Shang-Wei Lin
Title
Cited by
Cited by
Year
Steelix: program-state based binary fuzzing
Y Li, B Chen, M Chandramohan, SW Lin, Y Liu, A Tiu
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
1822017
VERTAF: An application framework for the design and verification of embedded real-time software
PA Hsiung, SW Lin, CH Tseng, TY Lee, JM Fu, WB See
IEEE Transactions on Software Engineering 30 (10), 656-674, 2004
602004
Learning Assumptions for Compositional Verification of Timed Systems
SW Lin, É André, Y Liu, J Sun, JS Dong
IEEE Transactions on Software Engineering 40 (2), 137-153, 2014
49*2014
Hdskg: Harvesting domain specific knowledge graph from content of webpages
X Zhao, Z Xing, MA Kabir, N Sawada, J Li, SW Lin
2017 ieee 24th international conference on software analysis, evolution and …, 2017
412017
Tzuyu: Learning stateful typestates
H Xiao, J Sun, Y Liu, SW Lin, C Sun
2013 28th IEEE/ACM International Conference on Automated Software …, 2013
322013
VULTRON: catching vulnerable smart contracts once and for all
H Wang, Y Li, SW Lin, L Ma, Y Liu
2019 IEEE/ACM 41st International Conference on Software Engineering: New …, 2019
272019
A real-time and fully distributed approach to motion planning for multirobot systems
Y Zhou, H Hu, Y Liu, SW Lin, Z Ding
IEEE Transactions on Systems, Man, and Cybernetics: Systems 49 (12), 2636-2650, 2017
272017
An efficient algorithm for learning event-recording automata
SW Lin, É André, JS Dong, J Sun, Y Liu
International Symposium on Automated Technology for Verification and …, 2011
262011
Semantic understanding of smart contracts: Executable operational semantics of solidity
J Jiao, S Kan, SW Lin, D Sanan, Y Liu, J Sun
2020 IEEE Symposium on Security and Privacy (SP), 1695-1712, 2020
25*2020
A neural model for method name generation from functional description
S Gao, C Chen, Z Xing, Y Ma, W Song, SW Lin
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
212019
Automatic loop-invariant generation anc refinement through selective sampling
J Li, J Sun, L Li, QL Le, SW Lin
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
212017
Model checking prioritized timed automata
SW Lin, PA Hsiung, CH Huang, YR Chen
International Symposium on Automated Technology for Verification and …, 2005
212005
Mobidroid: A performance-sensitive malware detection system on mobile platform
R Feng, S Chen, X Xie, L Ma, G Meng, Y Liu, SW Lin
2019 24th International Conference on Engineering of Complex Computer …, 2019
192019
A distributed approach to robust control of multi-robot systems
Y Zhou, H Hu, Y Liu, SW Lin, Z Ding
Automatica 98, 1-13, 2018
172018
Diamonds are a girl’s best friend: Partial order reduction for timed automata with abstractions
H Hansen, SW Lin, Y Liu, TK Nguyen, J Sun
International Conference on Computer Aided Verification, 391-406, 2014
172014
Automatic Compositional Verification of Timed Systems
SW Lin, Y Liu, J Sun, JS Dong, É André
FM 2012: Formal Methods, 272-276, 2012
172012
VERTAF/Multi-Core: A SysML-based application framework for multi-core embedded software development
CS Lin, CH Lu, SW Lin, YR Chen, PA Hsiung
Journal of Computer Science and Technology 26 (3), 448-462, 2011
172011
Model checking timed systems with priorities
PA Hsiung, SW Lin
11th IEEE International Conference on Embedded and Real-Time Computing …, 2005
162005
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices
R Feng, S Chen, X Xie, G Meng, SW Lin, Y Liu
IEEE Transactions on Information Forensics and Security 16, 1563-1578, 2020
152020
Pasadena: Perceptually aware and stealthy adversarial denoise attack
Y Cheng, Q Guo, F Juefei-Xu, X Xie, SW Lin, W Lin, W Feng, Y Liu
arXiv preprint arXiv:2007.07097, 2020
152020
The system can't perform the operation now. Try again later.
Articles 1–20