default search action
Fu Song
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Pu Sun, Fu Song, Yuqi Chen, Taolue Chen:
EasyBC: A Cryptography-Specific Language for Security Analysis of Block Ciphers against Differential Cryptanalysis. Proc. ACM Program. Lang. 8(POPL): 848-881 (2024) - [j29]Luwei Cai, Fu Song, Taolue Chen:
Towards Efficient Verification of Constant-Time Cryptographic Implementations. Proc. ACM Softw. Eng. 1(FSE): 1019-1042 (2024) - [j28]Huiyu Tan, Pengfei Gao, Fu Song, Taolue Chen, Zhilin Wu:
SAT-based Formal Verification of Fault Injection Countermeasures for Cryptographic Circuits. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 1-39 (2024) - [j27]Zhe Zhao, Guangke Chen, Tong Liu, Taishan Li, Fu Song, Jingyi Wang, Jun Sun:
Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples. ACM Trans. Softw. Eng. Methodol. 33(3): 68:1-68:45 (2024) - [j26]Pengfei Gao, Fu Song, Taolue Chen:
Compositional Verification of First-Order Masking Countermeasures against Power Side-Channel Attacks. ACM Trans. Softw. Eng. Methodol. 33(3): 79:1-79:38 (2024) - [j25]Jiaxiang Liu, Yunhan Xing, Xiaomu Shi, Fu Song, Zhiwu Xu, Zhong Ming:
Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks. ACM Trans. Softw. Eng. Methodol. 33(5): 129:1-129:35 (2024) - [c54]Zichen Wang, Jingyi Wang, Fu Song, Kun Wang, Hongyi Pu, Peng Cheng:
K-RAPID: A Formal Executable Semantics of the RAPID Robot Programming Language. CPSS@AsiaCCS 2024: 64-76 - [c53]Huiyu Tan, Xi Yang, Fu Song, Taolue Chen, Zhilin Wu:
Compositional Verification of Cryptographic Circuits Against Fault Injection Attacks. FM (2) 2024: 189-207 - [c52]Yedi Zhang, Guangke Chen, Fu Song, Jun Sun, Jin Song Dong:
Certified Quantization Strategy Synthesis for Neural Networks. FM (1) 2024: 343-362 - [c51]Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Li Li:
When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference. ICSE 2024: 75:1-75:12 - [c50]Zhensu Sun, Xiaoning Du, Xiapu Luo, Fu Song, David Lo, Li Li:
FDI: Attack Neural Code Generation Systems through User Feedback Channel. ISSTA 2024: 528-540 - [c49]Guangke Chen, Yedi Zhang, Fu Song:
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems. NDSS 2024 - [i32]Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Li Li:
When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference. CoRR abs/2401.09964 (2024) - [i31]Guangke Chen, Yedi Zhang, Fu Song, Ting Wang, Xiaoning Du, Yang Liu:
A Proactive and Dual Prevention Mechanism against Illegal Song Covers empowered by Singing Voice Conversion. CoRR abs/2401.17133 (2024) - [i30]Luwei Cai, Fu Song, Taolue Chen:
Towards Efficient Verification of Constant-Time Cryptographic Implementations. CoRR abs/2402.13506 (2024) - [i29]Zhensu Sun, Xiaoning Du, Xiapu Luo, Fu Song, David Lo, Li Li:
FDI: Attack Neural Code Generation Systems through User Feedback Channel. CoRR abs/2408.04194 (2024) - 2023
- [j24]Pu Sun, Sen Chen, Lingling Fan, Pengfei Gao, Fu Song, Min Yang:
VenomAttack: automated and adaptive activity hijacking in Android. Frontiers Comput. Sci. 17(1): 171801 (2023) - [j23]Pengfei Gao, Yedi Zhang, Fu Song, Taolue Chen, François-Xavier Standaert:
Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks. Proc. ACM Program. Lang. 7(OOPSLA2): 1817-1847 (2023) - [j22]Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Feng Wang, Jiashui Wang:
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition. IEEE Trans. Dependable Secur. Comput. 20(5): 3970-3987 (2023) - [j21]Yedi Zhang, Zhe Zhao, Guangke Chen, Fu Song, Taolue Chen:
Precise Quantitative Analysis of Binarized Neural Networks: A BDD-based Approach. ACM Trans. Softw. Eng. Methodol. 32(3): 62:1-62:51 (2023) - [c48]Ye Tao, Wanwei Liu, Fu Song, Zhen Liang, Ji Wang, Hongxu Zhu:
An Automata-Theoretic Approach to Synthesizing Binarized Neural Networks. ATVA (1) 2023: 380-400 - [c47]Mingyang Liu, Fu Song, Taolue Chen:
Automated Verification of Correctness for Masked Arithmetic Programs. CAV (3) 2023: 255-280 - [c46]Yedi Zhang, Fu Song, Jun Sun:
QEBVerif: Quantization Error Bound Verification of Neural Networks. CAV (2) 2023: 413-437 - [c45]Limin Wang, Lei Bu, Fu Song:
SCAGuard: Detection and Classification of Cache Side-Channel Attacks via Attack Behavior Modeling and Similarity Comparison. DAC 2023: 1-6 - [c44]Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Mingze Ni, Li Li:
Don't Complete It! Preventing Unhelpful Code Completion for Productive and Sustainable Neural Code Completion Systems. ICSE Companion 2023: 324-325 - [c43]Zhensu Sun, Xiaoning Du, Fu Song, Li Li:
CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models. ESEC/SIGSOFT FSE 2023: 1561-1572 - [c42]Guangke Chen, Yedi Zhang, Zhe Zhao, Fu Song:
QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems. USENIX Security Symposium 2023: 2437-2454 - [i28]Guangke Chen, Yedi Zhang, Zhe Zhao, Fu Song:
QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems. CoRR abs/2305.14097 (2023) - [i27]Mingyang Liu, Fu Song, Taolue Chen:
Automated Verification of Correctness for Masked Arithmetic Programs. CoRR abs/2305.16596 (2023) - [i26]Huiyu Tan, Pengfei Gao, Taolue Chen, Fu Song, Zhilin Wu:
SAT-based Formal Fault-Resistance Verification of Cryptographic Circuits. CoRR abs/2307.00561 (2023) - [i25]Ye Tao, Wanwei Liu, Fu Song, Zhen Liang, Ji Wang, Hongxu Zhu:
An Automata-Theoretic Approach to Synthesizing Binarized Neural Networks. CoRR abs/2307.15907 (2023) - [i24]Weijie Shao, Yuyang Gao, Fu Song, Sen Chen, Lingling Fan:
An Empirical Study of Bugs in Open-Source Federated Learning Framework. CoRR abs/2308.05014 (2023) - [i23]Zhensu Sun, Xiaoning Du, Fu Song, Li Li:
CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models. CoRR abs/2308.14401 (2023) - [i22]Guangke Chen, Yedi Zhang, Fu Song:
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems. CoRR abs/2309.07983 (2023) - 2022
- [j20]Pengfei Gao, Yongjie Xu, Fu Song, Taolue Chen:
Model-based automated testing of JavaScript Web applications via longer test sequences. Frontiers Comput. Sci. 16(3): 163204 (2022) - [j19]Min Yang, Chao Zhang, Fu Song, Yuan Zhang:
Preface to Special Issue on System Software Security. Int. J. Softw. Informatics 12(3): 259-261 (2022) - [j18]Yongjie Xu, Fu Song, Taolue Chen:
ESampler: Boosting sampling of satisfying assignments for Boolean formulas via derivation. J. Syst. Archit. 129: 102615 (2022) - [j17]Lei Bu, Zhe Zhao, Yuchao Duan, Fu Song:
Taking Care of the Discretization Problem: A Comprehensive Study of the Discretization Problem and a Black-Box Adversarial Attack in Discrete Integer Domain. IEEE Trans. Dependable Secur. Comput. 19(5): 3200-3217 (2022) - [j16]Pengfei Gao, Hongyi Xie, Pu Sun, Jun Zhang, Fu Song, Taolue Chen:
Formal Verification of Masking Countermeasures for Arithmetic Programs. IEEE Trans. Software Eng. 48(3): 973-1000 (2022) - [c41]Yuxin Fan, Fu Song, Taolue Chen, Liangfeng Zhang, Wanwei Liu:
PoS4MPC: Automated Security Policy Synthesis for Secure Multi-party Computation. CAV (1) 2022: 385-406 - [c40]Yedi Zhang, Zhe Zhao, Guangke Chen, Fu Song, Min Zhang, Taolue Chen, Jun Sun:
QVIP: An ILP-based Formal Verification Approach for Quantized Neural Networks. ASE 2022: 82:1-82:13 - [c39]Zhe Zhao, Yedi Zhang, Guangke Chen, Fu Song, Taolue Chen, Jiaxiang Liu:
CLEVEREST: Accelerating CEGAR-based Neural Network Verification via Adversarial Attacks. SAS 2022: 449-473 - [c38]Qi Qin, JulianAndres JiYang, Fu Song, Taolue Chen, Xinyu Xing:
DeJITLeak: eliminating JIT-induced timing side-channel leaks. ESEC/SIGSOFT FSE 2022: 872-884 - [c37]Zhensu Sun, Xiaoning Du, Fu Song, Mingze Ni, Li Li:
CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning. WWW 2022: 652-660 - [i21]Qi Qin, JulianAndres JiYang, Fu Song, Taolue Chen, Xinyu Xing:
Preventing Timing Side-Channels via Security-Aware Just-In-Time Compilation. CoRR abs/2202.13134 (2022) - [i20]Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Yang Liu:
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems. CoRR abs/2206.03351 (2022) - [i19]Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Feng Wang, Jiashui Wang:
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition. CoRR abs/2206.03393 (2022) - [i18]Jiaxiang Liu, Yunhan Xing, Xiaomu Shi, Fu Song, Zhiwu Xu, Zhong Ming:
Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks. CoRR abs/2207.00759 (2022) - [i17]Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Mingze Ni, Li Li:
Learning to Prevent Profitless Neural Code Completion. CoRR abs/2209.05948 (2022) - [i16]Yedi Zhang, Fu Song, Jun Sun:
QEBVerif: Quantization Error Bound Verification of Neural Networks. CoRR abs/2212.02781 (2022) - [i15]Yedi Zhang, Zhe Zhao, Fu Song, Min Zhang, Taolue Chen, Jun Sun:
QVIP: An ILP-based Formal Verification Approach for Quantized Neural Networks. CoRR abs/2212.11138 (2022) - 2021
- [j15]Fu Song, Yusi Lei, Sen Chen, Lingling Fan, Yang Liu:
Advanced evasion attacks and mitigations on practical ML-based phishing website classifiers. Int. J. Intell. Syst. 36(9): 5210-5240 (2021) - [j14]Pengfei Gao, Hongyi Xie, Fu Song, Taolue Chen:
A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs. ACM Trans. Softw. Eng. Methodol. 30(3): 26:1-26:42 (2021) - [c36]Yedi Zhang, Zhe Zhao, Guangke Chen, Fu Song, Taolue Chen:
BDD4BNN: A BDD-Based Quantitative Analysis Framework for Binarized Neural Networks. CAV (1) 2021: 175-200 - [c35]Xingwu Guo, Wenjie Wan, Zhaodi Zhang, Min Zhang, Fu Song, Xuejun Wen:
Eager Falsification for Accelerating Robustness Verification of Deep Neural Networks. ISSRE 2021: 345-356 - [c34]Sen Chen, Lingling Fan, Cuiyun Gao, Fu Song, Yang Liu:
Peeking into the Gray Area of Mobile World: An Empirical Study of Unlabeled Android Apps. ISSRE 2021: 579-590 - [c33]Zhe Zhao, Guangke Chen, Jingyi Wang, Yiwei Yang, Fu Song, Jun Sun:
Attack as defense: characterizing adversarial examples using robustness. ISSTA 2021: 42-55 - [c32]Yongjie Xu, Fu Song, Taolue Chen:
ESampler: Efficient Sampling of Satisfying Assignments for Boolean Formulas. SETTA 2021: 279-298 - [c31]Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu:
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. SP 2021: 694-711 - [c30]Yingwen Lin, Yao Zhang, Sen Chen, Fu Song, Xiaofei Xie, Xiaohong Li, Lintan Sun:
Inferring Loop Invariants for Multi-Path Loops. TASE 2021: 63-70 - [i14]Yedi Zhang, Zhe Zhao, Guangke Chen, Fu Song, Taolue Chen:
BDD4BNN: A BDD-based Quantitative Analysis Framework for Binarized Neural Networks. CoRR abs/2103.07224 (2021) - [i13]Zhe Zhao, Guangke Chen, Jingyi Wang, Yiwei Yang, Fu Song, Jun Sun:
Attack as Defense: Characterizing Adversarial Examples using Robustness. CoRR abs/2103.07633 (2021) - [i12]Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Yang Liu:
SEC4SR: A Security Analysis Platform for Speaker Recognition. CoRR abs/2109.01766 (2021) - [i11]Zhensu Sun, Xiaoning Du, Fu Song, Mingze Ni, Li Li:
CoProtector: Protect Open-Source Code against Unauthorized Training Usage with Data Poisoning. CoRR abs/2110.12925 (2021) - 2020
- [j13]Wan-Wei Liu, Fu Song, Tang-Hao-Ran Zhang, Ji Wang:
Verifying ReLU Neural Networks from a Model Checking Perspective. J. Comput. Sci. Technol. 35(6): 1365-1381 (2020) - [c29]Yifei Xu, Zhengzi Xu, Bihuan Chen, Fu Song, Yang Liu, Ting Liu:
Patch based vulnerability matching for binary programs. ISSTA 2020: 376-387 - [i10]Yusi Lei, Sen Chen, Lingling Fan, Fu Song, Yang Liu:
Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers. CoRR abs/2004.06954 (2020) - [i9]Pengfei Gao, Hongyi Xie, Fu Song, Taolue Chen:
A Hybrid Approach to Formal Verification of Higher-Order Masked Arithmetic Programs. CoRR abs/2006.09171 (2020) - [i8]Wenjie Wan, Zhaodi Zhang, Yiwei Zhu, Min Zhang, Fu Song:
Accelerating Robustness Verification of Deep Neural Networks Guided by Target Labels. CoRR abs/2007.08520 (2020)
2010 – 2019
- 2019
- [j12]Yedi Zhang, Fu Song, Taolue Chen:
Making Agents' Abilities Explicit. IEEE Access 7: 101804-101819 (2019) - [j11]Haiyu Pan, Fu Song, Yongzhi Cao, Junyan Qian:
Fuzzy Pushdown Termination Games. IEEE Trans. Fuzzy Syst. 27(4): 760-774 (2019) - [j10]Pengfei Gao, Jun Zhang, Fu Song, Chao Wang:
Verifying and Quantifying Side-channel Resistance of Masked Software Implementations. ACM Trans. Softw. Eng. Methodol. 28(3): 16:1-16:32 (2019) - [c28]Fu Song, Yedi Zhang, Taolue Chen, Yu Tang, Zhiwu Xu:
Probabilistic Alternating-Time µ-Calculus. AAAI 2019: 6179-6186 - [c27]Min Zhang, Fu Song, Frédéric Mallet, Xiaohong Chen:
SMT-Based Bounded Schedulability Analysis of the Clock Constraint Specification Language. FASE 2019: 61-78 - [c26]Pengfei Gao, Hongyi Xie, Jun Zhang, Fu Song, Taolue Chen:
Quantitative Verification of Masked Arithmetic Programs Against Side-Channel Attacks. TACAS (1) 2019: 155-173 - [c25]Zhiwu Xu, Kerong Ren, Fu Song:
Android Malware Family Classification and Characterization Using CFG and DFG. TASE 2019: 49-56 - [i7]Pengfei Gao, Hongyi Xie, Jun Zhang, Fu Song, Taolue Chen:
Quantitative Verification of Masked Arithmetic Programs against Side-Channel Attacks. CoRR abs/1901.09706 (2019) - [i6]Pengfei Gao, Fu Song, Taolue Chen, Yao Zeng, Ting Su:
Model-based Automated Testing of JavaScript Web Applications via Longer Test Sequences. CoRR abs/1905.07671 (2019) - [i5]Yuchao Duan, Zhe Zhao, Lei Bu, Fu Song:
Things You May Not Know About Adversarial Example: A Black-box Adversarial Image Attack. CoRR abs/1905.07672 (2019) - [i4]Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu:
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. CoRR abs/1911.01840 (2019) - 2018
- [j9]Yueling Zhang, Min Zhang, Geguang Pu, Fu Song, Jianwen Li:
Towards backbone computing: A Greedy-Whitening based approach. AI Commun. 31(3): 267-280 (2018) - [j8]Fu Song:
Analyzing pushdown systems with stack manipulation. Inf. Comput. 259(1): 41-71 (2018) - [c24]Jun Zhang, Pengfei Gao, Fu Song, Chao Wang:
SCInfer: Refinement-Based Verification of Software Countermeasures Against Side-Channel Attacks. CAV (2) 2018: 157-177 - [c23]Taolue Chen, Jinlong He, Fu Song, Guozhen Wang, Zhilin Wu, Jun Yan:
Android Stack Machine. CAV (2) 2018: 487-504 - [c22]Feng Wang, Fu Song, Min Zhang, Xiaoran Zhu, Jun Zhang:
KRust: A Formal Executable Semantics of Rust. TASE 2018: 44-51 - [i3]Feng Wang, Fu Song, Min Zhang, Xiaoran Zhu, Jun Zhang:
KRust: A Formal Executable Semantics of Rust. CoRR abs/1804.10806 (2018) - [i2]Yedi Zhang, Fu Song, Taolue Chen:
Making Agents' Abilities Explicit. CoRR abs/1811.10901 (2018) - 2017
- [j7]Yusi Lei, Fu Song, Wanwei Liu, Min Zhang:
On the complexity of ω-pushdown automata. Sci. China Inf. Sci. 60(11): 112102:1-112102:15 (2017) - [c21]Taolue Chen, Fu Song, Zhilin Wu:
Tractability of Separation Logic with Inductive Definitions: Beyond Lists. CONCUR 2017: 37:1-37:17 - [c20]Taolue Chen, Fu Song, Zhilin Wu:
Model Checking Pushdown Epistemic Game Structures. ICFEM 2017: 36-53 - [c19]Zhengzi Xu, Bihuan Chen, Mahinthan Chandramohan, Yang Liu, Fu Song:
SPAIN: security patch analysis for binaries towards understanding the pain and pills. ICSE 2017: 462-472 - [c18]Wanwei Liu, Fu Song, Ge Zhou:
