


default search action
Chenyi Zhang 0001
Person information
- affiliation: University of Canterbury, Christchurch, New Zealand
- affiliation (former): Jinan University, College of Information Science and Technology, Guangzhou, China
- affiliation (former): Oracle Labs Australia, Brisbane, QLD, Australia
- affiliation (former): University of Queensland, Brisbane, QLD, Australia
- affiliation (former): University of Luxembourg, Faculty of Sciences, Technology and Communication, Luxembourg
- affiliation (PhD): University of New South Wales, Sydney, NSW, Australia
Other persons with the same name
- Chenyi Zhang — disambiguation page
- Chenyi Zhang 0002
— Huawei Technologies, Shenzhen, China (and 2 more) - Chenyi Zhang 0003 — Stanford University, Computer Science Department, Stanford, CA, USA
- Chenyi Zhang 0004 — Beijing Jiaotong University, Institute of Information Science, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j19]Ming Li
, Chenyi Zhang
, Qin Li
:
Monotonic learning in the PAC framework: A new perspective. Knowl. Based Syst. 330: 114504 (2025)
[c29]Liangda Fang, Shikang Chen, Xiaoman Wang, Xiaoyou Lin, Chenyi Zhang, Qingliang Chen, Quanlong Guan, Kaile Su:
Automatic Verification of Linear Integer Planning Programs via Forgetting in LIAUPF. AAMAS 2025: 722-730
[i9]Fangzhen Zhao, Chenyi Zhang, Naipeng Dong, Ming Li, Jinxiao Shan:
Anomaly Detection Based on Critical Paths for Deep Neural Networks. CoRR abs/2505.14967 (2025)- 2024
[j18]Yulin Bao, Chenyi Zhang
, Kaile Su
:
Call-Graph-Based Context-Sensitive Points-to Analysis for Java. IEEE Trans. Reliab. 73(2): 851-860 (2024)- 2023
[j17]Fangzhen Zhao
, Chenyi Zhang
, Naipeng Dong
, Ming Li
:
Adversarial Detection from Derived Models. Int. J. Pattern Recognit. Artif. Intell. 37(15): 2350031:1-2350031:30 (2023)
[j16]Ming Li
, Chenyi Zhang
, Qin Li
, Shuangqin Cheng
:
Monotonic learning with hypothesis evolution. Inf. Sci. 647: 119455 (2023)- 2022
[j15]Weizhen Xu, Chenyi Zhang, Fangzhen Zhao, Liangda Fang:
A Mask-Based Adversarial Defense Scheme. Algorithms 15(12): 461 (2022)
[j14]Fangzhen Zhao, Chenyi Zhang
, Naipeng Dong, Zefeng You, Zhenxin Wu:
A Uniform Framework for Anomaly Detection in Deep Neural Networks. Neural Process. Lett. 54(4): 3467-3488 (2022)
[j13]Chenyi Zhang
, Jun Pang
:
Modal characterisation of simulation relations in probabilistic concurrent games. Sci. Comput. Program. 215: 102762 (2022)
[c28]Yulin Bao, Chenyi Zhang, Xilong Zhuo, Yongliang Wang:
Parameter Sensitive Pointer Analysis for Java. ICECCS 2022: 162-167
[c27]Yaju Li, Chenyi Zhang, Qin Li:
Taint Trace Analysis For Java Web Applications. SEKE 2022: 184-189
[i8]Weizhen Xu, Chenyi Zhang, Fangzhen Zhao, Liangda Fang:
A Mask-Based Adversarial Defense Scheme. CoRR abs/2204.11837 (2022)- 2021
[i7]Fangzhen Zhao, Chenyi Zhang, Naipeng Dong, Zefeng You, Zhenxin Wu:
A Uniform Framework for Anomaly Detection in Deep Neural Networks. CoRR abs/2110.03092 (2021)- 2020
[j12]Chenyi Zhang
:
Minimal consistent DFA from sample strings. Acta Informatica 57(3-5): 657-670 (2020)
[j11]Xilong Zhuo, Chenyi Zhang
:
TFA: an efficient and precise virtual method call resolution for Java. Formal Aspects Comput. 32(4-6): 395-416 (2020)
[j10]Chenyi Zhang
, Jun Pang:
Preface for the special issue of the 12th International Symposium on Theoretical Aspects of Software Engineering (TASE 2018). Sci. Comput. Program. 187: 102375 (2020)
[c26]Yi Lu, Chenyi Zhang
:
Nontransitive Security Types for Coarse-grained Information Flow Control. CSF 2020: 199-213
[c25]Chenyi Zhang
, Jun Pang:
Characterising Probabilistic Alternating Simulation for Concurrent Games. TASE 2020: 121-128
2010 – 2019
- 2019
[c24]Xilong Zhuo, Chenyi Zhang
:
A Relational Static Semantics for Call Graph Construction. ICFEM 2019: 322-335
[i6]Chenyi Zhang, Jun Pang:
Characterising Probabilistic Alternating Simulation for Concurrent Games. CoRR abs/1907.03928 (2019)
[i5]Xilong Zhuo, Chenyi Zhang:
A Relational Static Semantics for Call Graph Construction. CoRR abs/1907.06522 (2019)- 2018
[j9]Roberto Amadini, Graeme Gange, François Gauthier, Alexander Jordan
, Peter Schachte
, Harald Søndergaard
, Peter J. Stuckey, Chenyi Zhang
:
Reference Abstract Domains and Applications to String Analysis. Fundam. Informaticae 158(4): 297-326 (2018)
[e1]Jun Pang, Chenyi Zhang, Jifeng He, Jian Weng:
2018 International Symposium on Theoretical Aspects of Software Engineering, TASE 2018, Guangzhou, China, August 29-31, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7305-8 [contents]- 2017
[c23]Patrick Doolan, Graeme Smith
, Chenyi Zhang
, Padmanabhan Krishnan:
Improving the Scalability of Automatic Linearizability Checking in SPIN. ICFEM 2017: 105-121
[c22]Roberto Amadini, Alexander Jordan
, Graeme Gange
, François Gauthier, Peter Schachte
, Harald Søndergaard
, Peter J. Stuckey, Chenyi Zhang
:
Combining String Abstract Domains for JavaScript Analysis: An Evaluation. TACAS (1) 2017: 41-57- 2016
[j8]Franck Cassez
, Ron van der Meyden
, Chenyi Zhang
:
The complexity of synchronous notions of information flow security. Theor. Comput. Sci. 631: 16-42 (2016)- 2015
[j7]Lijun Wu, Kaile Su
, Shaowei Cai, Xiaosong Zhang, Chenyi Zhang
, Shupeng Wang:
An I/O Efficient Approach for Detecting All Accepting Cycles. IEEE Trans. Software Eng. 41(8): 730-744 (2015)- 2014
[i4]Franck Cassez, Ron van der Meyden, Chenyi Zhang:
The Complexity of Synchronous Notions of Information Flow Security. CoRR abs/1402.0601 (2014)- 2013
[j6]Zhiyuan Liu, Jun Pang, Chenyi Zhang
:
Design and formal verification of a CEM protocol with transparent TTP. Frontiers Comput. Sci. 7(2): 279-297 (2013)
[j5]Ron van der Meyden
, Chenyi Zhang
:
Information flow in systems with schedulers, Part I: Definitions. Theor. Comput. Sci. 467: 68-88 (2013)
[j4]Ron van der Meyden
, Chenyi Zhang
:
Information flow in systems with schedulers, Part II: Refinement. Theor. Comput. Sci. 484: 70-92 (2013)
[c21]Kirsten Winter, Chenyi Zhang
, Ian J. Hayes
, Nathan Keynes, Cristina Cifuentes, Lian Li:
Path-Sensitive Data Flow Analysis Simplified. ICFEM 2013: 415-430- 2012
[j3]Ying Zhang, Chenyi Zhang
, Jun Pang, Sjouke Mauw
:
Game-based verification of contract signing protocols with minimal messages. Innov. Syst. Softw. Eng. 8(2): 111-124 (2012)
[j2]Yanjie Sun, Chenyi Zhang
, Jun Pang, Baptiste Alcalde, Sjouke Mauw
:
A trust-augmented voting scheme for collaborative privacy management. J. Comput. Secur. 20(4): 437-459 (2012)
[c20]Xiaowei Huang, Kaile Su, Chenyi Zhang:
Probabilistic Alternating-Time Temporal Logic of Incomplete Information and Synchronous Perfect Recall. AAAI 2012: 765-771
[c19]Kai Engelhardt, Ron van der Meyden
, Chenyi Zhang
:
Intransitive noninterference in nondeterministic systems. CCS 2012: 869-880
[c18]Yi Lu, John Potter, Chenyi Zhang
, Jingling Xue
:
A Type and Effect System for Determinism in Multithreaded Programs. ESOP 2012: 518-538
[c17]Surinder Kumar Jain, Chenyi Zhang
, Bernhard Scholz:
Translating flowcharts to non-deterministic languages. PEPM 2012: 155-162
[c16]Chenyi Zhang
, Jun Pang:
An Algorithm for Probabilistic Alternating Simulation. SOFSEM 2012: 431-442- 2011
[c15]Chenyi Zhang
:
Conditional Information Flow Policies and Unwinding Relations. TGC 2011: 227-241
[i3]Chenyi Zhang, Jun Pang:
An Algorithm for Probabilistic Alternating Simulation. CoRR abs/1106.1978 (2011)- 2010
[j1]Ron van der Meyden
, Chenyi Zhang
:
A comparison of semantic models for noninterference. Theor. Comput. Sci. 411(47): 4123-4147 (2010)
[c14]Zhiyuan Liu, Jun Pang, Chenyi Zhang
:
Extending a Key-Chain Based Certified Email Protocol with Transparent TTP. EUC 2010: 630-636
[c13]Franck Cassez
, Ron van der Meyden
, Chenyi Zhang
:
The Complexity of Synchronous Notions of Information Flow Security. FoSSaCS 2010: 282-296
[c12]Chenyi Zhang
, Jun Pang:
On Probabilistic Alternating Simulations. IFIP TCS 2010: 71-85
[c11]Yanjie Sun, Chenyi Zhang
, Jun Pang, Baptiste Alcalde, Sjouke Mauw
:
A Trust-Augmented Voting Scheme for Collaborative Privacy Management. STM 2010: 132-146
[c10]Zhiyuan Liu, Jun Pang, Chenyi Zhang
:
Verification of A Key Chain Based TTP Transparent CEM Protocol. TTSS 2010: 51-65
[i2]Chenyi Zhang, Jun Pang:
On Probabilistic Alternating Simulations. CoRR abs/1003.0788 (2010)
[i1]Chenyi Zhang:
Unwinding Conditional Noninterference. CoRR abs/1003.3893 (2010)
2000 – 2009
- 2009
[b1]Chenyi Zhang:
Information flow security - models, verification and schedulers. University of New South Wales, Sydney, Australia, 2009
[c9]Ying Zhang, Chenyi Zhang, Jun Pang, Sjouke Mauw
:
Game-Based Verification of Multi-Party Contract Signing Protocols. Formal Aspects in Security and Trust 2009: 186-200
[c8]Jun Pang, Chenyi Zhang
:
How to Work with Honest but Curious Judges? (Preliminary Report). SECCO 2009: 31-45- 2008
[c7]Ron van der Meyden
, Chenyi Zhang
:
Information Flow in Systems with Schedulers. CSF 2008: 301-312
[c6]Bernhard Scholz, Chenyi Zhang
, Cristina Cifuentes:
User-Input Dependence Analysis via Graph Reachability. SCAM 2008: 25-34- 2007
[c5]Yuxin Deng
, Rob J. van Glabbeek, Carroll Morgan, Chenyi Zhang
:
Scalar Outcomes Suffice for Finitary Probabilistic Testing. ESOP 2007: 363-378
[c4]Yuxin Deng
, Rob J. van Glabbeek, Matthew Hennessy, Carroll Morgan, Chenyi Zhang
:
Characterising Testing Preorders for Finite Probabilistic Processes. LICS 2007: 313-325
[c3]Yuxin Deng
, Rob J. van Glabbeek, Matthew Hennessy, Carroll Morgan, Chenyi Zhang
:
Remarks on Testing Probabilistic Processes. Computation, Meaning, and Logic 2007: 359-397- 2006
[c2]Ron van der Meyden, Chenyi Zhang
:
A Comparison of Semantic Models for Noninterference. Formal Aspects in Security and Trust 2006: 235-249
[c1]Ron van der Meyden
, Chenyi Zhang
:
Algorithmic Verification of Noninterference Properties. VODCA@FOSAD 2006: 61-75
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-04 00:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







