Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Fu Song
@article{DBLP:journals/pacmpl/SunSCC24, author = {Pu Sun and Fu Song and Yuqi Chen and Taolue Chen}, title = {EasyBC: {A} Cryptography-Specific Language for Security Analysis of Block Ciphers against Differential Cryptanalysis}, journal = {Proc. {ACM} Program. Lang.}, volume = {8}, number = {{POPL}}, pages = {848--881}, year = {2024}, url = {https://doi.org/10.1145/3632871}, doi = {10.1145/3632871}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/SunSCC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/ZhaoCLLSWS24, author = {Zhe Zhao and Guangke Chen and Tong Liu and Taishan Li and Fu Song and Jingyi Wang and Jun Sun}, title = {Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {33}, number = {3}, pages = {68:1--68:45}, year = {2024}, url = {https://doi.org/10.1145/3631977}, doi = {10.1145/3631977}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/ZhaoCLLSWS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/GaoSC24, author = {Pengfei Gao and Fu Song and Taolue Chen}, title = {Compositional Verification of First-Order Masking Countermeasures against Power Side-Channel Attacks}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {33}, number = {3}, pages = {79:1--79:38}, year = {2024}, url = {https://doi.org/10.1145/3635707}, doi = {10.1145/3635707}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/GaoSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-09964, author = {Zhensu Sun and Xiaoning Du and Fu Song and Shangwen Wang and Li Li}, title = {When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference}, journal = {CoRR}, volume = {abs/2401.09964}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.09964}, doi = {10.48550/ARXIV.2401.09964}, eprinttype = {arXiv}, eprint = {2401.09964}, timestamp = {Fri, 02 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-09964.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-17133, author = {Guangke Chen and Yedi Zhang and Fu Song and Ting Wang and Xiaoning Du and Yang Liu}, title = {A Proactive and Dual Prevention Mechanism against Illegal Song Covers empowered by Singing Voice Conversion}, journal = {CoRR}, volume = {abs/2401.17133}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.17133}, doi = {10.48550/ARXIV.2401.17133}, eprinttype = {arXiv}, eprint = {2401.17133}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-17133.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-13506, author = {Luwei Cai and Fu Song and Taolue Chen}, title = {Towards Efficient Verification of Constant-Time Cryptographic Implementations}, journal = {CoRR}, volume = {abs/2402.13506}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.13506}, doi = {10.48550/ARXIV.2402.13506}, eprinttype = {arXiv}, eprint = {2402.13506}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-13506.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/SunCFGSY23, author = {Pu Sun and Sen Chen and Lingling Fan and Pengfei Gao and Fu Song and Min Yang}, title = {VenomAttack: automated and adaptive activity hijacking in Android}, journal = {Frontiers Comput. Sci.}, volume = {17}, number = {1}, pages = {171801}, year = {2023}, url = {https://doi.org/10.1007/s11704-021-1126-x}, doi = {10.1007/S11704-021-1126-X}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/SunCFGSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/GaoZSCS23, author = {Pengfei Gao and Yedi Zhang and Fu Song and Taolue Chen and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks}, journal = {Proc. {ACM} Program. Lang.}, volume = {7}, number = {{OOPSLA2}}, pages = {1817--1847}, year = {2023}, url = {https://doi.org/10.1145/3622862}, doi = {10.1145/3622862}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/GaoZSCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenZSCFWW23, author = {Guangke Chen and Zhe Zhao and Fu Song and Sen Chen and Lingling Fan and Feng Wang and Jiashui Wang}, title = {Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {5}, pages = {3970--3987}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3220673}, doi = {10.1109/TDSC.2022.3220673}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ChenZSCFWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/ZhangZCSC23, author = {Yedi Zhang and Zhe Zhao and Guangke Chen and Fu Song and Taolue Chen}, title = {Precise Quantitative Analysis of Binarized Neural Networks: {A} BDD-based Approach}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {32}, number = {3}, pages = {62:1--62:51}, year = {2023}, url = {https://doi.org/10.1145/3563212}, doi = {10.1145/3563212}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/ZhangZCSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atva/TaoLSLWZ23, author = {Ye Tao and Wanwei Liu and Fu Song and Zhen Liang and Ji Wang and Hongxu Zhu}, editor = {{\'{E}}tienne Andr{\'{e}} and Jun Sun}, title = {An Automata-Theoretic Approach to Synthesizing Binarized Neural Networks}, booktitle = {Automated Technology for Verification and Analysis - 21st International Symposium, {ATVA} 2023, Singapore, October 24-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14215}, pages = {380--400}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45329-8\_18}, doi = {10.1007/978-3-031-45329-8\_18}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atva/TaoLSLWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/LiuSC23, author = {Mingyang Liu and Fu Song and Taolue Chen}, editor = {Constantin Enea and Akash Lal}, title = {Automated Verification of Correctness for Masked Arithmetic Programs}, booktitle = {Computer Aided Verification - 35th International Conference, {CAV} 2023, Paris, France, July 17-22, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13966}, pages = {255--280}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37709-9\_13}, doi = {10.1007/978-3-031-37709-9\_13}, timestamp = {Tue, 12 Sep 2023 07:57:21 +0200}, biburl = {https://dblp.org/rec/conf/cav/LiuSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ZhangSS23, author = {Yedi Zhang and Fu Song and Jun Sun}, editor = {Constantin Enea and Akash Lal}, title = {QEBVerif: Quantization Error Bound Verification of Neural Networks}, booktitle = {Computer Aided Verification - 35th International Conference, {CAV} 2023, Paris, France, July 17-22, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13965}, pages = {413--437}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37703-7\_20}, doi = {10.1007/978-3-031-37703-7\_20}, timestamp = {Tue, 12 Sep 2023 07:57:21 +0200}, biburl = {https://dblp.org/rec/conf/cav/ZhangSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/WangBS23, author = {Limin Wang and Lei Bu and Fu Song}, title = {SCAGuard: Detection and Classification of Cache Side-Channel Attacks via Attack Behavior Modeling and Similarity Comparison}, booktitle = {60th {ACM/IEEE} Design Automation Conference, {DAC} 2023, San Francisco, CA, USA, July 