Reasoning About Periodicity on Infinite Words. SETTA 2017: 200-215 - [c17]Yueling Zhang, Jianwen Li, Min Zhang, Geguang Pu, Fu Song:
Optimizing backbone filtering. TASE 2017: 1-8 - 2016
- [j6]Fu Song, Zhilin Wu:
On temporal logics with data variable quantifications: Decidability and complexity. Inf. Comput. 251: 104-139 (2016) - [j5]Ya Gao, Peng Zeng, Kim-Kwang Raymond Choo, Fu Song:
An Improved Online/Offline Identity-Based Signature Scheme for WSNs. Int. J. Netw. Secur. 18(6): 1143-1151 (2016) - [j4]Fu Song, Tayssir Touili:
Model-checking software library API usage rules. Softw. Syst. Model. 15(4): 961-985 (2016) - [c16]Taolue Chen, Fu Song, Zhilin Wu:
Global Model Checking on Pushdown Multi-Agent Systems. AAAI 2016: 2459-2465 - [c15]Taolue Chen, Fu Song, Zhilin Wu:
Verifying Pushdown Multi-Agent Systems against Strategy Logics. IJCAI 2016: 180-186 - [c14]Taolue Chen, Fu Song, Zhilin Wu:
Formal Reasoning on Infinite Data Values: An Ongoing Quest. SETSS 2016: 195-257 - [i1]Fu Song, Tayssir Touili:
LTL Model-Checking for Dynamic Pushdown Networks Communicating via Locks. CoRR abs/1611.02528 (2016) - 2015
- [j3]Fu Song, Tayssir Touili:
Model checking dynamic pushdown networks. Formal Aspects Comput. 27(2): 397-421 (2015) - [c13]Taolue Chen, Fu Song, Zhilin Wu:
On the Satisfiability of Indexed Linear Temporal Logics. CONCUR 2015: 254-267 - [c12]Fu Song, Weikai Miao, Geguang Pu, Min Zhang:
On Reachability Analysis of Pushdown Systems with Transductions: Application to Boolean Programs with Call-by-Reference. CONCUR 2015: 383-397 - [c11]Bo Li, Mengdi Wang, Yongxin Zhao, Geguang Pu, Huibiao Zhu, Fu Song:
Modeling and Verifying Google File System. HASE 2015: 207-214 - 2014
- [j2]Fu Song, Tayssir Touili:
Pushdown model checking for malware detection. Int. J. Softw. Tools Technol. Transf. 16(2): 147-173 (2014) - [j1]Fu Song, Tayssir Touili:
Efficient CTL model-checking for pushdown systems. Theor. Comput. Sci. 549: 127-145 (2014) - [c10]Fu Song, Tayssir Touili:
Model-Checking for Android Malware Detection. APLAS 2014: 216-235 - [c9]Fu Song, Zhilin Wu:
Extending Temporal Logics with Data Variable Quantifications. FSTTCS 2014: 253-265 - 2013
- [c8]Fu Song, Tayssir Touili:
Model Checking Dynamic Pushdown Networks. APLAS 2013: 33-49 - [c7]Fu Song, Tayssir Touili:
Model-Checking Software Library API Usage Rules. IFM 2013: 192-207 - [c6]Fu Song, Tayssir Touili:
PoMMaDe: pushdown model-checking for malware detection. ESEC/SIGSOFT FSE 2013: 607-610 - [c5]Fu Song, Tayssir Touili:
LTL Model-Checking for Malware Detection. TACAS 2013: 416-431 - 2012
- [c4]Fu Song, Tayssir Touili:
Efficient Malware Detection Using Model-Checking. FM 2012: 418-433 - [c3]Fu Song, Tayssir Touili:
PuMoC: a CTL model-checker for sequential programs. ASE 2012: 346-349 - [c2]Fu Song, Tayssir Touili:
Pushdown Model Checking for Malware Detection. TACAS 2012: 110-125 - 2011
- [c1]Fu Song, Tayssir Touili:
Efficient CTL Model-Checking for Pushdown Systems. CONCUR 2011: 434-449
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint