Yang Liu

Orcid: 0000-0001-7300-9215

Affiliations:
  • Nanyang Technological University, School of Computer Engineering, Singapore
  • National University of Singapore, Singapore (former)


According to our database1, Yang Liu authored at least 602 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DL4SC: a novel deep learning-based vulnerability detection framework for smart contracts.
Autom. Softw. Eng., June, 2024

COCL: An Intelligent Framework for Enhancing Deep Learning-Based Vulnerability Detection.
IEEE Trans. Ind. Informatics, March, 2024

CodeBERT-Attack: Adversarial attack against source code deep learning models via pre-trained model.
J. Softw. Evol. Process., March, 2024

Distributed Motion Control for Multiple Mobile Robots Using Discrete-Event Systems and Model Predictive Control.
IEEE Trans. Syst. Man Cybern. Syst., February, 2024

Faire: Repairing Fairness of Neural Networks via Neuron Condition Synthesis.
ACM Trans. Softw. Eng. Methodol., January, 2024

A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services.
IEEE Trans. Computers, January, 2024

Natural & Adversarial Bokeh Rendering via Circle-of-Confusion Predictive Network.
IEEE Trans. Multim., 2024

Robust Motion Planning for Multi-Robot Systems Against Position Deception Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2024

Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines.
IEEE Trans. Dependable Secur. Comput., 2024

Groot: Adversarial Testing for Generative Text-to-Image Models with Tree-based Semantic Transformation.
CoRR, 2024

Pandora: Jailbreak GPTs by Retrieval Augmented Generation Poisoning.
CoRR, 2024

Graph Neural Networks in EEG-based Emotion Recognition: A Survey.
CoRR, 2024

Digger: Detecting Copyright Content Mis-usage in Large Language Model Training.
CoRR, 2024

Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

RUNNER: Responsible UNfair NEuron Repair for Enhancing Deep Neural Network Fairness.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Refinement-based Specification and Analysis of Multi-core ARINC 653 Using Event-B.
Formal Aspects Comput., December, 2023

Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis.
ACM Trans. Softw. Eng. Methodol., November, 2023

A Survey on Automated Driving System Testing: Landscapes and Trends.
ACM Trans. Softw. Eng. Methodol., September, 2023

Automatic Transformation Search Against Deep Leakage From Gradients.
IEEE Trans. Pattern Anal. Mach. Intell., September, 2023

Specification-Based Autonomous Driving System Testing.
IEEE Trans. Software Eng., June, 2023

Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis.
IEEE Trans. Knowl. Data Eng., June, 2023

GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search.
IEEE Trans. Software Eng., April, 2023

A Comprehensive Study on ARM Disassembly Tools.
IEEE Trans. Software Eng., April, 2023

Demystifying Performance Regressions in String Solvers.
IEEE Trans. Software Eng., March, 2023

GAN-Based Robust Motion Planning for Mobile Robots Against Localization Attacks.
IEEE Robotics Autom. Lett., March, 2023

Baton: symphony of random testing and concolic testing through machine learning and taint analysis.
Sci. China Inf. Sci., March, 2023

A Large-Scale Empirical Study of Real-Life Performance Issues in Open Source Projects.
IEEE Trans. Software Eng., February, 2023

Automatically Distilling Storyboard With Rich Features for Android Apps.
IEEE Trans. Software Eng., February, 2023

Cooperative collision avoidance in multirobot systems using fuzzy rules and velocity obstacles.
Robotica, February, 2023

LiDetector: License Incompatibility Detection for Open Source Software.
ACM Trans. Softw. Eng. Methodol., January, 2023

ADS-Lead: Lifelong Anomaly Detection in Autonomous Driving Systems.
IEEE Trans. Intell. Transp. Syst., January, 2023

Test Report Generation for Android App Testing Via Heterogeneous Data Analysis.
IEEE Trans. Software Eng., 2023

Service Pattern Optimization: Focusing on Collaboration in Service Ecosystems.
IEEE Trans. Serv. Comput., 2023

Neuron Coverage-Guided Domain Generalization.
IEEE Trans. Pattern Anal. Mach. Intell., 2023

Formalizing UML State Machines for Automated Verification - A Survey.
ACM Comput. Surv., 2023

Machine Learning for Actionable Warning Identification: A Comprehensive Survey.
CoRR, 2023

AdapterFL: Adaptive Heterogeneous Federated Learning for Resource-constrained Mobile Computing Systems.
CoRR, 2023

AdaptiveFL: Adaptive Heterogeneous Federated Learning for Resource-Constrained AIoT Systems.
CoRR, 2023

The Software Genome Project: Venture to the Genomic Pathways of Open Source Software and Its Applications.
CoRR, 2023

Split and Merge: Aligning Position Biases in Large Language Model based Evaluators.
CoRR, 2023

Event-based Compositional Reasoning of Information-Flow Security for Concurrent Systems.
CoRR, 2023

Protect Federated Learning Against Backdoor Attacks via Data-Free Trigger Generation.
CoRR, 2023

PentestGPT: An LLM-empowered Automatic Penetration Testing Tool.
CoRR, 2023

When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan.
CoRR, 2023

Towards Understanding the Capability of Large Language Models on Code Clone Detection: A Survey.
CoRR, 2023

Understanding Large Language Model Based Fuzz Driver Generation.
CoRR, 2023

Jailbreaker: Automated Jailbreak Across Multiple Large Language Model Chatbots.
CoRR, 2023

Prompt Injection attack against LLM-integrated Applications.
CoRR, 2023

On the Robustness of Segment Anything.
CoRR, 2023

Jailbreaking ChatGPT via Prompt Engineering: An Empirical Study.
CoRR, 2023

Automatic Code Summarization via ChatGPT: How Far Are We?
CoRR, 2023

The Scope of ChatGPT in Software Engineering: A Thorough Investigation.
CoRR, 2023

Architecture-agnostic Iterative Black-box Certified Defense against Adversarial Patches.
CoRR, 2023

FedMR: Federated Learning via Model Recombination.
CoRR, 2023

EENED: End-to-End Neural Epilepsy Detection based on Convolutional Transformer.
CoRR, 2023

EEG-based Sleep Staging with Hybrid Attention.
CoRR, 2023

RNNS: Representation Nearest Neighbor Search Black-Box Attack on Code Models.
CoRR, 2023

Interpretable and Robust AI in EEG Systems: A Survey.
CoRR, 2023

Learning Program Representations with a Tree-Structured Transformer.
Proceedings of the IEEE International Conference on Software Analysis, 2023

Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.
Proceedings of the 32nd USENIX Security Symposium, 2023

NAUTILUS: Automated RESTful API Vulnerability Detection.
Proceedings of the 32nd USENIX Security Symposium, 2023

Honey-Gauge: Enabling User-Centric Honeypot Classification.
Proceedings of the Ubiquitous Security, 2023

Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Software Architecture Recovery with Information Fusion.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Demystifying the Composition and Code Reuse in Solidity Smart Contracts.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Gitor: Scalable Code Clone Detection by Building Global Sample Graph.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

GitFL: Uncertainty-Aware Real-Time Asynchronous Federated Learning Using Version Control.
Proceedings of the IEEE Real-Time Systems Symposium, 2023

ThreatLand: Extracting Intelligence from Audit Logs via NLP methods.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

ALA: Naturalness-aware Adversarial Lightness Attack.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Learning to Locate and Describe Vulnerabilities.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Who is the Real Hero? Measuring Developer Contribution via Multi-Dimensional Data Integration.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

ASTER: Automatic Speech Recognition System Accessibility Testing for Stutterers.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

LiSum: Open Source Software License Summarization with Multi-Task Learning.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

An Empirical Study on Fine-Tuning Large Language Models of Code for Automated Program Repair.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

An Empirical Study of Malicious Code In PyPI Ecosystem.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Detecting Condition-Related Bugs with Control Flow Graph Neural Network.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

A Comprehensive Study on Quality Assurance Tools for Java.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Comparison and Evaluation of Clone Detection Techniques with Different Code Representations.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

FLYOVER: A Model-Driven Method to Generate Diverse Highway Interchanges for Autonomous Vehicle Testing.
Proceedings of the IEEE International Conference on Robotics and Automation, 2023

SDG-L: A Semiparametric Deep Gaussian Process based Framework for Battery Capacity Prediction.
Proceedings of the IEEE International Conference on Acoustics, 2023

Verifiable Multi-Key Privacy Data Computing System Based on Blockchain.
Proceedings of the 15th IEEE International Conference on Advanced Infocomm Technology, 2023

SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

An EEG Channel Selection Framework for Driver Drowsiness Detection via Interpretability Guidance.
Proceedings of the 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2023

APTer: Towards the Investigation of APT Attribution.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

PumpChannel: An Efficient and Secure Communication Channel for Trusted Execution Environment on ARM-FPGA Embedded SoC.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

Monitoring Automotive Software Security Health through Trustworthiness Score.
Proceedings of the 7th ACM Computer Science in Cars Symposium, 2023

Towards Efficient Data-Flow Test Data Generation.
Proceedings of the Theories of Programming and Formal Methods, 2023

Multi-target Backdoor Attacks for Code Pre-trained Models.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

Background-Mixed Augmentation for Weakly Supervised Change Detection.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Vulnerability Analysis, Robustness Verification, and Mitigation Strategy for Machine Learning-Based Power System Stability Assessment Model Under Adversarial Examples.
IEEE Trans. Smart Grid, 2022

Machine Learning Testing: Survey, Landscapes and Horizons.
IEEE Trans. Software Eng., 2022

A Systematic Assessment on Android Third-Party Library Detection Tools.
IEEE Trans. Software Eng., 2022

Research on Third-Party Libraries in Android Apps: A Taxonomy and Systematic Literature Review.
IEEE Trans. Software Eng., 2022

Why My App Crashes? Understanding and Benchmarking Framework-Specific Exceptions of Android Apps.
IEEE Trans. Software Eng., 2022

ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking.
IEEE Trans. Software Eng., 2022

Accessible or Not? An Empirical Investigation of Android App Accessibility.
IEEE Trans. Software Eng., 2022

SNIFF: Reverse Engineering of Neural Networks With Fault Attacks.
IEEE Trans. Reliab., 2022

SPI: Automated Identification of Security Patches via Commits.
ACM Trans. Softw. Eng. Methodol., 2022

ReCDroid+: Automated End-to-End Crash Reproduction from Bug Reports for Android Apps.
ACM Trans. Softw. Eng. Methodol., 2022

Towards Robustness of Deep Program Processing Models - Detection, Estimation, and Enhancement.
ACM Trans. Softw. Eng. Methodol., 2022

NPC: Neuron Path Coverage via Characterizing Decision Logic of Deep Neural Networks.
ACM Trans. Softw. Eng. Methodol., 2022

Breaking Neural Reasoning Architectures With Metamorphic Relation-Based Adversarial Examples.
IEEE Trans. Neural Networks Learn. Syst., 2022

Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack.
IEEE Trans. Multim., 2022

TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack.
IEEE Trans. Inf. Forensics Secur., 2022

FakeLocator: Robust Localization of GAN-Based Face Manipulations.
IEEE Trans. Inf. Forensics Secur., 2022

Oracle-Supported Dynamic Exploit Generation for Smart Contracts.
IEEE Trans. Dependable Secur. Comput., 2022

Byzantine-Resilient Decentralized Stochastic Gradient Descent.
IEEE Trans. Circuits Syst. Video Technol., 2022

Topology-Aware Differential Privacy for Decentralized Image Classification.
IEEE Trans. Circuits Syst. Video Technol., 2022

SafeOSL: Ensuring memory safety of C via ownership-based intermediate language.
Softw. Pract. Exp., 2022

Online adaptation for autonomous unmanned systems driven by requirements satisfaction model.
Softw. Syst. Model., 2022

Enriching query semantics for code search with reinforcement learning.
Neural Networks, 2022

Countering Malicious DeepFakes: Survey, Battleground, and Horizon.
Int. J. Comput. Vis., 2022

Characterizing usages, updates and risks of third-party libraries in Java projects.
Empir. Softw. Eng., 2022

A Survey of Smart Contract Formal Specification and Verification.
ACM Comput. Surv., 2022

Is Self-Attention Powerful to Learn Code Syntax and Semantics?
CoRR, 2022

GitFL: Adaptive Asynchronous Federated Learning using Version Control.
CoRR, 2022

FedCross: Towards Accurate Federated Learning via Multi-Model Cross Aggregation.
CoRR, 2022

Cargo Ecosystem Dependency-Vulnerability Knowledge Graph Construction and Vulnerability Propagation Study.
CoRR, 2022

A Tree-structured Transformer for Program Representation Learning.
CoRR, 2022

CommitBART: A Large Pre-trained Model for GitHub Commits.
CoRR, 2022

AixBench: A Code Generation Benchmark Dataset.
CoRR, 2022

Automatic Map Generation for Autonomous Driving System Testing.
CoRR, 2022

AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems.
CoRR, 2022

SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View.
CoRR, 2022

Modx: Binary Level Partial Imported Third-Party Library Detection through Program Modularization and Semantic Matching.
CoRR, 2022

An Executable Formal Model of the VHDL in Isabelle/HOL.
CoRR, 2022

Unveiling Project-Specific Bias in Neural Code Models.
CoRR, 2022

ALA: Adversarial Lightness Attack via Naturalness-aware Regularizations.
CoRR, 2022

Towards characterizing bug fixes through dependency-level changes in Apache Java open source projects.
Sci. China Inf. Sci., 2022

Learning Program Semantics with Code Representations: An Empirical Study.
Proceedings of the IEEE International Conference on Software Analysis, 2022

Fair and accurate age prediction using distribution aware data curation and augmentation.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022

RegexScalpel: Regular Expression Denial of Service (ReDoS) Defense by Localize-and-Fix.
Proceedings of the 31st USENIX Security Symposium, 2022

Tracking patches for open source software vulnerabilities.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

KUBO: a framework for automated efficacy testing of anti-virus behavioral detection with procedure-based malware emulation.
Proceedings of the 13th International Workshop on Automating Test Case Design, 2022

An Empirical Study of the Impact of COVID-19 on OSS Development.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

An Exploratory Study for GUI Posts on Stack Overflow.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

A<sup>3</sup>GAN: Attribute-Aware Anonymization Networks for Face De-identification.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Has My Release Disobeyed Semantic Versioning? Static Detection Based on Semantic Differencing.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Towards Understanding Third-party Library Dependency in C/C++ Ecosystem.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Towards Understanding the Faults of JavaScript-Based Deep Learning Systems.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Morest: Industry Practice of Automatic RESTful API Testing.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

TransRepair: Context-aware Program Repair for Compilation Errors.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

AUSERA: Automated Security Vulnerability Detection for Android Apps.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

Cross-lingual transfer learning for statistical type inference.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

ModX: Binary Level Partially Imported Third-Party Library Detection via Program Modularization and Semantic Matching.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Morest: Model-based RESTful API Testing with Execution Feedback.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Windranger: A Directed Greybox Fuzzer driven by Deviation Basic Blocks.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

A Formal Methodology for Verifying Side-Channel Vulnerabilities in Cache Architectures.
Proceedings of the Formal Methods and Software Engineering, 2022

Masked Faces with Faced Masks.
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022

Can You Spot the Chameleon? Adversarially Camouflaging Images from Co-Salient Object Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

More Secure Collaborative APIs resistant to Flush-Based Cache Attacks on Cortex-A9 Based Automotive System.
Proceedings of the Computer Science in Cars Symposium, 2022

On the (In)Security of Secure ROS2.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Vulnerability Assessment of Deep Reinforcement Learning Models for Power System Topology Optimization.
IEEE Trans. Smart Grid, 2021

Erratum to "Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search With Emulation".
IEEE Trans. Software Eng., 2021

Explaining Regressions via Alignment Slicing and Mending.
IEEE Trans. Software Eng., 2021

Mining Likely Analogical APIs Across Third-Party Libraries via Large-Scale Unsupervised API Semantics Embedding.
IEEE Trans. Software Eng., 2021

Why an Android App Is Classified as Malware: Toward Malware Classification Interpretation.
ACM Trans. Softw. Eng. Methodol., 2021

CSim<sup><i>2</i></sup>: Compositional Top-down Verification of Concurrent Systems using Rely-Guarantee.
ACM Trans. Program. Lang. Syst., 2021

Exploring the Effects of Blur and Deblurring to Visual Object Tracking.
IEEE Trans. Image Process., 2021

A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2021

Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis.
IEEE Trans. Inf. Forensics Secur., 2021

Text Backdoor Detection Using an Interpretable RNN Abstract Model.
IEEE Trans. Inf. Forensics Secur., 2021

Trace-Length Independent Runtime Monitoring of Quantitative Policies.
IEEE Trans. Dependable Secur. Comput., 2021

GUI-Squatting Attack: Automated Generation of Android Phishing Apps.
IEEE Trans. Dependable Secur. Comput., 2021

On Evaluating Fault Resilient Encoding Schemes in Software.
IEEE Trans. Dependable Secur. Comput., 2021

Guardauto: A Decentralized Runtime Protection System for Autonomous Driving.
IEEE Trans. Computers, 2021

A permission-dependent type system for secure information flow analysis.
J. Comput. Secur., 2021

An Isabelle/HOL Formalisation of the SPARC Instruction Set Architecture and the TSO Memory Model.
J. Autom. Reason., 2021

CoreGen: Contextualized Code Representation Learning for Commit Message Generation.
Neurocomputing, 2021

Advanced evasion attacks and mitigations on practical ML-based phishing website classifiers.
Int. J. Intell. Syst., 2021

Generalized Local Optimality for Video Steganalysis in Motion Vector Domain.
CoRR, 2021

Robust and Privacy-Preserving Collaborative Learning: A Comprehensive Survey.
CoRR, 2021

Boosting the Capability of Intelligent Vulnerability Detection by Training in a Human-Learning Manner.
CoRR, 2021

TRACER: Finding Patches for Open Source Software Vulnerabilities.
CoRR, 2021

A Survey on Scenario-Based Testing for Automated Driving Systems in High-Fidelity Simulation.
CoRR, 2021

Benchmarking Shadow Removal for Facial Landmark Detection and Beyond.
CoRR, 2021

AdvBokeh: Learning to Adversarially Defocus Blur.
CoRR, 2021

GraphSearchNet: Enhancing GNNs via Capturing Global Dependency for Semantic Code Search.
CoRR, 2021

GTG-Shapley: Efficient and Accurate Participant Contribution Evaluation in Federated Learning.
CoRR, 2021

SEC4SR: A Security Analysis Platform for Speaker Recognition.
CoRR, 2021

Research on Third-Party Libraries in AndroidApps: A Taxonomy and Systematic LiteratureReview.
CoRR, 2021

CarveNet: Carving Point-Block for Complex 3D Shape Completion.
CoRR, 2021

Cross-Lingual Adaptation for Type Inference.
CoRR, 2021

Enriching Query Semantics for Code Search with Reinforcement Learning.
CoRR, 2021

Sparta: Spatially Attentive and Adversarially Robust Activation.
CoRR, 2021

When NAS Meets Watermarking: Ownership Verification of DNN Models via Cache Side Channels.
CoRR, 2021

VIVA: Binary Level Vulnerability Identification via Partial Signature.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021

APICraft: Fuzz Driver Generation for Closed-source SDK Libraries.
Proceedings of the 30th USENIX Security Symposium, 2021

Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

An Investigation of Byzantine Threats in Multi-Robot Systems.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

JPGNet: Joint Predictive Filtering and Generative Network for Image Inpainting.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

AdvFilter: Predictive Perturbation-aware Filtering against Adversarial Attack via Multi-domain Learning.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

BIFF: Practical Binary Fuzzing Framework for Programs of IoT and Mobile Devices.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Systematic Testing of Autonomous Driving Systems Using Map Topology-Based Scenario Classification.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

A First Look at the Effect of Deep Learning in Coverage-guided Fuzzing.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Automatic HMI Structure Exploration Via Curiosity-Based Reinforcement Learning.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Collision Avoidance Testing for Autonomous Driving Systems on Complete Maps.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2021

Vall-nut: Principled Anti-Grey box - Fuzzing.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

Peeking into the Gray Area of Mobile World: An Empirical Study of Unlabeled Android Apps.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

A Unified Anomaly Detection Methodology for Lane-Following of Autonomous Driving Systems.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

AVA: Adversarial Vignetting Attack against Visual Recognition.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Automatic Web Testing Using Curiosity-Driven Reinforcement Learning.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Route Coverage Testing for Autonomous Vehicles via Map Modeling.
Proceedings of the IEEE International Conference on Robotics and Automation, 2021

RNNRepair: Automatic RNN Repair via Model-based Analysis.
Proceedings of the 38th International Conference on Machine Learning, 2021

Retrieval-Augmented Generation for Code Summarization via Hybrid GNN.
Proceedings of the 9th International Conference on Learning Representations, 2021

Learning to Adversarially Blur Visual Object Tracking.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Formal Analysis of Composable DeFi Protocols.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

Privacy-Preserving Collaborative Learning With Automatic Transformation Search.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Auto-Exposure Fusion for Single-Image Shadow Removal.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

SoFi: Reflection-Augmented Fuzzing for JavaScript Engines.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Temporal Watermarks for Deep Reinforcement Learning Models.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021

Stealing Deep Reinforcement Learning Models for Fun and Profit.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Decision-Guided Weighted Automata Extraction from Recurrent Neural Networks.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

EfficientDeRain: Learning Pixel-wise Dilation Filtering for High-Efficiency Single-Image Deraining.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
CANeleon: Protecting CAN Bus With Frame ID Chameleon.
IEEE Trans. Veh. Technol., 2020

METTLE: A METamorphic Testing Approach to Assessing and Validating Unsupervised Machine Learning Systems.
IEEE Trans. Reliab., 2020

Large-Scale Empirical Studies on Effort-Aware Security Vulnerability Prediction Methods.
IEEE Trans. Reliab., 2020

Information Theoretical Analysis of Unfair Rating Attacks Under Subjectivity.
IEEE Trans. Inf. Forensics Secur., 2020

BBB-CFI: Lightweight CFI Approach Against Code-Reuse Attacks Using Basic Block Information.
ACM Trans. Embed. Comput. Syst., 2020

Automated synthesis of local time requirement for service composition.
Softw. Syst. Model., 2020

Risk Management Framework for Machine Learning Security.
CoRR, 2020

SeqMobile: A Sequence Based Efficient Android Malware Detection System Using RNN on Mobile Devices.
CoRR, 2020

Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers.
CoRR, 2020

EfficientDeRain: Learning Pixel-wise Dilation Filtering for High-Efficiency Single-Image Deraining.
CoRR, 2020

Adversarial Exposure Attack on Diabetic Retinopathy Imagery.
CoRR, 2020

FakeRetouch: Evading DeepFakes Detection via the Guidance of Deliberate Noise.
CoRR, 2020

It's Raining Cats or Dogs? Adversarial Rain Attack on DNN Perception.
CoRR, 2020

The Hidden Vulnerability of Watermarking for Deep Neural Networks.
CoRR, 2020

Light Can Hack Your Face! Black-box Backdoor Attack on Face Recognition Systems.
CoRR, 2020

Fairness Matters - A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems.
CoRR, 2020

Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack.
CoRR, 2020

Contextualized Code Representation Learning for Commit Message Generation.
CoRR, 2020

Generating Adversarial Examples withControllable Non-transferability.
CoRR, 2020

Differentially Private Decentralized Learning.
CoRR, 2020

Automatic Code Summarization via Multi-dimensional Semantic Fusing in GNN.
CoRR, 2020

Stealing Deep Reinforcement Learning Models for Fun and Profit.
CoRR, 2020

Multi-IF : An Approach to Anomaly Detection in Self-Driving Systems.
CoRR, 2020

Why an Android App is Classified as Malware? Towards Malware Classification Interpretation.
CoRR, 2020

An Empirical Study on Benchmarks of Artificial Software Vulnerabilities.
CoRR, 2020

ABBA: Saliency-Regularized Motion-Based Adversarial Blur Attack.
CoRR, 2020

FakeLocator: Robust Localization of GAN-Based Face Manipulations via Semantic Segmentation Networks with Bells and Whistles.
CoRR, 2020

A distributed method to avoid higher-order deadlocks in multi-robot systems.
Autom., 2020

How Are Performance Issues Caused and Resolved?-An Empirical Study from a Design Perspective.
Proceedings of the ICPE '20: ACM/SPEC International Conference on Performance Engineering, 2020

CORE: Automating Review Recommendation for Code Changes.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

Automatic Hot Patch Generation for Android Kernels.
Proceedings of the 29th USENIX Security Symposium, 2020

MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.
Proceedings of the 29th USENIX Security Symposium, 2020

MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs.
Proceedings of the 29th USENIX Security Symposium, 2020

Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Watch out! Motion is Blurring the Vision of Your Deep Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Amora: Black-box Adversarial Morphing Attack.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

DeepRhythm: Exposing DeepFakes with Attentional Visual Heartbeat Rhythms.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Automated Third-Party Library Detection for Android Applications: Are We There Yet?
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementations.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Generating Concept based API Element Comparison Using a Knowledge Graph.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Audee: Automated Testing for Deep Learning Frameworks.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Marble: Model-based Robustness Analysis of Stateful Deep Learning Systems.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Cats Are Not Fish: Deep Learning Testing Calls for Out-Of-Distribution Awareness.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

How are Deep Learning Models Similar?: An Empirical Study on Clone Analysis of Deep Learning Software.
Proceedings of the ICPC '20: 28th International Conference on Program Comprehension, 2020

Patch based vulnerability matching for binary programs.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

An empirical study on ARM disassembly tools.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020

FakeSpotter: A Simple yet Robust Baseline for Spotting AI-Synthesized Fake Faces.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Generating Behavior-Diverse Game AIs with Evolutionary Multi-Objective Deep Reinforcement Learning.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Variable Precision Multi-granularity Rough Soft Sets Based on Multiple Thresholds.
Proceedings of the Learning Technologies and Systems, 2020

An Empirical Study of Usages, Updates and Risks of Third-Party Libraries in Java Projects.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

Source Code based On-demand Class Documentation Generation.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

Towards characterizing adversarial defects of deep learning software from the lens of uncertainty.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

MemLock: memory usage guided fuzzing.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Typestate-guided fuzzer for discovering use-after-free vulnerabilities.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

An empirical assessment of security risks of global Android banking apps.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Butterfly Space: An Architectural Approach for Investigating Performance Issues.
Proceedings of the 2020 IEEE International Conference on Software Architecture, 2020

DesignDiff: Continuously Modeling Software Design Difference from Code Revisions.
Proceedings of the 2020 IEEE International Conference on Software Architecture, 2020

Privacy-Aware UAV Flights through Self-Configuring Motion Planning.
Proceedings of the 2020 IEEE International Conference on Robotics and Automation, 2020

SeqMobile: An Efficient Sequence-Based Malware Detection System Using RNN on Mobile Devices.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

SPARK: Spatial-Aware Online Incremental Attack Against Visual Tracking.
Proceedings of the Computer Vision - ECCV 2020, 2020

Generating Adversarial Examples for Holding Robustness of Source Code Processing Models.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Stealthy and Efficient Adversarial Attacks against Deep Reinforcement Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Continuous Multiagent Control Using Collective Behavior Entropy for Large-Scale Home Energy Management.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
A Real-Time and Fully Distributed Approach to Motion Planning for Multirobot Systems.
IEEE Trans. Syst. Man Cybern. Syst., 2019

Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation.
IEEE Trans. Software Eng., 2019

Automatic Loop Summarization via Path Dependency Analysis.
IEEE Trans. Software Eng., 2019

Architecture-Based Behavioral Adaptation with Generated Alternatives and Relaxed Constraints.
IEEE Trans. Serv. Comput., 2019

Layered Object-Oriented Programming: Advanced VTable Reuse Attacks on Binary-Level Defense.
IEEE Trans. Inf. Forensics Secur., 2019

Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets.
IEEE Trans. Inf. Forensics Secur., 2019

Refinement-Based Specification and Security Analysis of Separation Kernels.
IEEE Trans. Dependable Secur. Comput., 2019

Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Automatic Detection and Repair Recommendation for Missing Checks.
J. Comput. Sci. Technol., 2019

A PSO-Based CEGAR Framework for Stochastic Model Checking.
Int. J. Softw. Eng. Knowl. Eng., 2019

Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks.
IACR Cryptol. ePrint Arch., 2019

A Countermeasure Against Statistical Ineffective Fault Analysis.
IACR Cryptol. ePrint Arch., 2019

What's Spain's Paris? Mining analogical libraries from Q&A discussions.
Empir. Softw. Eng., 2019

On embedding a hardware description language in Isabelle/HOL.
Des. Autom. Embed. Syst., 2019

Doublade: Unknown Vulnerability Detection in Smart Contracts Via Abstract Signature Matching and Refined Detection Rules.
CoRR, 2019

Amora: Black-box Adversarial Morphing Attack.
CoRR, 2019

Spatial-aware Online Adversarial Perturbations Against Visual Object Tracking.
CoRR, 2019

Oracle-Supported Dynamic Exploit Generation for Smart Contracts.
CoRR, 2019

FakeSpotter: A Simple Baseline for Spotting AI-Synthesized Fake Faces.
CoRR, 2019

A formalisation of the SPARC TSO memory model for multi-core machine code.
CoRR, 2019

Securing android applications via edge assistant third-party library detection.
Comput. Secur., 2019

How security bugs are fixed and what can be improved: an empirical study with Mozilla.
Sci. China Inf. Sci., 2019

DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

Locating vulnerabilities in binaries via memory layout recovering.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Generating query-specific class API summaries.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Cerebro: context-aware adaptive fuzzing for effective vulnerability detection.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

DeepStellar: model-based quantitative analysis of stateful deep learning systems.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement Learning.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Coverage-Guided Fuzzing for Feedforward Neural Networks.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

DeepMutation++: A Mutation Testing Framework for Deep Learning Systems.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and Platforms.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

A Quantitative Analysis Framework for Recurrent Neural Network.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

DeepHunter: a coverage-guided fuzz testing framework for deep neural networks.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

DiffChaser: Detecting Disagreements for Deep Neural Networks.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Learning Performance Optimization from Code Changes for Android Apps.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

ReCDroid: automatically reproducing Android application crashes from bug reports.
Proceedings of the 41st International Conference on Software Engineering, 2019

Localized or architectural: an empirical study of performance issues dichotomy.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Vultron: catching vulnerable smart contracts once and for all.
Proceedings of the 41st International Conference on Software Engineering: New Ideas and Emerging Results, 2019

Superion: grammar-aware greybox fuzzing.
Proceedings of the 41st International Conference on Software Engineering, 2019

A large-scale empirical study on industrial fake apps.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, 2019

Leopard: identifying vulnerable code for vulnerability assessment through program metrics.
Proceedings of the 41st International Conference on Software Engineering, 2019

StoryDroid: automated generation of storyboard for Android apps.
Proceedings of the 41st International Conference on Software Engineering, 2019

A Performance-Sensitive Malware Detection System on Mobile Platform.
Proceedings of the Formal Methods and Software Engineering, 2019

Secure Deep Learning Engineering: A Road Towards Quality Assurance of Intelligent Systems.
Proceedings of the Formal Methods and Software Engineering, 2019

Safe Inputs Approximation for Black-Box Systems.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

A Formally Verified Buddy Memory Allocation Model.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

The Seventh Visual Object Tracking VOT2019 Challenge Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019

A Parametric Rely-Guarantee Reasoning Framework for Concurrent Reactive Systems.
Proceedings of the Formal Methods - The Next 30 Years - Third World Congress, 2019

2018
Towards Model Checking Android Applications.
IEEE Trans. Software Eng., 2018

A Formal Specification and Verification Framework for Timed Security Protocols.
IEEE Trans. Software Eng., 2018

Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms.
IACR Cryptol. ePrint Arch., 2018

Fault Resilient Encoding Schemes in Software: How Far Can We Go?
IACR Cryptol. ePrint Arch., 2018

A UTP semantics for communicating processes with shared variables and its formal encoding in PVS.
Formal Aspects Comput., 2018

A multi-view context-aware approach to Android malware detection and malicious code localization.
Empir. Softw. Eng., 2018

DroidEcho: an in-depth dissection of malicious behaviors in Android applications.
Cybersecur., 2018

DeepCruiser: Automated Guided Testing for Stateful Deep Learning Systems.
CoRR, 2018

An Orchestrated Empirical Study on Deep Learning Frameworks and Platforms.
CoRR, 2018

An Event-based Compositional Reasoning Approach for Concurrent Reactive Systems.
CoRR, 2018

Secure Deep Learning Engineering: A Software Quality Assurance Perspective.
CoRR, 2018

Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer.
CoRR, 2018

Coverage-Guided Fuzzing for Deep Neural Networks.
CoRR, 2018

A Validation and Quality Assessment Method with Metamorphic Relations for Unsupervised Machine Learning Software.
CoRR, 2018

Combinatorial Testing for Deep Learning Systems.
CoRR, 2018

AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps.
CoRR, 2018

K-Rust: An Executable Formal Semantics for Rust.
CoRR, 2018

Executable Operational Semantics of Solidity.
CoRR, 2018

Towards Efficient Data-flow Test Data Generation.
CoRR, 2018

DeepGauge: Comprehensive and Multi-Granularity Testing Criteria for Gauging the Robustness of Deep Learning Systems.
CoRR, 2018

ROPSentry: Runtime defense against ROP attacks using hardware performance counters.
Comput. Secur., 2018

Anti-chain based algorithms for timed/probabilistic refinement checking.
Sci. China Inf. Sci., 2018

A distributed approach to robust control of multi-robot systems.
Autom., 2018

Are mobile banking apps secure? what can be improved?
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

FOT: a versatile, configurable, extensible fuzzing framework.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

DeepGauge: multi-granularity testing criteria for deep learning systems.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Tell them apart: distilling technology differences from crowd-scale comparison discussions.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

ClDiff: generating concise linked code differences.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Efficiently manifesting asynchronous programming errors in Android apps.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

DeepMutation: Mutation Testing of Deep Learning Systems.
Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering, 2018

DangDone: Eliminating Dangling Pointers via Intermediate Pointers.
Proceedings of the Tenth Asia-Pacific Symposium on Internetware, 2018

Vanguard: Detecting Missing Checks for Prognosing Potential Vulnerabilities.
Proceedings of the Tenth Asia-Pacific Symposium on Internetware, 2018

A Novel System for Fingerprint Orientation Estimation.
Proceedings of the Image and Graphics Technologies and Applications, 2018

Automatic Generation of API Documentations for Open-Source Projects.
Proceedings of the IEEE Third International Workshop on Dynamic Software Documentation, 2018

Detecting missing checks for identifying insufficient attack protections.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Large-scale analysis of framework-specific exceptions in Android apps.
Proceedings of the 40th International Conference on Software Engineering, 2018

From UI design image to GUI skeleton: a neural machine translator to bootstrap mobile GUI implementation.
Proceedings of the 40th International Conference on Software Engineering, 2018

Speedoo: prioritizing performance optimization opportunities.
Proceedings of the 40th International Conference on Software Engineering, 2018

Apk2vec: Semi-Supervised Multi-view Representation Learning for Profiling Android Applications.
Proceedings of the IEEE International Conference on Data Mining, 2018

SGXlinger: A New Side-Channel Attack Vector Based on Interrupt Latency Against Enclave Execution.
Proceedings of the 36th IEEE International Conference on Computer Design, 2018

OrieNet: A Regression System for Latent Fingerprint Orientation Field Extraction.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2018, 2018

An Original Neural Network for Pulmonary Tuberculosis Diagnosis in Radiographs.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2018, 2018

Compositional Reasoning for Shared-Variable Concurrent Programs.
Proceedings of the Formal Methods - 22nd International Symposium, 2018

A Permission-Dependent Type System for Secure Information Flow Analysis.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

Hawkeye: Towards a Desired Directed Grey-box Fuzzer.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Practical Fault Attack on Deep Neural Networks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Collision and Deadlock Avoidance in Multirobot Systems: A Distributed Approach.
IEEE Trans. Syst. Man Cybern. Syst., 2017

Detecting Bugs of Concurrent Programs With Program Invariants.
IEEE Trans. Reliab., 2017

Battery-Aware Mobile Data Service.
IEEE Trans. Mob. Comput., 2017

Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique.
IEEE Trans. Inf. Forensics Secur., 2017

Context-Aware, Adaptive, and Scalable Android Malware Detection Through Online Learning.
IEEE Trans. Emerg. Top. Comput. Intell., 2017

By the Community & For the Community: A Deep Learning Approach to Assist Collaborative Editing in Q&A Sites.
Proc. ACM Hum. Comput. Interact., 2017

AndroVault: Constructing Knowledge Graph from Millions of Android Apps for Automated Analysis.
CoRR, 2017

High-Assurance Separation Kernels: A Survey on Formal Methods.
CoRR, 2017

graph2vec: Learning Distributed Representations of Graphs.
CoRR, 2017

Context-aware, Adaptive and Scalable Android Malware Detection through Online Learning (extended version).
CoRR, 2017

CSimpl: A Rely-Guarantee-Based Framework for Verifying Concurrent Programs.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2017

Skyfire: Data-Driven Seed Generation for Fuzzing.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Loopster: static loop termination analysis.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Guided, stochastic model-based GUI testing of Android apps.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Steelix: program-state based binary fuzzing.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

FiB: squeezing loop invariants by interpolation between Forward/Backward predicate transformers.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Mining implicit design templates for actionable code reuse.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Proof Tactics for Assertions in Separation Logic.
Proceedings of the Interactive Theorem Proving - 8th International Conference, 2017

SPAIN: security patch analysis for binaries towards understanding the pain and pills.
Proceedings of the 39th International Conference on Software Engineering, 2017

Feedback-based debugging.
Proceedings of the 39th International Conference on Software Engineering, 2017

A distributed approach to automated manufacturing systems with complex structures using Petri nets.
Proceedings of the 2017 IEEE International Conference on Robotics and Automation, 2017

Static and dynamic partitions of inequalities and their application in supervisor simplification.
Proceedings of the 2017 IEEE International Conference on Robotics and Automation, 2017

A Verification Framework for Stateful Security Protocols.
Proceedings of the Formal Methods and Software Engineering, 2017

No-Jump-into-Basic-Block: Enforce Basic Block CFI on the Fly for Real-world Binaries.
Proceedings of the 54th Annual Design Automation Conference, 2017

A robust control approach to automated manufacturing systems allowing failures and reworks with Petri nets.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Decentralized supervisory control of Generalized Mutual Exclusion Constraints in Petri Nets.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

Robust control of automated manufacturing systems with complex structures using Petri Nets.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

2016
A Fine-Grained Control Flow Integrity Approach Against Runtime Memory Attacks for Embedded Systems.
IEEE Trans. Very Large Scale Integr. Syst., 2016

Formal Specification and Analysis of Partitioning Operating Systems by Integrating Ontology and Refinement.
IEEE Trans. Ind. Informatics, 2016

Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware.
IEEE Trans. Inf. Forensics Secur., 2016

Improved EGT-Based Robustness Analysis of Negotiation Strategies in Multiagent Systems via Model Checking.
IEEE Trans. Hum. Mach. Syst., 2016

Polynomially Complex Synthesis of Distributed Supervisors for Large-Scale AMSs Using Petri Nets.
IEEE Trans. Control. Syst. Technol., 2016

Supervisor Simplification in FMSs: Comparative Studies and New Results Using Petri Nets.
IEEE Trans. Control. Syst. Technol., 2016

Verifying a quantitative relaxation of linearizability via refinement.
Int. J. Softw. Tools Technol. Transf., 2016

Formalizing and verifying stochastic system architectures using Monterey Phoenix.
Softw. Syst. Model., 2016

ProMoca: Probabilistic Modeling and Analysis of Agents in Commitment Protocols.
J. Artif. Intell. Res., 2016

Compositional Reasoning for Shared-variable Concurrent Programs.
CoRR, 2016

subgraph2vec: Learning Distributed Representations of Rooted Sub-graphs from Large Graphs.
CoRR, 2016

IBED: Combining IBEA and DE for optimal feature selection in software product line engineering.
Appl. Soft Comput., 2016

A formal model for the SPARCv8 ISA and a proof of non-interference for the LEON3 processor.
Arch. Formal Proofs, 2016

Reasoning About Information Flow Security of Separation Kernels with Channel-Based Communication.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2016

Prospective memory aid reminder system design for group tasks.
Proceedings of the 10th International Conference on Software, 2016

Proteus: computing disjunctive loop summary via path dependency analysis.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

BinGo: cross-architecture cross-OS binary search.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Detecting Bugs of Concurrent Programs with Program Invariants.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

Semantic modelling of Android malware for effective malware comprehension, detection, and classification.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

Online malware defense using attack behavior model.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

Contextual Weisfeiler-Lehman graph kernel for malware detection.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

Adaptive and scalable Android malware detection through online learning.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

How to Use Information Theory to Mitigate Unfair Rating Attacks.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

Limitations on Robust Ratings and Predictions.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

Optimizing selection of competing services with probabilistic hierarchical refinement.
Proceedings of the 38th International Conference on Software Engineering, 2016

Generating performance distributions via probabilistic symbolic execution.
Proceedings of the 38th International Conference on Software Engineering, 2016

Robust control of automated manufacturing systems with assembly operations using petri nets.
Proceedings of the 2016 IEEE International Conference on Robotics and Automation, 2016

Scaling BDD-based Timed Verification with Simulation Reduction.
Proceedings of the Formal Methods and Software Engineering, 2016

Automated Requirements Validation for ATP Software via Specification Review and Testing.
Proceedings of the Formal Methods and Software Engineering, 2016

Service Adaptation with Probabilistic Partial Models.
Proceedings of the Formal Methods and Software Engineering, 2016

Concurrent On-the-Fly SCC Detection for Automata-Based Model Checking with Fairness Assumption.
Proceedings of the 21st International Conference on Engineering of Complex Computer Systems, 2016

Prospective memory aid: A reminding model based on Fuzzy Cognitive Maps.
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016

An Executable Formalisation of the SPARCv8 Instruction Set Architecture: A Case Study for the LEON3 Processor.
Proceedings of the FM 2016: Formal Methods, 2016

Critical stages and their application in large scale automated manufacturing systems via Petri nets.
Proceedings of the 15th European Control Conference, 2016

Robust Real-Time Human Perception with Depth Camera.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016

GPU-Accelerated Value Iteration for the Computation of Reachability Probabilities in MDPs.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016

Mystique: Evolving Android Malware for Auditing Anti-Malware Tools.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Critical stages and their identification in large scale automated manufacturing systems via Petri nets.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2016

A Language for Trust Modelling.
Proceedings of the 18th International Workshop on Trust in Agent Societies co-located with the 15th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2016), 2016

Is It Harmful When Advisors Only Pretend to Be Honest?
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
A Systematic Study on Explicit-State Non-Zenoness Checking for Timed Automata.
IEEE Trans. Software Eng., 2015

Supervisor Synthesis and Performance Improvement for Automated Manufacturing Systems by Using Petri Nets.
IEEE Trans. Ind. Informatics, 2015

Maximally Permissive Distributed Control of Large Scale Automated Manufacturing Systems Modeled With Petri Nets.
IEEE Trans. Control. Syst. Technol., 2015

Collaborative Security: A Survey and Taxonomy.
ACM Comput. Surv., 2015

Automated Agent Behavior Construction for Protocol-Based Multiagent Systems.
Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2015

Fast Relative-Error Approximation Algorithm for Ridge Regression.
Proceedings of the Thirty-First Conference on Uncertainty in Artificial Intelligence, 2015

Formal Analysis of MAC in IEEE 802.11p with Probabilistic Model Checking.
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015

Event and Strategy Analytics.
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015

TLV: abstraction through testing, learning, and validation.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Formalizing and verifying stochastic system architectures using Monterey Phoenix (SoSyM abstract).
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

Interpolation Guided Compositional Verification (T).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

Detection and classification of malicious JavaScript via attack behavior modelling.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

S-looper: automatic summarization for multipath string loops.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Optimizing selection of competing features via feedback-directed evolutionary algorithms.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Reliability assessment for distributed systems via communication abstraction and refinement.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Event-based formalization of safety-critical operating system standards: An experience report on ARINC 653 using Event-B.
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015

Quantifying Robustness of Trust Systems against Collusive Unfair Rating Attacks Using Information Theory.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

An Adaptive Markov Strategy for Effective Network Intrusion Detection.
Proceedings of the 27th IEEE International Conference on Tools with Artificial Intelligence, 2015

Supervisor design and simplification for Automated Manufacturing Systems using colored Petri nets.
Proceedings of the IEEE International Conference on Robotics and Automation, 2015

Supervisors and their simplification in automated manufacturing systems via Petri nets.
Proceedings of the IEEE International Conference on Robotics and Automation, 2015

GPU Accelerated On-the-Fly Reachability Checking.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

Verifying FreeRTOS' Cyclic Doubly Linked List Implementation: From Abstract Specification to Machine Code.
Proceedings of the 20th International Conference on Engineering of Complex Computer Systems, 2015

Verifying Parameterized Timed Security Protocols.
Proceedings of the FM 2015: Formal Methods, 2015

Trace-Length Independent Runtime Monitoring of Quantitative Policies in LTL.
Proceedings of the FM 2015: Formal Methods, 2015

JSDC: A Hybrid Approach for JavaScript Malware Detection and Classification.
Proceedings of the 10th ACM Symposium on Information, 2015

A Petri net-based distributed control of automated manufacturing systems with assembly operations.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2015

Robust supervisor synthesis for automated manufacturing systems using Petri nets.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2015

Using Information Theory to Improve the Robustness of Trust Systems.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

The Fallacy of Endogenous Discounting of Trust Recommendations.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Automated Analysis of Commitment Protocols Using Probabilistic Model Checking.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Learning Assumptions for CompositionalVerification of Timed Systems.
IEEE Trans. Software Eng., 2014

Towards Formal Modelling and Verification of Pervasive Computing Systems.
Trans. Comput. Collect. Intell., 2014

Supervisor Simplification for AMS Based on Petri Nets and Inequality Analysis.
IEEE Trans Autom. Sci. Eng., 2014

Parameter synthesis for hierarchical concurrent real-time systems.
Real Time Syst., 2014

Practice and Evaluation of Pagelet-Based Client-Side Rendering Mechanism.
IEICE Trans. Inf. Syst., 2014

Complexity of the Soundness Problem of Workflow Nets.
Fundam. Informaticae, 2014

Model checking approach to automated planning.
Formal Methods Syst. Des., 2014

Model checking with fairness assumptions using PAT.
Frontiers Comput. Sci., 2014

Towards verification of computation orchestration.
Formal Aspects Comput., 2014

Stateful Security Protocol Verification.
CoRR, 2014

Automated runtime recovery for QoS-based service composition.
Proceedings of the 23rd International World Wide Web Conference, 2014

Towards Robust and Effective Trust Management for Security: A Survey.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Are Timed Automata Bad for a Specification Language? Language Inclusion Checking for Timed Automata.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2014

Automatic Verification for Later-Correspondence of Security Protocols.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2014

RaPiD: a toolkit for reliability analysis of non-deterministic systems.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014

Automatic early defects detection in use case documents.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

Reconfigurable Dynamic Trusted Platform Module for Control Flow Checking.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014

On Robustness of Trust Systems.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Event Analytics.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2014, 2014

Clonepedia: Summarizing Code Clones by Common Syntactic Context for Software Maintenance.
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014

Detecting differences across multiple instances of code clones.
Proceedings of the 36th International Conference on Software Engineering, 2014

VeriWS: a tool for verification of combined functional and non-functional requirements of web service composition.
Proceedings of the 36th International Conference on Software Engineering, 2014

Distributed supervisor synthesis for automated manufacturing systems using Petri nets.
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

GPU Accelerated Counterexample Generation in LTL Model Checking.
Proceedings of the Formal Methods and Software Engineering, 2014

TAuth: Verifying Timed Security Protocols.
Proceedings of the Formal Methods and Software Engineering, 2014

Practical Analysis Framework for Software-Based Attestation Scheme.
Proceedings of the Formal Methods and Software Engineering, 2014

SCC-Based Improved Reachability Analysis for Markov Decision Processes.
Proceedings of the Formal Methods and Software Engineering, 2014

Symbolic Analysis of an Electric Vehicle Charging Protocol.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

Formal Verification of Operational Transformation.
Proceedings of the FM 2014: Formal Methods, 2014

MDP-Based Reliability Analysis of an Ambient Assisted Living System.
Proceedings of the FM 2014: Formal Methods, 2014

TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms.
Proceedings of the FM 2014: Formal Methods, 2014

Diamonds Are a Girl's Best Friend: Partial Order Reduction for Timed Automata with Abstractions.
Proceedings of the Computer Aided Verification - 26th International Conference, 2014

Simplifying supervisory controllers of automated manufacturing systems via Petri net modeling and multiset analysis.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

A comparative approach to supervisor simplification in automated manufacturing systems using Petri nets.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

Towards a Combination of CafeOBJ and PAT.
Proceedings of the Specification, Algebra, and Software, 2014

PeCAn: Compositional Verification of Petri Nets Made Easy.
Proceedings of the Automated Technology for Verification and Analysis, 2014

An extensive model checking framework for multi-agent systems.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

2013
Verifying Linearizability via Optimized Refinement Checking.
IEEE Trans. Software Eng., 2013

Modeling and verifying hierarchical real-time systems using stateful timed CSP.
ACM Trans. Softw. Eng. Methodol., 2013

State Space Reduction for Sensor Networks Using Two-Level Partial Order Reduction.
Proceedings of the Verification, 2013

USMMC: a self-contained model checker for UML state machines.
Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2013

Towards Formal Modeling and Verification of Cloud Architectures: A Case Study on Hadoop.
Proceedings of the IEEE Ninth World Congress on Services, 2013

AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Constraint-based automatic symmetry detection.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

TzuYu: Learning stateful typestates.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Automatically partition software into least privilege components using dynamic data dependency analysis.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Combining model checking and testing with an application to reliability prediction and distribution.
Proceedings of the International Symposium on Software Testing and Analysis, 2013

Improved Reachability Analysis in DTMC via Divide and Conquer.
Proceedings of the Integrated Formal Methods, 10th International Conference, 2013

A Formal Semantics for Complete UML State Machines with Communications.
Proceedings of the Integrated Formal Methods, 10th International Conference, 2013

Message from ESSS 2013 Workshop Co-chairs.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Dynamic synthesis of local time requirement for service composition.
Proceedings of the 35th International Conference on Software Engineering, 2013

Build your own model checker in one month.
Proceedings of the 35th International Conference on Software Engineering, 2013

Improving Model Checking Stateful Timed CSP with non-Zenoness through Clock-Symmetry Reduction.
Proceedings of the Formal Methods and Software Engineering, 2013

A UTP Semantics for Communicating Processes with Shared Variables.
Proceedings of the Formal Methods and Software Engineering, 2013

vTRUST: A Formal Modeling and Verification Framework for Virtualization Systems.
Proceedings of the Formal Methods and Software Engineering, 2013

Verification of Functional and Non-functional Requirements of Web Service Composition.
Proceedings of the Formal Methods and Software Engineering, 2013

TTM/PAT: Specifying and Verifying Timed Transition Models.
Proceedings of the Formal Techniques for Safety-Critical Systems, 2013

PSyHCoS: Parameter Synthesis for Hierarchical Concurrent Real-Time Systems.
Proceedings of the Computer Aided Verification - 25th International Conference, 2013

Supervisor synthesis and performance improvement for automated manufacturing systems by using Petri nets.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

CELL: A Compositional Verification Framework.
Proceedings of the Automated Technology for Verification and Analysis, 2013

Multi-core Model Checking Algorithms for LTL Verification with Fairness Assumptions.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

2012
Timed Automata.
Proceedings of the Handbook of Finite State Based Models and Applications., 2012

Formal modeling and validation of Stateflow diagrams.
Int. J. Softw. Tools Technol. Transf., 2012

SeVe: automatic tool for verification of security protocols.
Frontiers Comput. Sci. China, 2012

Planning as Model Checking Tasks.
Proceedings of the 35th Annual IEEE Software Engineering Workshop, 2012

Probabilistic Model Checking Multi-agent Behaviors in Dispersion Games Using Counter Abstraction.
Proceedings of the PRIMA 2012: Principles and Practice of Multi-Agent Systems, 2012

Analyzing multi-agent systems with probabilistic model checking approach.
Proceedings of the 34th International Conference on Software Engineering, 2012

More Anti-chain Based Refinement Checking.
Proceedings of the Formal Methods and Software Engineering, 2012

An Analytical and Experimental Comparison of CSP Extensions and Tools.
Proceedings of the Formal Methods and Software Engineering, 2012

Symbolic Model-Checking of Stateful Timed CSP Using BDD and Digitization.
Proceedings of the Formal Methods and Software Engineering, 2012

Automatic Generation of Provably Correct Embedded Systems.
Proceedings of the Formal Methods and Software Engineering, 2012

Formal Analysis of Pervasive Computing Systems.
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012

Translating PDDL into CSP# - The PAT Approach.
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012

Model Checking Software Architecture Design.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

Improved BDD-Based Discrete Analysis of Timed Systems.
Proceedings of the FM 2012: Formal Methods, 2012

Automatic Compositional Verification of Timed Systems.
Proceedings of the FM 2012: Formal Methods, 2012

A Model Checker for Hierarchical Probabilistic Real-Time Systems.
Proceedings of the Computer Aided Verification - 24th International Conference, 2012

Using Monterey Phoenix to Formalize and Verify System Architectures.
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012

Complexity of the Soundness Problem of Bounded Workflow Nets.
Proceedings of the Application and Theory of Petri Nets - 33rd International Conference, 2012

2011
Towards bug-free implementation for wireless sensor networks.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011

A model checking framework for hierarchical systems.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

PAT 3: An Extensible Architecture for Building Multi-domain Model Checkers.
Proceedings of the IEEE 22nd International Symposium on Software Reliability Engineering, 2011

Towards a Model Checker for NesC and Wireless Sensor Networks.
Proceedings of the Formal Methods and Software Engineering, 2011

Differencing Labeled Transition Systems.
Proceedings of the Formal Methods and Software Engineering, 2011

Verification of Orchestration Systems Using Compositional Partial Order Reduction.
Proceedings of the Formal Methods and Software Engineering, 2011

PRTS: An Approach for Model Checking Probabilistic Real-Time Hierarchical Systems.
Proceedings of the Formal Methods and Software Engineering, 2011

On Combining State Space Reductions with Global Fairness Assumptions.
Proceedings of the FM 2011: Formal Methods, 2011

An Efficient Algorithm for Learning Event-Recording Automata.
Proceedings of the Automated Technology for Verification and Analysis, 2011

2010
Modeling and Analyzing Timed Security Protocols Using Extended Timed CSP.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

An Automatic Approach to Model Checking UML State Machines.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Model Checking a Lazy Concurrent List-Based Set Algorithm.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Discovering Anomalies in Semantic Web Rules.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Analyzing hierarchical complex real-time systems.
Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2010

SpecDiff: debugging formal specifications.
Proceedings of the ASE 2010, 2010

Model Checking Hierarchical Probabilistic Systems.
Proceedings of the Formal Methods and Software Engineering, 2010

Model Checking a Model Checker: A Code Contract Combined Approach.
Proceedings of the Formal Methods and Software Engineering, 2010

Developing Model Checkers Using PAT.
Proceedings of the Automated Technology for Verification and Analysis, 2010

Model-Based Methods for Linking Web Service Choreography and Orchestration.
Proceedings of the 17th Asia Pacific Software Engineering Conference, 2010

2009
Integrating Specification and Programs for System Modeling and Verification.
Proceedings of the TASE 2009, 2009

Verification of Population Ring Protocols in PAT.
Proceedings of the TASE 2009, 2009

Formal Verification of Scalable NonZero Indicators.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

Verifying Stateful Timed CSP Using Implicit Clocks and Zone Abstraction.
Proceedings of the Formal Methods and Software Engineering, 2009

Scalable Multi-core Model Checking Fairness Enhanced Systems.
Proceedings of the Formal Methods and Software Engineering, 2009

Fair Model Checking with Process Counter Abstraction.
Proceedings of the FM 2009: Formal Methods, 2009

Model Checking Linearizability via Refinement.
Proceedings of the FM 2009: Formal Methods, 2009

PAT: Towards Flexible Verification under Fairness.
Proceedings of the Computer Aided Verification, 21st International Conference, 2009

2008
Compositional encoding for bounded model checking.
Frontiers Comput. Sci. China, 2008

Bounded Model Checking of Compositional Processes.
Proceedings of the Second IEEE/IFIP International Symposium on Theoretical Aspects of Software Engineering, 2008

Model Checking CSP Revisited: Introducing a Process Analysis Toolkit.
Proceedings of the Leveraging Applications of Formal Methods, 2008

An analyzer for extended compositional process algebras.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

Specifying and Verifying Event-Based Fairness Enhanced Systems.
Proceedings of the Formal Methods and Software Engineering, 2008

2006
Verification of Computation Orchestration Via Timed Automata.
Proceedings of the Formal Methods and Software Engineering, 2006

2005
Algorithmic Design Using Object-Z for Twig XML Queries Evaluation.
Proceedings of the International Workshop on Web Languages and Formal Methods, 2005


  Loading...