateful Security Protocols.
Proceedings of the Formal Methods and Software Engineering, 2017

No-Jump-into-Basic-Block: Enforce Basic Block CFI on the Fly for Real-world Binaries.
Proceedings of the 54th Annual Design Automation Conference, 2017

A robust control approach to automated manufacturing systems allowing failures and reworks with Petri nets.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Decentralized supervisory control of Generalized Mutual Exclusion Constraints in Petri Nets.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Robust control of automated manufacturing systems with complex structures using Petri Nets.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

2016
A Fine-Grained Control Flow Integrity Approach Against Runtime Memory Attacks for Embedded Systems.
IEEE Trans. Very Large Scale Integr. Syst., 2016

Formal Specification and Analysis of Partitioning Operating Systems by Integrating Ontology and Refinement.
IEEE Trans. Ind. Informatics, 2016

Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware.
IEEE Trans. Inf. Forensics Secur., 2016

Improved EGT-Based Robustness Analysis of Negotiation Strategies in Multiagent Systems via Model Checking.
IEEE Trans. Hum. Mach. Syst., 2016

Polynomially Complex Synthesis of Distributed Supervisors for Large-Scale AMSs Using Petri Nets.
IEEE Trans. Control. Syst. Technol., 2016

Supervisor Simplification in FMSs: Comparative Studies and New Results Using Petri Nets.
IEEE Trans. Control. Syst. Technol., 2016

Verifying a quantitative relaxation of linearizability via refinement.
Int. J. Softw. Tools Technol. Transf., 2016

Formalizing and verifying stochastic system architectures using Monterey Phoenix.
Softw. Syst. Model., 2016

ProMoca: Probabilistic Modeling and Analysis of Agents in Commitment Protocols.
J. Artif. Intell. Res., 2016

Compositional Reasoning for Shared-variable Concurrent Programs.
CoRR, 2016

subgraph2vec: Learning Distributed Representations of Rooted Sub-graphs from Large Graphs.
CoRR, 2016

IBED: Combining IBEA and DE for optimal feature selection in software product line engineering.
Appl. Soft Comput., 2016

A formal model for the SPARCv8 ISA and a proof of non-interference for the LEON3 processor.
Arch. Formal Proofs, 2016

Reasoning About Information Flow Security of Separation Kernels with Channel-Based Communication.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2016

Proteus: computing disjunctive loop summary via path dependency analysis.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

BinGo: cross-architecture cross-OS binary search.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Detecting Bugs of Concurrent Programs with Program Invariants.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

Semantic modelling of Android malware for effective malware comprehension, detection, and classification.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

Online malware defense using attack behavior model.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

Contextual Weisfeiler-Lehman graph kernel for malware detection.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

Adaptive and scalable Android malware detection through online learning.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

How to Use Information Theory to Mitigate Unfair Rating Attacks.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

Limitations on Robust Ratings and Predictions.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

Optimizing selection of competing services with probabilistic hierarchical refinement.
Proceedings of the 38th International Conference on Software Engineering, 2016

Generating performance distributions via probabilistic symbolic execution.
Proceedings of the 38th International Conference on Software Engineering, 2016

Robust control of automated manufacturing systems with assembly operations using petri nets.
Proceedings of the 2016 IEEE International Conference on Robotics and Automation, 2016

Scaling BDD-based Timed Verification with Simulation Reduction.
Proceedings of the Formal Methods and Software Engineering, 2016

Automated Requirements Validation for ATP Software via Specification Review and Testing.
Proceedings of the Formal Methods and Software Engineering, 2016

Service Adaptation with Probabilistic Partial Models.
Proceedings of the Formal Methods and Software Engineering, 2016

Concurrent On-the-Fly SCC Detection for Automata-Based Model Checking with Fairness Assumption.
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016

An Executable Formalisation of the SPARCv8 Instruction Set Architecture: A Case Study for the LEON3 Processor.
Proceedings of the FM 2016: Formal Methods, 2016

Critical stages and their application in large scale automated manufacturing systems via Petri nets.
Proceedings of the 15th European Control Conference, 2016

GPU-Accelerated Value Iteration for the Computation of Reachability Probabilities in MDPs.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016

Mystique: Evolving Android Malware for Auditing Anti-Malware Tools.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Critical stages and their identification in large scale automated manufacturing systems via Petri nets.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2016

A Language for Trust Modelling.
Proceedings of the 18th International Workshop on Trust in Agent Societies co-located with the 15th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2016), 2016

Is It Harmful When Advisors Only Pretend to Be Honest?
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
A Systematic Study on Explicit-State Non-Zenoness Checking for Timed Automata.
IEEE Trans. Software Eng., 2015

Supervisor Synthesis and Performance Improvement for Automated Manufacturing Systems by Using Petri Nets.
IEEE Trans. Ind. Informatics, 2015

