Shang-Wei Lin
Cited by
Cited by
Steelix: program-state based binary fuzzing
Y Li, B Chen, M Chandramohan, SW Lin, Y Liu, A Tiu
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
A survey of smart contract formal specification and verification
P Tolmach, Y Li, SW Lin, Y Liu, Z Li
ACM Computing Surveys (CSUR) 54 (7), 1-38, 2021
VERTAF: An application framework for the design and verification of embedded real-time software
PA Hsiung, SW Lin, CH Tseng, TY Lee, JM Fu, WB See
IEEE Transactions on Software Engineering 30 (10), 656-674, 2004
Hdskg: Harvesting domain specific knowledge graph from content of webpages
X Zhao, Z Xing, MA Kabir, N Sawada, J Li, SW Lin
2017 ieee 24th international conference on software analysis, evolution and …, 2017
Vultron: catching vulnerable smart contracts once and for all
H Wang, Y Li, SW Lin, L Ma, Y Liu
2019 IEEE/ACM 41st International Conference on Software Engineering: New …, 2019
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices
R Feng, S Chen, X Xie, G Meng, SW Lin, Y Liu
IEEE Transactions on Information Forensics and Security 16, 1563-1578, 2020
Semantic understanding of smart contracts: Executable operational semantics of solidity
J Jiao, S Kan, SW Lin, D Sanan, Y Liu, J Sun
2020 IEEE Symposium on Security and Privacy (SP), 1695-1712, 2020
A real-time and fully distributed approach to motion planning for multirobot systems
Y Zhou, H Hu, Y Liu, SW Lin, Z Ding
IEEE Transactions on Systems, Man, and Cybernetics: Systems 49 (12), 2636-2650, 2017
Mobidroid: A performance-sensitive malware detection system on mobile platform
R Feng, S Chen, X Xie, L Ma, G Meng, Y Liu, SW Lin
2019 24th International Conference on Engineering of Complex Computer …, 2019
A distributed approach to robust control of multi-robot systems
Y Zhou, H Hu, Y Liu, SW Lin, Z Ding
Automatica 98, 1-13, 2018
Tzuyu: Learning stateful typestates
H Xiao, J Sun, Y Liu, SW Lin, C Sun
2013 28th IEEE/ACM International Conference on Automated Software …, 2013
Learning Assumptions for Compositional Verification of Timed Systems
SW Lin, É André, Y Liu, J Sun, JS Dong
IEEE Transactions on Software Engineering 40 (2), 137-153, 2014
An efficient algorithm for learning event-recording automata
SW Lin, É André, JS Dong, J Sun, Y Liu
Automated Technology for Verification and Analysis: 9th International …, 2011
Automatic loop-invariant generation anc refinement through selective sampling
J Li, J Sun, L Li, QL Le, SW Lin
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
A neural model for method name generation from functional description
S Gao, C Chen, Z Xing, Y Ma, W Song, SW Lin
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack
Y Cheng, Q Guo, F Juefei-Xu, SW Lin, W Feng, W Lin, Y Liu
IEEE Transactions on Multimedia 24, 3807-3822, 2021
Diamonds are a girl’s best friend: Partial order reduction for timed automata with abstractions
H Hansen, SW Lin, Y Liu, TK Nguyen, J Sun
Computer Aided Verification: 26th International Conference, CAV 2014, Held …, 2014
Oracle-supported dynamic exploit generation for smart contracts
H Wang, Y Liu, Y Li, SW Lin, C Artho, L Ma, Y Liu
IEEE Transactions on Dependable and Secure Computing 19 (3), 1795-1809, 2020
Formal analysis of composable DeFi protocols
P Tolmach, Y Li, SW Lin, Y Liu
Financial Cryptography and Data Security. FC 2021 International Workshops …, 2021
Model checking prioritized timed automata
SW Lin, PA Hsiung, CH Huang, YR Chen
Automated Technology for Verification and Analysis: Third International …, 2005
The system can't perform the operation now. Try again later.
Articles 1–20