关注
Shang-Wei Lin
Shang-Wei Lin
在 ntu.edu.sg 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Steelix: program-state based binary fuzzing
Y Li, B Chen, M Chandramohan, SW Lin, Y Liu, A Tiu
Proceedings of the 2017 11th joint meeting on foundations of software …, 2017
3482017
A survey of smart contract formal specification and verification
P Tolmach, Y Li, SW Lin, Y Liu, Z Li
ACM Computing Surveys (CSUR) 54 (7), 1-38, 2021
1632021
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices
R Feng, S Chen, X Xie, G Meng, SW Lin, Y Liu
IEEE Transactions on Information Forensics and Security 16, 1563-1578, 2020
1162020
Semantic understanding of smart contracts: Executable operational semantics of solidity
J Jiao, S Kan, SW Lin, D Sanan, Y Liu, J Sun
2020 IEEE Symposium on Security and Privacy (SP), 1695-1712, 2020
103*2020
Vultron: catching vulnerable smart contracts once and for all
H Wang, Y Li, SW Lin, L Ma, Y Liu
2019 IEEE/ACM 41st International Conference on Software Engineering: New …, 2019
762019
Hdskg: Harvesting domain specific knowledge graph from content of webpages
X Zhao, Z Xing, MA Kabir, N Sawada, J Li, SW Lin
2017 ieee 24th international conference on software analysis, evolution and …, 2017
762017
VERTAF: An application framework for the design and verification of embedded real-time software
PA Hsiung, SW Lin, CH Tseng, TY Lee, JM Fu, WB See
IEEE Transactions on Software Engineering 30 (10), 656-674, 2004
652004
Oracle-supported dynamic exploit generation for smart contracts
H Wang, Y Liu, Y Li, SW Lin, C Artho, L Ma, Y Liu
IEEE Transactions on Dependable and Secure Computing 19 (3), 1795-1809, 2020
552020
Mobidroid: A performance-sensitive malware detection system on mobile platform
R Feng, S Chen, X Xie, L Ma, G Meng, Y Liu, SW Lin
2019 24th International Conference on Engineering of Complex Computer …, 2019
502019
A real-time and fully distributed approach to motion planning for multirobot systems
Y Zhou, H Hu, Y Liu, SW Lin, Z Ding
IEEE Transactions on Systems, Man, and Cybernetics: Systems 49 (12), 2636-2650, 2017
462017
A neural model for method name generation from functional description
S Gao, C Chen, Z Xing, Y Ma, W Song, SW Lin
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
452019
Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack
Y Cheng, Q Guo, F Juefei-Xu, SW Lin, W Feng, W Lin, Y Liu
IEEE Transactions on Multimedia 24, 3807-3822, 2021
442021
Formal analysis of composable DeFi protocols
P Tolmach, Y Li, SW Lin, Y Liu
Financial Cryptography and Data Security. FC 2021 International Workshops …, 2021
422021
Automatic loop-invariant generation anc refinement through selective sampling
J Li, J Sun, L Li, QL Le, SW Lin
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
402017
Learning Assumptions for Compositional Verification of Timed Systems
SW Lin, É André, Y Liu, J Sun, JS Dong
IEEE Transactions on Software Engineering 40 (2), 137-153, 2014
392014
A distributed approach to robust control of multi-robot systems
Y Zhou, H Hu, Y Liu, SW Lin, Z Ding
Automatica 98, 1-13, 2018
382018
Tzuyu: Learning stateful typestates
H Xiao, J Sun, Y Liu, SW Lin, C Sun
2013 28th IEEE/ACM International Conference on Automated Software …, 2013
362013
Finding Permission Bugs in Smart Contracts with Role Mining
Y Liu, Y Li, SW Lin, C Artho
ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2022
322022
ModCon: A model-based testing platform for smart contracts
Y Liu, Y Li, SW Lin, Q Yan
Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020
322020
An efficient algorithm for learning event-recording automata
SW Lin, É André, JS Dong, J Sun, Y Liu
Automated Technology for Verification and Analysis: 9th International …, 2011
322011
系统目前无法执行此操作,请稍后再试。
文章 1–20