Maximally Permissive Distributed Control of Large Scale Automated Manufacturing Systems Modeled With Petri Nets.
IEEE Trans. Control. Syst. Technol., 2015

Collaborative Security: A Survey and Taxonomy.
ACM Comput. Surv., 2015

Automated Agent Behavior Construction for Protocol-Based Multiagent Systems.
Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2015

Event and Strategy Analytics.
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015

TLV: abstraction through testing, learning, and validation.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Formalizing and verifying stochastic system architectures using Monterey Phoenix (SoSyM abstract).
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

Interpolation Guided Compositional Verification (T).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

Detection and classification of malicious JavaScript via attack behavior modelling.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

S-looper: automatic summarization for multipath string loops.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Optimizing selection of competing features via feedback-directed evolutionary algorithms.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Reliability assessment for distributed systems via communication abstraction and refinement.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Event-based formalization of safety-critical operating system standards: An experience report on ARINC 653 using Event-B.
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015

Quantifying Robustness of Trust Systems against Collusive Unfair Rating Attacks Using Information Theory.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

An Adaptive Markov Strategy for Effective Network Intrusion Detection.
Proceedings of the 27th IEEE International Conference on Tools with Artificial Intelligence, 2015

Supervisor design and simplification for Automated Manufacturing Systems using colored Petri nets.
Proceedings of the IEEE International Conference on Robotics and Automation, 2015

Supervisors and their simplification in automated manufacturing systems via Petri nets.
Proceedings of the IEEE International Conference on Robotics and Automation, 2015

GPU Accelerated On-the-Fly Reachability Checking.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

Verifying Parameterized Timed Security Protocols.
Proceedings of the FM 2015: Formal Methods, 2015

Trace-Length Independent Runtime Monitoring of Quantitative Policies in LTL.
Proceedings of the FM 2015: Formal Methods, 2015

JSDC: A Hybrid Approach for JavaScript Malware Detection and Classification.
Proceedings of the 10th ACM Symposium on Information, 2015

A Petri net-based distributed control of automated manufacturing systems with assembly operations.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2015

Robust supervisor synthesis for automated manufacturing systems using Petri nets.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2015

Using Information Theory to Improve the Robustness of Trust Systems.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

The Fallacy of Endogenous Discounting of Trust Recommendations.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Automated Analysis of Commitment Protocols Using Probabilistic Model Checking.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Learning Assumptions for CompositionalVerification of Timed Systems.
IEEE Trans. Software Eng., 2014

Towards Formal Modelling and Verification of Pervasive Computing Systems.
Trans. Comput. Collect. Intell., 2014

Supervisor Simplification for AMS Based on Petri Nets and Inequality Analysis.
IEEE Trans Autom. Sci. Eng., 2014

Parameter synthesis for hierarchical concurrent real-time systems.
Real Time Syst., 2014

Practice and Evaluation of Pagelet-Based Client-Side Rendering Mechanism.
IEICE Trans. Inf. Syst., 2014

Complexity of the Soundness Problem of Workflow Nets.
Fundam. Informaticae, 2014

Model checking approach to automated planning.
Formal Methods Syst. Des., 2014

Model checking with fairness assumptions using PAT.
Frontiers Comput. Sci., 2014

Towards verification of computation orchestration.
Formal Aspects Comput., 2014

Stateful Security Protocol Verification.
CoRR, 2014

Automated runtime recovery for QoS-based service composition.
Proceedings of the 23rd International World Wide Web Conference, 2014

Towards Robust and Effective Trust Management for Security: A Survey.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Are Timed Automata Bad for a Specification Language? Language Inclusion Checking for Timed Automata.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2014

Automatic Verification for Later-Correspondence of Security Protocols.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2014

RaPiD: a toolkit for reliability analysis of non-deterministic systems.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Automatic early defects detection in use case documents.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

Reconfigurable Dynamic Trusted Platform Module for Control Flow Checking.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014

On Robustness of Trust Systems.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Event Analytics.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2014, 2014

Clonepedia: Summarizing Code Clones by Common Syntactic Context for Software Maintenance.
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014

Detecting differences across multiple instances of code clones.
Proceedings of the 36th International Conference on Software Engineering, 2014

VeriWS: a tool for verification of combined functional and non-functional requirements of web service composition.
Proceedings of the 36th International Conference on Software Engineering, 2014

Distributed supervisor synthesis for automated manufacturing systems using Petri nets.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

GPU Accelerated Counterexample Generation in LTL Model Checking.
Proceedings of the Formal Methods and Software Engineering, 2014

TAuth: Verifying Timed Security Protocols.
Proceedings of the Formal Methods and Software Engineering, 2014

Practical Analysis Framework for Software-Based Attestation Scheme.
Proceedings of the Formal Methods and Software Engineering, 2014

SCC-Based Improved Reachability Analysis for Markov Decision Processes.
Proceedings of the Formal Methods and Software Engineering, 2014

Symbolic Analysis of an Electric Vehicle Charging Protocol.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

Formal Verification of Operational Transformation.
Proceedings of the FM 2014: Formal Methods, 2014

MDP-Based Reliability Analysis of an Ambient Assisted Living System.
Proceedings of the FM 2014: Formal Methods, 2014

TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms.
Proceedings of the FM 2014: Formal Methods, 2014

Diamonds Are a Girl's Best Friend: Partial Order Reduction for Timed Automata with Abstractions.
Proceedings of the Computer Aided Verification - 26th International Conference, 2014

Simplifying supervisory controllers of automated manufacturing systems via Petri net modeling and multiset analysis.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

A comparative approach to supervisor simplification in automated manufacturing systems using Petri nets.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

Towards a Combination of CafeOBJ and PAT.
Proceedings of the Specification, Algebra, and Software, 2014

PeCAn: Compositional Verification of Petri Nets Made Easy.
Proceedings of the Automated Technology for Verification and Analysis, 2014

An extensive model checking framework for multi-agent systems.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

2013
Verifying Linearizability via Optimized Refinement Checking.
IEEE Trans. Software Eng., 2013

Modeling and verifying hierarchical real-time systems using stateful timed CSP.
ACM Trans. Softw. Eng. Methodol., 2013

State Space Reduction for Sensor Networks Using Two-Level Partial Order Reduction.
Proceedings of the Verification, 2013

USMMC: a self-contained model checker for UML state machines.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Towards Formal Modeling and Verification of Cloud Architectures: A Case Study on Hadoop.
Proceedings of the IEEE Ninth World Congress on Services, 2013

AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Constraint-based automatic symmetry detection.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

TzuYu: Learning stateful typestates.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Automatically partition software into least privilege components using dynamic data dependency analysis.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Combining model checking and testing with an application to reliability prediction and distribution.
Proceedings of the International Symposium on Software Testing and Analysis, 2013

Improved Reachability Analysis in DTMC via Divide and Conquer.
Proceedings of the Integrated Formal Methods, 10th International Conference, 2013

A Formal Semantics for Complete UML State Machines with Communications.
Proceedings of the Integrated Formal Methods, 10th International Conference, 2013

Message from ESSS 2013 Workshop Co-chairs.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Dynamic synthesis of local time requirement for service composition.
Proceedings of the 35th International Conference on Software Engineering, 2013

Build your own model checker in one month.
Proceedings of the 35th International Conference on Software Engineering, 2013

Improving Model Checking Stateful Timed CSP with non-Zenoness through Clock-Symmetry Reduction.
Proceedings of the Formal Methods and Software Engineering, 2013

A UTP Semantics for Communicating Processes with Shared Variables.
Proceedings of the Formal Methods and Software Engineering, 2013

vTRUST: A Formal Modeling and Verification Framework for Virtualization Systems.
Proceedings of the Formal Methods and Software Engineering, 2013

Verification of Functional and Non-functional Requirements of Web Service Composition.
Proceedings of the Formal Methods and Software Engineering, 2013

TTM/PAT: Specifying and Verifying Timed Transition Models.
Proceedings of the Formal Techniques for Safety-Critical Systems, 2013

PSyHCoS: Parameter Synthesis for Hierarchical Concurrent Real-Time Systems.
Proceedings of the Computer Aided Verification - 25th International Conference, 2013

Supervisor synthesis and performance improvement for automated manufacturing systems by using Petri nets.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

CELL: A Compositional Verification Framework.
Proceedings of the Automated Technology for Verification and Analysis, 2013

Multi-core Model Checking Algorithms for LTL Verification with Fairness Assumptions.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

2012
Timed Automata.
Proceedings of the Handbook of Finite State Based Models and Applications., 2012

Formal modeling and validation of Stateflow diagrams.
Int. J. Softw. Tools Technol. Transf., 2012

SeVe: automatic tool for verification of security protocols.
Frontiers Comput. Sci. China, 2012

Planning as Model Checking Tasks.
Proceedings of the 35th Annual IEEE Software Engineering Workshop, 2012

Probabilistic Model Checking Multi-agent Behaviors in Dispersion Games Using Counter Abstraction.
Proceedings of the PRIMA 2012: Principles and Practice of Multi-Agent Systems, 2012

Analyzing multi-agent systems with probabilistic model checking approach.
Proceedings of the 34th International Conference on Software Engineering, 2012

More Anti-chain Based Refinement Checking.
Proceedings of the Formal Methods and Software Engineering, 2012

An Analytical and Experimental Comparison of CSP Extensions and Tools.
Proceedings of the Formal Methods and Software Engineering, 2012

Symbolic Model-Checking of Stateful Timed CSP Using BDD and Digitization.
Proceedings of the Formal Methods and Software Engineering, 2012

Automatic Generation of Provably Correct Embedded Systems.
Proceedings of the Formal Methods and Software Engineering, 2012

Formal Analysis of Pervasive Computing Systems.
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012

Translating PDDL into CSP# - The PAT Approach.
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012

Model Checking Software Architecture Design.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

Improved BDD-Based Discrete Analysis of Timed Systems.
Proceedings of the FM 2012: Formal Methods, 2012

Automatic Compositional Verification of Timed Systems.
Proceedings of the FM 2012: Formal Methods, 2012

A Model Checker for Hierarchical Probabilistic Real-Time Systems.
Proceedings of the Computer Aided Verification - 24th International Conference, 2012

Using Monterey Phoenix to Formalize and Verify System Architectures.
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012

Complexity of the Soundness Problem of Bounded Workflow Nets.
Proceedings of the Application and Theory of Petri Nets - 33rd International Conference, 2012

2011
Towards bug-free implementation for wireless sensor networks.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011

A model checking framework for hierarchical systems.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

PAT 3: An Extensible Architecture for Building Multi-domain Model Checkers.
Proceedings of the IEEE 22nd International Symposium on Software Reliability Engineering, 2011

Towards a Model Checker for NesC and Wireless Sensor Networks.
Proceedings of the Formal Methods and Software Engineering, 2011

Differencing Labeled Transition Systems.
Proceedings of the Formal Methods and Software Engineering, 2011

Verification of Orchestration Systems Using Compositional Partial Order Reduction.
Proceedings of the Formal Methods and Software Engineering, 2011

PRTS: An Approach for Model Checking Probabilistic Real-Time Hierarchical Systems.
Proceedings of the Formal Methods and Software Engineering, 2011

On Combining State Space Reductions with Global Fairness Assumptions.
Proceedings of the FM 2011: Formal Methods, 2011

An Efficient Algorithm for Learning Event-Recording Automata.
Proceedings of the Automated Technology for Verification and Analysis, 2011

2010
Modeling and Analyzing Timed Security Protocols Using Extended Timed CSP.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

An Automatic Approach to Model Checking UML State Machines.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Model Checking a Lazy Concurrent List-Based Set Algorithm.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Discovering Anomalies in Semantic Web Rules.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Analyzing hierarchical complex real-time systems.
Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2010

SpecDiff: debugging formal specifications.
Proceedings of the ASE 2010, 2010

Model Checking Hierarchical Probabilistic Systems.
Proceedings of the Formal Methods and Software Engineering, 2010

Model Checking a Model Checker: A Code Contract Combined Approach.
Proceedings of the Formal Methods and Software Engineering, 2010

Developing Model Checkers Using PAT.
Proceedings of the Automated Technology for Verification and Analysis, 2010

Model-Based Methods for Linking Web Service Choreography and Orchestration.
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010

2009
Integrating Specification and Programs for System Modeling and Verification.
Proceedings of the TASE 2009, 2009

Verification of Population Ring Protocols in PAT.
Proceedings of the TASE 2009, 2009

Formal Verification of Scalable NonZero Indicators.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

Verifying Stateful Timed CSP Using Implicit Clocks and Zone Abstraction.
Proceedings of the Formal Methods and Software Engineering, 2009

Scalable Multi-core Model Checking Fairness Enhanced Systems.
Proceedings of the Formal Methods and Software Engineering, 2009

Fair Model Checking with Process Counter Abstraction.
Proceedings of the FM 2009: Formal Methods, 2009

Model Checking Linearizability via Refinement.
Proceedings of the FM 2009: Formal Methods, 2009

PAT: Towards Flexible Verification under Fairness.
Proceedings of the Computer Aided Verification, 21st International Conference, 2009

2008
Compositional encoding for bounded model checking.
Frontiers Comput. Sci. China, 2008

Bounded Model Checking of Compositional Processes.
Proceedings of the Second IEEE/IFIP International Symposium on Theoretical Aspects of Software Engineering, 2008

Model Checking CSP Revisited: Introducing a Process Analysis Toolkit.
Proceedings of the Leveraging Applications of Formal Methods, 2008

An analyzer for extended compositional process algebras.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

Specifying and Verifying Event-Based Fairness Enhanced Systems.
Proceedings of the Formal Methods and Software Engineering, 2008

2006
Algorithmic Design Using Object-Z for Twig XML Queries Evaluation.
Electron. Notes Theor. Comput. Sci., 2006

Verification of Computation Orchestration Via Timed Automata.
Proceedings of the Formal Methods and Software Engineering, 2006


  Loading...