9-13, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DAC56929.2023.10247890}, doi = {10.1109/DAC56929.2023.10247890}, timestamp = {Sun, 24 Sep 2023 13:31:06 +0200}, biburl = {https://dblp.org/rec/conf/dac/WangBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/Sun0SWN023, author = {Zhensu Sun and Xiaoning Du and Fu Song and Shangwen Wang and Mingze Ni and Li Li}, title = {Don't Complete It! Preventing Unhelpful Code Completion for Productive and Sustainable Neural Code Completion Systems}, booktitle = {45th {IEEE/ACM} International Conference on Software Engineering: {ICSE} 2023 Companion Proceedings, Melbourne, Australia, May 14-20, 2023}, pages = {324--325}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICSE-Companion58688.2023.00089}, doi = {10.1109/ICSE-COMPANION58688.2023.00089}, timestamp = {Tue, 18 Jul 2023 09:25:31 +0200}, biburl = {https://dblp.org/rec/conf/icse/Sun0SWN023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/Sun0S023, author = {Zhensu Sun and Xiaoning Du and Fu Song and Li Li}, editor = {Satish Chandra and Kelly Blincoe and Paolo Tonella}, title = {CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models}, booktitle = {Proceedings of the 31st {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, {ESEC/FSE} 2023, San Francisco, CA, USA, December 3-9, 2023}, pages = {1561--1572}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3611643.3616297}, doi = {10.1145/3611643.3616297}, timestamp = {Mon, 04 Dec 2023 11:02:39 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/Sun0S023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChenZZS23, author = {Guangke Chen and Yedi Zhang and Zhe Zhao and Fu Song}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{QFA2SR:} Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {2437--2454}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/chen-guangke}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ChenZZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-14097, author = {Guangke Chen and Yedi Zhang and Zhe Zhao and Fu Song}, title = {{QFA2SR:} Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems}, journal = {CoRR}, volume = {abs/2305.14097}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.14097}, doi = {10.48550/ARXIV.2305.14097}, eprinttype = {arXiv}, eprint = {2305.14097}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-14097.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-16596, author = {Mingyang Liu and Fu Song and Taolue Chen}, title = {Automated Verification of Correctness for Masked Arithmetic Programs}, journal = {CoRR}, volume = {abs/2305.16596}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.16596}, doi = {10.48550/ARXIV.2305.16596}, eprinttype = {arXiv}, eprint = {2305.16596}, timestamp = {Wed, 07 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-16596.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-00561, author = {Huiyu Tan and Pengfei Gao and Taolue Chen and Fu Song and Zhilin Wu}, title = {SAT-based Formal Fault-Resistance Verification of Cryptographic Circuits}, journal = {CoRR}, volume = {abs/2307.00561}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.00561}, doi = {10.48550/ARXIV.2307.00561}, eprinttype = {arXiv}, eprint = {2307.00561}, timestamp = {Mon, 10 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-00561.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-15907, author = {Ye Tao and Wanwei Liu and Fu Song and Zhen Liang and Ji Wang and Hongxu Zhu}, title = {An Automata-Theoretic Approach to Synthesizing Binarized Neural Networks}, journal = {CoRR}, volume = {abs/2307.15907}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.15907}, doi = {10.48550/ARXIV.2307.15907}, eprinttype = {arXiv}, eprint = {2307.15907}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-15907.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-05014, author = {Weijie Shao and Yuyang Gao and Fu Song and Sen Chen and Lingling Fan}, title = {An Empirical Study of Bugs in Open-Source Federated Learning Framework}, journal = {CoRR}, volume = {abs/2308.05014}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.05014}, doi = {10.48550/ARXIV.2308.05014}, eprinttype = {arXiv}, eprint = {2308.05014}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-05014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-14401, author = {Zhensu Sun and Xiaoning Du and Fu Song and Li Li}, title = {CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models}, journal = {CoRR}, volume = {abs/2308.14401}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.14401}, doi = {10.48550/ARXIV.2308.14401}, eprinttype = {arXiv}, eprint = {2308.14401}, timestamp = {Fri, 01 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-14401.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-07983, author = {Guangke Chen and Yedi Zhang and Fu Song}, title = {{SLMIA-SR:} Speaker-Level Membership Inference Attacks against Speaker Recognition Systems}, journal = {CoRR}, volume = {abs/2309.07983}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.07983}, doi = {10.48550/ARXIV.2309.07983}, eprinttype = {arXiv}, eprint = {2309.07983}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-07983.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/GaoXSC22, author = {Pengfei Gao and Yongjie Xu and Fu Song and Taolue Chen}, title = {Model-based automated testing of JavaScript Web applications via longer test sequences}, journal = {Frontiers Comput. Sci.}, volume = {16}, number = {3}, pages = {163204}, year = {2022}, url = {https://doi.org/10.1007/s11704-020-0356-7}, doi = {10.1007/S11704-020-0356-7}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/GaoXSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsi/YangZSZ22, author = {Min Yang and Chao Zhang and Fu Song and Yuan Zhang}, title = {Preface to Special Issue on System Software Security}, journal = {Int. J. Softw. Informatics}, volume = {12}, number = {3}, pages = {259--261}, year = {2022}, url = {https://doi.org/10.21655/ijsi.1673-7288.00285}, doi = {10.21655/IJSI.1673-7288.00285}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsi/YangZSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/XuSC22, author = {Yongjie Xu and Fu Song and Taolue Chen}, title = {ESampler: Boosting sampling of satisfying assignments for Boolean formulas via derivation}, journal = {J. Syst. Archit.}, volume = {129}, pages = {102615}, year = {2022}, url = {https://doi.org/10.1016/j.sysarc.2022.102615}, doi = {10.1016/J.SYSARC.2022.102615}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/XuSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BuZDS22, author = {Lei Bu and Zhe Zhao and Yuchao Duan and Fu Song}, title = {Taking Care of the Discretization Problem: {A} Comprehensive Study of the Discretization Problem and a Black-Box Adversarial Attack in Discrete Integer Domain}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {3200--3217}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3088661}, doi = {10.1109/TDSC.2021.3088661}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BuZDS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/GaoXSZSC22, author = {Pengfei Gao and Hongyi Xie and Pu Sun and Jun Zhang and Fu Song and Taolue Chen}, title = {Formal Verification of Masking Countermeasures for Arithmetic Programs}, journal = {{IEEE} Trans. Software Eng.}, volume = {48}, number = {3}, pages = {973--1000}, year = {2022}, url = {https://doi.org/10.1109/TSE.2020.3008852}, doi = {10.1109/TSE.2020.3008852}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/GaoXSZSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/FanSCZL22, author = {Yuxin Fan and Fu Song and Taolue Chen and Liangfeng Zhang and Wanwei Liu}, editor = {Sharon Shoham and Yakir Vizel}, title = {PoS4MPC: Automated Security Policy Synthesis for Secure Multi-party Computation}, booktitle = {Computer Aided Verification - 34th International Conference, {CAV} 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13371}, pages = {385--406}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-13185-1\_19}, doi = {10.1007/978-3-031-13185-1\_19}, timestamp = {Tue, 09 Aug 2022 17:05:51 +0200}, biburl = {https://dblp.org/rec/conf/cav/FanSCZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/ZhangZCSZCS22, author = {Yedi Zhang and Zhe Zhao and Guangke Chen and Fu Song and Min Zhang and Taolue Chen and Jun Sun}, title = {{QVIP:} An ILP-based Formal Verification Approach for Quantized Neural Networks}, booktitle = {37th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2022, Rochester, MI, USA, October 10-14, 2022}, pages = {82:1--82:13}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3551349.3556916}, doi = {10.1145/3551349.3556916}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/ZhangZCSZCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sas/ZhaoZCSCL22, author = {Zhe Zhao and Yedi Zhang and Guangke Chen and Fu Song and Taolue Chen and Jiaxiang Liu}, editor = {Gagandeep Singh and Caterina Urban}, title = {{CLEVEREST:} Accelerating CEGAR-based Neural Network Verification via Adversarial Attacks}, booktitle = {Static Analysis - 29th International Symposium, {SAS} 2022, Auckland, New Zealand, December 5-7, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13790}, pages = {449--473}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22308-2\_20}, doi = {10.1007/978-3-031-22308-2\_20}, timestamp = {Thu, 08 Dec 2022 15:19:05 +0100}, biburl = {https://dblp.org/rec/conf/sas/ZhaoZCSCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/QinJSCX22, author = {Qi Qin and JulianAndres JiYang and Fu Song and Taolue Chen and Xinyu Xing}, editor = {Abhik Roychoudhury and Cristian Cadar and Miryung Kim}, title = {DeJITLeak: eliminating JIT-induced timing side-channel leaks}, booktitle = {Proceedings of the 30th {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, {ESEC/FSE} 2022, Singapore, Singapore, November 14-18, 2022}, pages = {872--884}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3540250.3549150}, doi = {10.1145/3540250.3549150}, timestamp = {Thu, 10 Nov 2022 11:14:54 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/QinJSCX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/Sun0SN022, author = {Zhensu Sun and Xiaoning Du and Fu Song and Mingze Ni and Li Li}, editor = {Fr{\'{e}}d{\'{e}}rique Laforest and Rapha{\"{e}}l Troncy and Elena Simperl and Deepak Agarwal and Aristides Gionis and Ivan Herman and Lionel M{\'{e}}dini}, title = {CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning}, booktitle = {{WWW} '22: The {ACM} Web Conference 2022, Virtual Event, Lyon, France, April 25 - 29, 2022}, pages = {652--660}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3485447.3512225}, doi = {10.1145/3485447.3512225}, timestamp = {Thu, 23 Jun 2022 19:54:34 +0200}, biburl = {https://dblp.org/rec/conf/www/Sun0SN022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-13134, author = {Qi Qin and JulianAndres JiYang and Fu Song and Taolue Chen and Xinyu Xing}, title = {Preventing Timing Side-Channels via Security-Aware Just-In-Time Compilation}, journal = {CoRR}, volume = {abs/2202.13134}, year = {2022}, url = {https://arxiv.org/abs/2202.13134}, eprinttype = {arXiv}, eprint = {2202.13134}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-13134.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-03351, author = {Guangke Chen and Zhe Zhao and Fu Song and Sen Chen and Lingling Fan and Yang Liu}, title = {{AS2T:} Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems}, journal = {CoRR}, volume = {abs/2206.03351}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.03351}, doi = {10.48550/ARXIV.2206.03351}, eprinttype = {arXiv}, eprint = {2206.03351}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-03351.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-03393, author = {Guangke Chen and Zhe Zhao and Fu Song and Sen Chen and Lingling Fan and Feng Wang and Jiashui Wang}, title = {Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition}, journal = {CoRR}, volume = {abs/2206.03393}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.03393}, doi = {10.48550/ARXIV.2206.03393}, eprinttype = {arXiv}, eprint = {2206.03393}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-03393.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-00759, author = {Jiaxiang Liu and Yunhan Xing and Xiaomu Shi and Fu Song and Zhiwu Xu and Zhong Ming}, title = {Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks}, journal = {CoRR}, volume = {abs/2207.00759}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.00759}, doi = {10.48550/ARXIV.2207.00759}, eprinttype = {arXiv}, eprint = {2207.00759}, timestamp = {Thu, 07 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-00759.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-05948, author = {Zhensu Sun and Xiaoning Du and Fu Song and Shangwen Wang and Mingze Ni and Li Li}, title = {Learning to Prevent Profitless Neural Code Completion}, journal = {CoRR}, volume = {abs/2209.05948}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.05948}, doi = {10.48550/ARXIV.2209.05948}, eprinttype = {arXiv}, eprint = {2209.05948}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-05948.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-02781, author = {Yedi Zhang and Fu Song and Jun Sun}, title = {QEBVerif: Quantization Error Bound Verification of Neural Networks}, journal = {CoRR}, volume = {abs/2212.02781}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.02781}, doi = {10.48550/ARXIV.2212.02781}, eprinttype = {arXiv}, eprint = {2212.02781}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-02781.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-11138, author = {Yedi Zhang and Zhe Zhao and Fu Song and Min Zhang and Taolue Chen and Jun Sun}, title = {{QVIP:} An ILP-based Formal Verification Approach for Quantized Neural Networks}, journal = {CoRR}, volume = {abs/2212.11138}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.11138}, doi = {10.48550/ARXIV.2212.11138}, eprinttype = {arXiv}, eprint = {2212.11138}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-11138.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/SongLCFL21, author = {Fu Song and Yusi Lei and Sen Chen and Lingling Fan and Yang Liu}, title = {Advanced evasion attacks and mitigations on practical ML-based phishing website classifiers}, journal = {Int. J. Intell. Syst.}, volume = {36}, number = {9}, pages = {5210--5240}, year = {2021}, url = {https://doi.org/10.1002/int.22510}, doi = {10.1002/INT.22510}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/SongLCFL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/GaoXSC21, author = {Pengfei Gao and Hongyi Xie and Fu Song and Taolue Chen}, title = {A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {30}, number = {3}, pages = {26:1--26:42}, year = {2021}, url = {https://doi.org/10.1145/3428015}, doi = {10.1145/3428015}, timestamp = {Tue, 25 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/GaoXSC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ZhangZCSC21, author = {Yedi Zhang and Zhe Zhao and Guangke Chen and Fu Song and Taolue Chen}, editor = {Alexandra Silva and K. Rustan M. Leino}, title = {{BDD4BNN:} {A} BDD-Based Quantitative Analysis Framework for Binarized Neural Networks}, booktitle = {Computer Aided Verification - 33rd International Conference, {CAV} 2021, Virtual Event, July 20-23, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12759}, pages = {175--200}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81685-8\_8}, doi = {10.1007/978-3-030-81685-8\_8}, timestamp = {Fri, 23 Jul 2021 16:41:31 +0200}, biburl = {https://dblp.org/rec/conf/cav/ZhangZCSC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/GuoWZZSW21, author = {Xingwu Guo and Wenjie Wan and Zhaodi Zhang and Min Zhang and Fu Song and Xuejun Wen}, editor = {Zhi Jin and Xuandong Li and Jianwen Xiang and Leonardo Mariani and Ting Liu and Xiao Yu and Nahgmeh Ivaki}, title = {Eager Falsification for Accelerating Robustness Verification of Deep Neural Networks}, booktitle = {32nd {IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2021, Wuhan, China, October 25-28, 2021}, pages = {345--356}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISSRE52982.2021.00044}, doi = {10.1109/ISSRE52982.2021.00044}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/GuoWZZSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/ChenFGSL21, author = {Sen Chen and Lingling Fan and Cuiyun Gao and Fu Song and Yang Liu}, editor = {Zhi Jin and Xuandong Li and Jianwen Xiang and Leonardo Mariani and Ting Liu and Xiao Yu and Nahgmeh Ivaki}, title = {Peeking into the Gray Area of Mobile World: An Empirical Study of Unlabeled Android Apps}, booktitle = {32nd {IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2021, Wuhan, China, October 25-28, 2021}, pages = {579--590}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISSRE52982.2021.00065}, doi = {10.1109/ISSRE52982.2021.00065}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/ChenFGSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/ZhaoCWYS021, author = {Zhe Zhao and Guangke Chen and Jingyi Wang and Yiwei Yang and Fu Song and Jun Sun}, editor = {Cristian Cadar and Xiangyu Zhang}, title = {Attack as defense: characterizing adversarial examples using robustness}, booktitle = {{ISSTA} '21: 30th {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, Virtual Event, Denmark, July 11-17, 2021}, pages = {42--55}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460319.3464822}, doi = {10.1145/3460319.3464822}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issta/ZhaoCWYS021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/setta/XuSC21, author = {Yongjie Xu and Fu Song and Taolue Chen}, editor = {Shengchao Qin and Jim Woodcock and Wenhui Zhang}, title = {ESampler: Efficient Sampling of Satisfying Assignments for Boolean Formulas}, booktitle = {Dependable Software Engineering. Theories, Tools, and Applications - 7th International Symposium, {SETTA} 2021, Beijing, China, November 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13071}, pages = {279--298}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91265-9\_15}, doi = {10.1007/978-3-030-91265-9\_15}, timestamp = {Fri, 17 Feb 2023 09:02:01 +0100}, biburl = {https://dblp.org/rec/conf/setta/XuSC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChenCFDZSL21, author = {Guangke Chen and Sen Chen and Lingling Fan and Xiaoning Du and Zhe Zhao and Fu Song and Yang Liu}, title = {Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {694--711}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00004}, doi = {10.1109/SP40001.2021.00004}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChenCFDZSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tase/LinZCSXLS21, author = {Yingwen Lin and Yao Zhang and Sen Chen and Fu Song and Xiaofei Xie and Xiaohong Li and Lintan Sun}, title = {Inferring Loop Invariants for Multi-Path Loops}, booktitle = {International Symposium on Theoretical Aspects of Software Engineering, {TASE} 2021, Shanghai, China, August 25-27, 2021}, pages = {63--70}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TASE52547.2021.00030}, doi = {10.1109/TASE52547.2021.00030}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tase/LinZCSXLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-07224, author = {Yedi Zhang and Zhe Zhao and Guangke Chen and Fu Song and Taolue Chen}, title = {{BDD4BNN:} {A} BDD-based Quantitative Analysis Framework for Binarized Neural Networks}, journal = {CoRR}, volume = {abs/2103.07224}, year = {2021}, url = {https://arxiv.org/abs/2103.07224}, eprinttype = {arXiv}, eprint = {2103.07224}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-07224.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-07633, author = {Zhe Zhao and Guangke Chen and Jingyi Wang and Yiwei Yang and Fu Song and Jun Sun}, title = {Attack as Defense: Characterizing Adversarial Examples using Robustness}, journal = {CoRR}, volume = {abs/2103.07633}, year = {2021}, url = {https://arxiv.org/abs/2103.07633}, eprinttype = {arXiv}, eprint = {2103.07633}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-07633.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-01766, author = {Guangke Chen and Zhe Zhao and Fu Song and Sen Chen and Lingling Fan and Yang Liu}, title = {{SEC4SR:} {A} Security Analysis Platform for Speaker Recognition}, journal = {CoRR}, volume = {abs/2109.01766}, year = {2021}, url = {https://arxiv.org/abs/2109.01766}, eprinttype = {arXiv}, eprint = {2109.01766}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-01766.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-12925, author = {Zhensu Sun and Xiaoning Du and Fu Song and Mingze Ni and Li Li}, title = {CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning}, journal = {CoRR}, volume = {abs/2110.12925}, year = {2021}, url = {https://arxiv.org/abs/2110.12925}, eprinttype = {arXiv}, eprint = {2110.12925}, timestamp = {Tue, 26 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-12925.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/LiuSZW20, author = {Wan{-}Wei Liu and Fu Song and Tang{-}Hao{-}Ran Zhang and Ji Wang}, title = {Verifying ReLU Neural Networks from a Model Checking Perspective}, journal = {J. Comput. Sci. Technol.}, volume = {35}, number = {6}, pages = {1365--1381}, year = {2020}, url = {https://doi.org/10.1007/s11390-020-0546-7}, doi = {10.1007/S11390-020-0546-7}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcst/LiuSZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/XuX0SLL20, author = {Yifei Xu and Zhengzi Xu and Bihuan Chen and Fu Song and Yang Liu and Ting Liu}, editor = {Sarfraz Khurshid and Corina S. Pasareanu}, title = {Patch based vulnerability matching for binary programs}, booktitle = {{ISSTA} '20: 29th {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, Virtual Event, USA, July 18-22, 2020}, pages = {376--387}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395363.3397361}, doi = {10.1145/3395363.3397361}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issta/XuX0SLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-06954, author = {Yusi Lei and Sen Chen and Lingling Fan and Fu Song and Yang Liu}, title = {Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers}, journal = {CoRR}, volume = {abs/2004.06954}, year = {2020}, url = {https://arxiv.org/abs/2004.06954}, eprinttype = {arXiv}, eprint = {2004.06954}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-06954.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-09171, author = {Pengfei Gao and Hongyi Xie and Fu Song and Taolue Chen}, title = {A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs}, journal = {CoRR}, volume = {abs/2006.09171}, year = {2020}, url = {https://arxiv.org/abs/2006.09171}, eprinttype = {arXiv}, eprint = {2006.09171}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-09171.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-08520, author = {Wenjie Wan and Zhaodi Zhang and Yiwei Zhu and Min Zhang and Fu Song}, title = {Accelerating Robustness Verification of Deep Neural Networks Guided by Target Labels}, journal = {CoRR}, volume = {abs/2007.08520}, year = {2020}, url = {https://arxiv.org/abs/2007.08520}, eprinttype = {arXiv}, eprint = {2007.08520}, timestamp = {Tue, 08 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-08520.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangSC19, author = {Yedi Zhang and Fu Song and Taolue Chen}, title = {Making Agents' Abilities Explicit}, journal = {{IEEE} Access}, volume = {7}, pages = {101804--101819}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2931514}, doi = {10.1109/ACCESS.2019.2931514}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tfs/PanSCQ19, author = {Haiyu Pan and Fu Song and Yongzhi Cao and Junyan Qian}, title = {Fuzzy Pushdown Termination Games}, journal = {{IEEE} Trans. Fuzzy Syst.}, volume = {27}, number = {4}, pages = {760--774}, year = {2019}, url = {https://doi.org/10.1109/TFUZZ.2018.2869127}, doi = {10.1109/TFUZZ.2018.2869127}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tfs/PanSCQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/GaoZSW19, author = {Pengfei Gao and Jun Zhang and Fu Song and Chao Wang}, title = {Verifying and Quantifying Side-channel Resistance of Masked Software Implementations}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {28}, number = {3}, pages = {16:1--16:32}, year = {2019}, url = {https://doi.org/10.1145/3330392}, doi = {10.1145/3330392}, timestamp = {Fri, 23 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/GaoZSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/SongZCTX19, author = {Fu Song and Yedi Zhang and Taolue Chen and Yu Tang and Zhiwu Xu}, title = {Probabilistic Alternating-Time \emph{{\(\mathrm{\mu}\)}}-Calculus}, booktitle = {The Thirty-Third {AAAI} Conference on Artificial Intelligence, {AAAI} 2019, The Thirty-First Innovative Applications of Artificial Intelligence Conference, {IAAI} 2019, The Ninth {AAAI} Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2019, Honolulu, Hawaii, USA, January 27 - February 1, 2019}, pages = {6179--6186}, publisher = {{AAAI} Press}, year = {2019}, url = {https://doi.org/10.1609/aaai.v33i01.33016179}, doi = {10.1609/AAAI.V33I01.33016179}, timestamp = {Mon, 04 Sep 2023 12:29:24 +0200}, biburl = {https://dblp.org/rec/conf/aaai/SongZCTX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fase/ZhangSMC19, author = {Min Zhang and Fu Song and Fr{\'{e}}d{\'{e}}ric Mallet and Xiaohong Chen}, editor = {Reiner H{\"{a}}hnle and Wil M. P. van der Aalst}, title = {SMT-Based Bounded Schedulability Analysis of the Clock Constraint Specification Language}, booktitle = {Fundamental Approaches to Software Engineering - 22nd International Conference, {FASE} 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11424}, pages = {61--78}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-16722-6\_4}, doi = {10.1007/978-3-030-16722-6\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fase/ZhangSMC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/GaoXZSC19, author = {Pengfei Gao and Hongyi Xie and Jun Zhang and Fu Song and Taolue Chen}, editor = {Tom{\'{a}}s Vojnar and Lijun Zhang}, title = {Quantitative Verification of Masked Arithmetic Programs Against Side-Channel Attacks}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 25th International Conference, {TACAS} 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11427}, pages = {155--173}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17462-0\_9}, doi = {10.1007/978-3-030-17462-0\_9}, timestamp = {Fri, 31 Jan 2020 21:32:25 +0100}, biburl = {https://dblp.org/rec/conf/tacas/GaoXZSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tase/XuRS19, author = {Zhiwu Xu and Kerong Ren and Fu Song}, editor = {Dominique M{\'{e}}ry and Shengchao Qin}, title = {Android Malware Family Classification and Characterization Using {CFG} and {DFG}}, booktitle = {2019 International Symposium on Theoretical Aspects of Software Engineering, {TASE} 2019, Guilin, China, July 29-31, 2019}, pages = {49--56}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TASE.2019.00-20}, doi = {10.1109/TASE.2019.00-20}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tase/XuRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-09706, author = {Pengfei Gao and Hongyi Xie and Jun Zhang and Fu Song and Taolue Chen}, title = {Quantitative Verification of Masked Arithmetic Programs against Side-Channel Attacks}, journal = {CoRR}, volume = {abs/1901.09706}, year = {2019}, url = {http://arxiv.org/abs/1901.09706}, eprinttype = {arXiv}, eprint = {1901.09706}, timestamp = {Sat, 02 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-09706.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-07671, author = {Pengfei Gao and Fu Song and Taolue Chen and Yao Zeng and Ting Su}, title = {Model-based Automated Testing of JavaScript Web Applications via Longer Test Sequences}, journal = {CoRR}, volume = {abs/1905.07671}, year = {2019}, url = {http://arxiv.org/abs/1905.07671}, eprinttype = {arXiv}, eprint = {1905.07671}, timestamp = {Wed, 05 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-07671.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-07672, author = {Yuchao Duan and Zhe Zhao and Lei Bu and Fu Song}, title = {Things You May Not Know About Adversarial Example: {A} Black-box Adversarial Image Attack}, journal = {CoRR}, volume = {abs/1905.07672}, year = {2019}, url = {http://arxiv.org/abs/1905.07672}, eprinttype = {arXiv}, eprint = {1905.07672}, timestamp = {Tue, 28 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-07672.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-01840, author = {Guangke Chen and Sen Chen and Lingling Fan and Xiaoning Du and Zhe Zhao and Fu Song and Yang Liu}, title = {Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems}, journal = {CoRR}, volume = {abs/1911.01840}, year = {2019}, url = {http://arxiv.org/abs/1911.01840}, eprinttype = {arXiv}, eprint = {1911.01840}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-01840.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aicom/ZhangZPSL18, author = {Yueling Zhang and Min Zhang and Geguang Pu and Fu Song and Jianwen Li}, title = {Towards backbone computing: {A} Greedy-Whitening based approach}, journal = {{AI} Commun.}, volume = {31}, number = {3}, pages = {267--280}, year = {2018}, url = {https://doi.org/10.3233/AIC-180763}, doi = {10.3233/AIC-180763}, timestamp = {Wed, 23 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aicom/ZhangZPSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/Song18, author = {Fu Song}, title = {Analyzing pushdown systems with stack manipulation}, journal = {Inf. Comput.}, volume = {259}, number = {1}, pages = {41--71}, year = {2018}, url = {https://doi.org/10.1016/j.ic.2017.12.003}, doi = {10.1016/J.IC.2017.12.003}, timestamp = {Wed, 04 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/Song18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ZhangGSW18, author = {Jun Zhang and Pengfei Gao and Fu Song and Chao Wang}, editor = {Hana Chockler and Georg Weissenbacher}, title = {SCInfer: Refinement-Based Verification of Software Countermeasures Against Side-Channel Attacks}, booktitle = {Computer Aided Verification - 30th International Conference, {CAV} 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10982}, pages = {157--177}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96142-2\_12}, doi = {10.1007/978-3-319-96142-2\_12}, timestamp = {Fri, 09 Apr 2021 18:35:26 +0200}, biburl = {https://dblp.org/rec/conf/cav/ZhangGSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ChenHSWWY18, author = {Taolue Chen and Jinlong He and Fu Song and Guozhen Wang and Zhilin Wu and Jun Yan}, editor = {Hana Chockler and Georg Weissenbacher}, title = {Android Stack Machine}, booktitle = {Computer Aided Verification - 30th International Conference, {CAV} 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10982}, pages = {487--504}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96142-2\_29}, doi = {10.1007/978-3-319-96142-2\_29}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/ChenHSWWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tase/WangSZZZ18, author = {Feng Wang and Fu Song and Min Zhang and Xiaoran Zhu and Jun Zhang}, editor = {Jun Pang and Chenyi Zhang and Jifeng He and Jian Weng}, title = {KRust: {A} Formal Executable Semantics of Rust}, booktitle = {2018 International Symposium on Theoretical Aspects of Software Engineering, {TASE} 2018, Guangzhou, China, August 29-31, 2018}, pages = {44--51}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/TASE.2018.00014}, doi = {10.1109/TASE.2018.00014}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tase/WangSZZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-10806, author = {Feng Wang and Fu Song and Min Zhang and Xiaoran Zhu and Jun Zhang}, title = {KRust: {A} Formal Executable Semantics of Rust}, journal = {CoRR}, volume = {abs/1804.10806}, year = {2018}, url = {http://arxiv.org/abs/1804.10806}, eprinttype = {arXiv}, eprint = {1804.10806}, timestamp = {Mon, 14 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-10806.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-10901, author = {Yedi Zhang and Fu Song and Taolue Chen}, title = {Making Agents' Abilities Explicit}, journal = {CoRR}, volume = {abs/1811.10901}, year = {2018}, url = {http://arxiv.org/abs/1811.10901}, eprinttype = {arXiv}, eprint = {1811.10901}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-10901.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LeiSLZ17, author = {Yusi Lei and Fu Song and Wanwei Liu and Min Zhang}, title = {On the complexity of \emph{{\(\omega\)}}-pushdown automata}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {11}, pages = {112102:1--112102:15}, year = {2017}, url = {https://doi.org/10.1007/s11432-016-9026-x}, doi = {10.1007/S11432-016-9026-X}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/LeiSLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/ChenSW17, author = {Taolue Chen and Fu Song and Zhilin Wu}, editor = {Roland Meyer and Uwe Nestmann}, title = {Tractability of Separation Logic with Inductive Definitions: Beyond Lists}, booktitle = {28th International Conference on Concurrency Theory, {CONCUR} 2017, September 5-8, 2017, Berlin, Germany}, series = {LIPIcs}, volume = {85}, pages = {37:1--37:17}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2017}, url = {https://doi.org/10.4230/LIPIcs.CONCUR.2017.37}, doi = {10.4230/LIPICS.CONCUR.2017.37}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/concur/ChenSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/ChenSW17, author = {Taolue Chen and Fu Song and Zhilin Wu}, editor = {Zhenhua Duan and Luke Ong}, title = {Model Checking Pushdown Epistemic Game Structures}, booktitle = {Formal Methods and Software Engineering - 19th International Conference on Formal Engineering Methods, {ICFEM} 2017, Xi'an, China, November 13-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10610}, pages = {36--53}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68690-5\_3}, doi = {10.1007/978-3-319-68690-5\_3}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/icfem/ChenSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/XuCCLS17, author = {Zhengzi Xu and Bihuan Chen and Mahinthan Chandramohan and Yang Liu and Fu Song}, editor = {Sebasti{\'{a}}n Uchitel and Alessandro Orso and Martin P. Robillard}, title = {{SPAIN:} security patch analysis for binaries towards understanding the pain and pills}, booktitle = {Proceedings of the 39th International Conference on Software Engineering, {ICSE} 2017, Buenos Aires, Argentina, May 20-28, 2017}, pages = {462--472}, publisher = {{IEEE} / {ACM}}, year = {2017}, url = {https://doi.org/10.1109/ICSE.2017.49}, doi = {10.1109/ICSE.2017.49}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/XuCCLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/setta/LiuSZ17, author = {Wanwei Liu and Fu Song and Ge Zhou}, editor = {Kim Guldstrand Larsen and Oleg Sokolsky and Ji Wang}, title = {Reasoning About Periodicity on Infinite Words}, booktitle = {Dependable Software Engineering. Theories, Tools, and Applications - Third International Symposium, {SETTA} 2017, Changsha, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10606}, pages = {200--215}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69483-2\_12}, doi = {10.1007/978-3-319-69483-2\_12}, timestamp = {Tue, 13 Apr 2021 10:56:13 +0200}, biburl = {https://dblp.org/rec/conf/setta/LiuSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tase/ZhangLZPS17, author = {Yueling Zhang and Jianwen Li and Min Zhang and Geguang Pu and Fu Song}, editor = {Fr{\'{e}}d{\'{e}}ric Mallet and Min Zhang and Eric Madelaine}, title = {Optimizing backbone filtering}, booktitle = {11th International Symposium on Theoretical Aspects of Software Engineering, {TASE} 2017, Sophia Antipolis, France, September 13-15, 2017}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/TASE.2017.8285627}, doi = {10.1109/TASE.2017.8285627}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tase/ZhangLZPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/SongW16, author = {Fu Song and Zhilin Wu}, title = {On temporal logics with data variable quantifications: Decidability and complexity}, journal = {Inf. Comput.}, volume = {251}, pages = {104--139}, year = {2016}, url = {https://doi.org/10.1016/j.ic.2016.08.002}, doi = {10.1016/J.IC.2016.08.002}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/SongW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GaoZCS16, author = {Ya Gao and Peng Zeng and Kim{-}Kwang Raymond Choo and Fu Song}, title = {An Improved Online/Offline Identity-Based Signature Scheme for WSNs}, journal = {Int. J. Netw. Secur.}, volume = {18}, number = {6}, pages = {1143--1151}, year = {2016}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v18-n6/ijns-2016-v18-n6-p1143-1151.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/GaoZCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/SongT16, author = {Fu Song and Tayssir Touili}, title = {Model-checking software library {API} usage rules}, journal = {Softw. Syst. Model.}, volume = {15}, number = {4}, pages = {961--985}, year = {2016}, url = {https://doi.org/10.1007/s10270-015-0473-1}, doi = {10.1007/S10270-015-0473-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sosym/SongT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/ChenSW16, author = {Taolue Chen and Fu Song and Zhilin Wu}, editor = {Dale Schuurmans and Michael P. Wellman}, title = {Global Model Checking on Pushdown Multi-Agent Systems}, booktitle = {Proceedings of the Thirtieth {AAAI} Conference on Artificial Intelligence, February 12-17, 2016, Phoenix, Arizona, {USA}}, pages = {2459--2465}, publisher = {{AAAI} Press}, year = {2016}, url = {https://doi.org/10.1609/aaai.v30i1.10124}, doi = {10.1609/AAAI.V30I1.10124}, timestamp = {Mon, 04 Sep 2023 15:08:28 +0200}, biburl = {https://dblp.org/rec/conf/aaai/ChenSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/ChenSW16, author = {Taolue Chen and Fu Song and Zhilin Wu}, editor = {Subbarao Kambhampati}, title = {Verifying Pushdown Multi-Agent Systems against Strategy Logics}, booktitle = {Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, {IJCAI} 2016, New York, NY, USA, 9-15 July 2016}, pages = {180--186}, publisher = {{IJCAI/AAAI} Press}, year = {2016}, url = {http://www.ijcai.org/Abstract/16/033}, timestamp = {Tue, 20 Aug 2019 16:19:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/ChenSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/setss/ChenSW16, author = {Taolue Chen and Fu Song and Zhilin Wu}, editor = {Jonathan P. Bowen and Zhiming Liu and Zili Zhang}, title = {Formal Reasoning on Infinite Data Values: An Ongoing Quest}, booktitle = {Engineering Trustworthy Software Systems - Second International School, {SETSS} 2016, Chongqing, China, March 28 - April 2, 2016, Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {10215}, pages = {195--257}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56841-6\_6}, doi = {10.1007/978-3-319-56841-6\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/setss/ChenSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SongT16, author = {Fu Song and Tayssir Touili}, title = {{LTL} Model-Checking for Dynamic Pushdown Networks Communicating via Locks}, journal = {CoRR}, volume = {abs/1611.02528}, year = {2016}, url = {http://arxiv.org/abs/1611.02528}, eprinttype = {arXiv}, eprint = {1611.02528}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SongT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/SongT15, author = {Fu Song and Tayssir Touili}, title = {Model checking dynamic pushdown networks}, journal = {Formal Aspects Comput.}, volume = {27}, number = {2}, pages = {397--421}, year = {2015}, url = {https://doi.org/10.1007/s00165-014-0330-y}, doi = {10.1007/S00165-014-0330-Y}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/SongT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/ChenSW15, author = {Taolue Chen and Fu Song and Zhilin Wu}, editor = {Luca Aceto and David de Frutos{-}Escrig}, title = {On the Satisfiability of Indexed Linear Temporal Logics}, booktitle = {26th International Conference on Concurrency Theory, {CONCUR} 2015, Madrid, Spain, September 1.4, 2015}, series = {LIPIcs}, volume = {42}, pages = {254--267}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2015}, url = {https://doi.org/10.4230/LIPIcs.CONCUR.2015.254}, doi = {10.4230/LIPICS.CONCUR.2015.254}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/concur/ChenSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/SongMPZ15, author = {Fu Song and Weikai Miao and Geguang Pu and Min Zhang}, editor = {Luca Aceto and David de Frutos{-}Escrig}, title = {On Reachability Analysis of Pushdown Systems with Transductions: Application to Boolean Programs with Call-by-Reference}, booktitle = {26th International Conference on Concurrency Theory, {CONCUR} 2015, Madrid, Spain, September 1.4, 2015}, series = {LIPIcs}, volume = {42}, pages = {383--397}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2015}, url = {https://doi.org/10.4230/LIPIcs.CONCUR.2015.383}, doi = {10.4230/LIPICS.CONCUR.2015.383}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/concur/SongMPZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hase/LiWZPZS15, author = {Bo Li and Mengdi Wang and Yongxin Zhao and Geguang Pu and Huibiao Zhu and Fu Song}, title = {Modeling and Verifying Google File System}, booktitle = {16th {IEEE} International Symposium on High Assurance Systems Engineering, {HASE} 2015, Daytona Beach, FL, USA, January 8-10, 2015}, pages = {207--214}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HASE.2015.38}, doi = {10.1109/HASE.2015.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hase/LiWZPZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/SongT14, author = {Fu Song and Tayssir Touili}, title = {Pushdown model checking for malware detection}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {16}, number = {2}, pages = {147--173}, year = {2014}, url = {https://doi.org/10.1007/s10009-013-0290-1}, doi = {10.1007/S10009-013-0290-1}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/SongT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SongT14, author = {Fu Song and Tayssir Touili}, title = {Efficient {CTL} model-checking for pushdown systems}, journal = {Theor. Comput. Sci.}, volume = {549}, pages = {127--145}, year = {2014}, url = {https://doi.org/10.1016/j.tcs.2014.07.001}, doi = {10.1016/J.TCS.2014.07.001}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/SongT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aplas/SongT14, author = {Fu Song and Tayssir Touili}, editor = {Jacques Garrigue}, title = {Model-Checking for Android Malware Detection}, booktitle = {Programming Languages and Systems - 12th Asian Symposium, {APLAS} 2014, Singapore, November 17-19, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8858}, pages = {216--235}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12736-1\_12}, doi = {10.1007/978-3-319-12736-1\_12}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/aplas/SongT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/SongW14, author = {Fu Song and Zhilin Wu}, editor = {Venkatesh Raman and S. P. Suresh}, title = {Extending Temporal Logics with Data Variable Quantifications}, booktitle = {34th International Conference on Foundation of Software Technology and Theoretical Computer Science, {FSTTCS} 2014, December 15-17, 2014, New Delhi, India}, series = {LIPIcs}, volume = {29}, pages = {253--265}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2014}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2014.253}, doi = {10.4230/LIPICS.FSTTCS.2014.253}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/fsttcs/SongW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aplas/SongT13, author = {Fu Song and Tayssir Touili}, editor = {Chung{-}chieh Shan}, title = {Model Checking Dynamic Pushdown Networks}, booktitle = {Programming Languages and Systems - 11th Asian Symposium, {APLAS} 2013, Melbourne, VIC, Australia, December 9-11, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8301}, pages = {33--49}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03542-0\_3}, doi = {10.1007/978-3-319-03542-0\_3}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/aplas/SongT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/SongT13, author = {Fu Song and Tayssir Touili}, editor = {Einar Broch Johnsen and Luigia Petre}, title = {Model-Checking Software Library {API} Usage Rules}, booktitle = {Integrated Formal Methods, 10th International Conference, {IFM} 2013, Turku, Finland, June 10-14, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7940}, pages = {192--207}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38613-8\_14}, doi = {10.1007/978-3-642-38613-8\_14}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifm/SongT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/SongT13, author = {Fu Song and Tayssir Touili}, editor = {Bertrand Meyer and Luciano Baresi and Mira Mezini}, title = {PoMMaDe: pushdown model-checking for malware detection}, booktitle = {Joint Meeting of the European Software Engineering Conference and the {ACM} {SIGSOFT} Symposium on the Foundations of Software Engineering, ESEC/FSE'13, Saint Petersburg, Russian Federation, August 18-26, 2013}, pages = {607--610}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2491411.2494599}, doi = {10.1145/2491411.2494599}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/SongT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/SongT13, author = {Fu Song and Tayssir Touili}, editor = {Nir Piterman and Scott A. Smolka}, title = {{LTL} Model-Checking for Malware Detection}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 19th International Conference, {TACAS} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7795}, pages = {416--431}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36742-7\_29}, doi = {10.1007/978-3-642-36742-7\_29}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/tacas/SongT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/SongT12, author = {Fu Song and Tayssir Touili}, editor = {Dimitra Giannakopoulou and Dominique M{\'{e}}ry}, title = {Efficient Malware Detection Using Model-Checking}, booktitle = {{FM} 2012: Formal Methods - 18th International Symposium, Paris, France, August 27-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7436}, pages = {418--433}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32759-9\_34}, doi = {10.1007/978-3-642-32759-9\_34}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/SongT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/SongT12, author = {Fu Song and Tayssir Touili}, editor = {Michael Goedicke and Tim Menzies and Motoshi Saeki}, title = {PuMoC: a {CTL} model-checker for sequential programs}, booktitle = {{IEEE/ACM} International Conference on Automated Software Engineering, ASE'12, Essen, Germany, September 3-7, 2012}, pages = {346--349}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2351676.2351743}, doi = {10.1145/2351676.2351743}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/SongT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/SongT12, author = {Fu Song and Tayssir Touili}, editor = {Cormac Flanagan and Barbara K{\"{o}}nig}, title = {Pushdown Model Checking for Malware Detection}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 18th International Conference, {TACAS} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7214}, pages = {110--125}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28756-5\_9}, doi = {10.1007/978-3-642-28756-5\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/tacas/SongT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/SongT11, author = {Fu Song and Tayssir Touili}, editor = {Joost{-}Pieter Katoen and Barbara K{\"{o}}nig}, title = {Efficient {CTL} Model-Checking for Pushdown Systems}, booktitle = {{CONCUR} 2011 - Concurrency Theory - 22nd International Conference, {CONCUR} 2011, Aachen, Germany, September 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6901}, pages = {434--449}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23217-6\_29}, doi = {10.1007/978-3-642-23217-6\_29}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/concur/SongT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.