default search action
Fang Yu 0001
Person information
- unicode name: 郁方
- affiliation: National Chengchi University, Department of Management Information Systems, Taipei City, Taiwan
- affiliation (former, PhD 2010): University of California, Santa Barbara, Department of Computer Science, CA, USA
- affiliation (former): Academia Sinica, Institute of Information Science, Taipei, Taiwan
Other persons with the same name
- Fang Yu — disambiguation page
- Fang Yu 0002 — Microsoft Research, Mountain View, CA, USA (and 1 more)
- Fang Yu 0003 — Shanghai Maritime University, Institute of Logistics Science & Engineering, China (and 2 more)
- Fang Yu 0004 — Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China (and 1 more)
- Fang Yu 0005 — Arizona State University, Edson College of Nursing and Health Innovation, Phoenix, AZ, USA (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c43]Cheng-Yao Guo, Fang Yu:
Sugar-coated poison defense on deepfake face-swapping attacks. AST@ICSE 2024: 78-87 - 2023
- [c42]Cheng-Yao Guo, Fang Yu:
POSTER: On searching information leakage of Python model execution to detect adversarial examples. AsiaCCS 2023: 1037-1039 - [c41]Yi-Ching Lin, Fang Yu:
DeepSHAP Summary for Adversarial Example Detection. DeepTest 2023: 17-24 - 2021
- [c40]Yu-Fang Chen, Wei-Lun Tsai, Wei-Cheng Wu, Di-De Yen, Fang Yu:
PyCT: A Python Concolic Tester. APLAS 2021: 38-46 - 2020
- [c39]Wei-Ting Lin, Shun-Wen Hsiao, Fang Yu:
Runtime Hook on Blockchain and Smart Contract Systems. SBC@AsiaCCS 2020: 21-27 - [c38]Min Hao Peng, Fang Yu, Jie-Hong Roland Jiang:
Symbolic Gas Vulnerability Detection and Attack Synthesis. PACIS 2020: 107
2010 – 2019
- 2019
- [c37]Yun-Chieh Tien, Chen-Min Hsu, Fang Yu:
HiSeqGAN: Hierarchical Sequence Synthesis and Prediction. ICANN (2) 2019: 621-638 - 2018
- [j9]Fang Yu, Yat-wah Wan, Rua-Huan Tsaih:
Quantitative quality estimation of cloud-based streaming services. Comput. Commun. 125: 24-37 (2018) - [c36]Chun-Han Lin, Fang Yu, Jie-Hong Roland Jiang, Tevfik Bultan:
Static detection of API call vulnerabilities in iOS executables. ICSE (Companion Volume) 2018: 394-395 - [c35]Hung-En Wang, Shih-Yu Chen, Fang Yu, Jie-Hong R. Jiang:
A symbolic model checking approach to the analysis of string and length constraints. ASE 2018: 623-633 - [c34]Abdulbaki Aydin, William Eiers, Lucas Bang, Tegan Brennan, Miroslav Gavrilov, Tevfik Bultan, Fang Yu:
Parameterized model counting for string and numeric constraints. ESEC/SIGSOFT FSE 2018: 400-410 - 2017
- [b1]Tevfik Bultan, Fang Yu, Muath Alkhalaf, Abdulbaki Aydin:
String Analysis for Software Verification and Security. Springer 2017, ISBN 978-3-319-68668-4, pp. 1-166 - [c33]Chun-Chi Hsu, Yuan-Ting Fang, Fang Yu:
Content-Sensitive Data Compression for IoT Streaming Services. ICIOT 2017: 147-150 - 2016
- [c32]Hung-En Wang, Tzung-Lin Tsai, Chun-Han Lin, Fang Yu, Jie-Hong R. Jiang:
String Analysis via Automata Manipulation with Logic Circuit Representation. CAV (1) 2016: 241-260 - [c31]Fang Yu, Ching-Yuan Shueh, Chun-Han Lin, Yu-Fang Chen, Bow-Yaw Wang, Tevfik Bultan:
Optimal sanitization synthesis for web application vulnerability repair. ISSTA 2016: 189-200 - 2015
- [c30]Chun-Han Lin, Pei-Yu Sun, Fang Yu:
Space Connection: A New 3D Tele-immersion Platform for Web-Based Gesture-Collaborative Games and Services. GAS@ICSE 2015: 22-28 - [c29]Shin-Ying Huang, Fang Yu, Rua-Huan Tsaih, Yennun Huang:
Network-traffic anomaly detection with incremental majority learning. IJCNN 2015: 1-8 - 2014
- [j8]Shin-Ying Huang, Rua-Huan Tsaih, Fang Yu:
Topological pattern discovery and feature extraction for fraudulent financial reporting. Expert Syst. Appl. 41(9): 4360-4372 (2014) - [j7]Fang Yu, Muath Alkhalaf, Tevfik Bultan, Oscar H. Ibarra:
Automata-based symbolic string analysis for vulnerability detection. Formal Methods Syst. Des. 44(1): 44-70 (2014) - [c28]Fang Yu, Yi-Yang Tung:
Patcher: An Online Service for Detecting, Viewing and Patching Web Application Vulnerabilities. HICSS 2014: 4878-4886 - [c27]Shin-Ying Huang, Fang Yu, Rua-Huan Tsaih, Yennun Huang:
Resistant learning on the envelope bulk for identifying anomalous patterns. IJCNN 2014: 3303-3310 - 2013
- [c26]Fang Yu, Yat-wah Wan, Rua-Huan Tsaih:
Quantitative Analysis of Cloud-Based Streaming Services. IEEE SCC 2013: 216-223 - [c25]Wenhui Wu, Daniel Yuh Chao, Fang Yu:
A control policy for γ-nets without reachability analysis and siphon enumeration. CASE 2013: 1133-1138 - [c24]Fang Yu, Shin-Ying Huang, Li-ching Chiou, Rua-Huan Tsaih:
Clustering iOS executable using self-organizing maps. IJCNN 2013: 1-8 - 2012
- [c23]Daniel Yuh Chao, Hung-Yi Chen, Fang Yu:
Enumeration of reachable and other states of simple version of Systems of Simple Sequential Processes with Resources (S3PR). ISIE 2012: 1369-1374 - [c22]Fang Yu, Shun-Ching Yang, Farn Wang, Guan-Cheng Chen, Che-Chang Chan:
Symbolic consistency checking of OpenMp parallel programs. LCTES 2012: 139-148 - 2011
- [j6]Fang Yu, Tevfik Bultan, Oscar H. Ibarra:
Relational String Verification Using Multi-Track Automata. Int. J. Found. Comput. Sci. 22(8): 1909-1924 (2011) - [c21]Farn Wang, Chung-Hao Huang, Fang Yu:
A Temporal Logic for the Interaction of Strategies. CONCUR 2011: 466-481 - [c20]Fang Yu, Muath Alkhalaf, Tevfik Bultan:
Patching vulnerabilities with sanitization synthesis. ICSE 2011: 251-260 - [c19]Fang Yu, Tevfik Bultan, Ben Hardekopf:
String Abstractions for String Verification. SPIN 2011: 20-37 - [e1]Fang Yu, Chao Wang:
Proceedings 13th International Workshop on Verification of Infinite-State Systems, INFINITY 2011, Taipei, Taiwan, 10th October 2011. EPTCS 73, 2011 [contents] - 2010
- [c18]Tevfik Bultan, Fang Yu, Aysu Betin-Can:
Modular verification of synchronization with reentrant locks. MEMOCODE 2010: 59-68 - [c17]Fang Yu, Muath Alkhalaf, Tevfik Bultan:
Stranger: An Automata-Based String Analysis Tool for PHP. TACAS 2010: 154-157 - [c16]Fang Yu, Tevfik Bultan, Oscar H. Ibarra:
Relational String Verification Using Multi-track Automata. CIAA 2010: 290-299
2000 – 2009
- 2009
- [c15]Fang Yu, Muath Alkhalaf, Tevfik Bultan:
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses. ASE 2009: 605-609 - [c14]Fang Yu, Tevfik Bultan, Oscar H. Ibarra:
Symbolic String Verification: Combining String Analysis and Size Analysis. TACAS 2009: 322-336 - 2008
- [j5]Oscar H. Ibarra, Sara Woodworth, Fang Yu, Andrei Paun:
On spiking neural P systems and partially blind counter machines. Nat. Comput. 7(1): 3-19 (2008) - [c13]Fang Yu, Chao Wang, Aarti Gupta, Tevfik Bultan:
Modular verification of web services using efficient symbolic encoding and summarization. SIGSOFT FSE 2008: 192-202 - [c12]Fang Yu, Tevfik Bultan, Marco Cova, Oscar H. Ibarra:
Symbolic String Verification: An Automata-Based Approach. SPIN 2008: 306-324 - 2007
- [c11]Fang Yu, Tevfik Bultan, Erik Peterson:
Automated size analysis for OCL. ESEC/SIGSOFT FSE 2007: 331-340 - 2006
- [j4]Fang Yu, Bow-Yaw Wang:
Sat-based Model Checking for Region Automata. Int. J. Found. Comput. Sci. 17(4): 775-796 (2006) - [j3]Farn Wang, Geng-Dian Huang, Fang Yu:
TCTL Inevitability Analysis of Dense-Time Systems: From Theory to Engineering. IEEE Trans. Software Eng. 32(7): 510-526 (2006) - [c10]Oscar H. Ibarra, Sara Woodworth, Fang Yu, Andrei Paun:
On Spiking Neural P Systems and Partially Blind Counter Machines. UC 2006: 113-129 - 2005
- [j2]Farn Wang, Geng-Dian Huang, Fang Yu:
Symbolic simulation of industrial real-time and embedded systems -experiments with the bluetooth baseband communication protocol. J. Embed. Comput. 1(1): 39-56 (2005) - [c9]Fang Yu, Chung-Hung Tsai, Yao-Wen Huang, D. T. Lee, Hung-Yau Lin, Sy-Yen Kuo:
Efficient Exact Spare Allocation via Boolean Satisfiability. DFT 2005: 361-370 - 2004
- [j1]Farn Wang, Karsten Schmidt, Fang Yu, Geng-Dian Huang, Bow-Yaw Wang:
BDD-Based Safety-Analysis of Concurrent Software with Pointer Data Structures Using Graph Automorphism Symmetry Reduction. IEEE Trans. Software Eng. 30(6): 403-417 (2004) - [c8]Fang Yu, Bow-Yaw Wang:
Toward Unbounded Model Checking for Region Automata. ATVA 2004: 20-33 - [c7]Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, D. T. Lee, Sy-Yen Kuo:
Verifying Web Applications Using Bounded Model Checking. DSN 2004: 199-208 - [c6]Fang Yu, Bow-Yaw Wang, Yao-Wen Huang:
Bounded Model Checking for Region Automata. FORMATS/FTRTFT 2004: 246-262 - [c5]Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, Der-Tsai Lee, Sy-Yen Kuo:
Securing web application code by static analysis and runtime protection. WWW 2004: 40-52 - 2003
- [c4]Farn Wang, Geng-Dian Hwang, Fang Yu:
Numerical Coverage Estimation for the Symbolic Simulation of Real-Time Systems. FORTE 2003: 160-176 - [c3]Farn Wang, Fang Yu:
OVL Assertion-Checking of Embedded Software with Dense-Time Semantics. RTCSA 2003: 254-278 - [c2]Farn Wang, Geng-Dian Huang, Fang Yu:
Symbolic Simulation of Real-Time Concurrent Systems. RTCSA 2003: 595-617 - [c1]Farn Wang, Geng-Dian Hwang, Fang Yu:
TCTL Inevitability Analysis of Dense-Time Systems. CIAA 2003: 176-187 - [i2]Farn Wang, Geng-Dian Hwang, Fang Yu:
TCTL Inevitability Analysis of Dense-time Systems. CoRR cs.SC/0304003 (2003) - [i1]Farn Wang, Geng-Dian Hwang, Fang Yu:
Numerical Coverage Estimation for the Symbolic Simulation of Real-Time Systems. CoRR cs.SE/0303027 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint