Shang-Wei Lin
Cited by
Cited by
Steelix: program-state based binary fuzzing
Y Li, B Chen, M Chandramohan, SW Lin, Y Liu, A Tiu
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
VERTAF: An application framework for the design and verification of embedded real-time software
PA Hsiung, SW Lin, CH Tseng, TY Lee, JM Fu, WB See
IEEE Transactions on Software Engineering 30 (10), 656-674, 2004
Hdskg: Harvesting domain specific knowledge graph from content of webpages
X Zhao, Z Xing, MA Kabir, N Sawada, J Li, SW Lin
2017 ieee 24th international conference on software analysis, evolution and …, 2017
Vultron: catching vulnerable smart contracts once and for all
H Wang, Y Li, SW Lin, L Ma, Y Liu
2019 IEEE/ACM 41st International Conference on Software Engineering: New …, 2019
Semantic understanding of smart contracts: Executable operational semantics of solidity
J Jiao, S Kan, SW Lin, D Sanan, Y Liu, J Sun
2020 IEEE Symposium on Security and Privacy (SP), 1695-1712, 2020
A survey of smart contract formal specification and verification
P Tolmach, Y Li, SW Lin, Y Liu, Z Li
ACM Computing Surveys (CSUR) 54 (7), 1-38, 2021
A real-time and fully distributed approach to motion planning for multirobot systems
Y Zhou, H Hu, Y Liu, SW Lin, Z Ding
IEEE Transactions on Systems, Man, and Cybernetics: Systems 49 (12), 2636-2650, 2017
Tzuyu: Learning stateful typestates
H Xiao, J Sun, Y Liu, SW Lin, C Sun
2013 28th IEEE/ACM International Conference on Automated Software …, 2013
An efficient algorithm for learning event-recording automata
SW Lin, É André, JS Dong, J Sun, Y Liu
International Symposium on Automated Technology for Verification and …, 2011
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices
R Feng, S Chen, X Xie, G Meng, SW Lin, Y Liu
IEEE Transactions on Information Forensics and Security 16, 1563-1578, 2020
Mobidroid: A performance-sensitive malware detection system on mobile platform
R Feng, S Chen, X Xie, L Ma, G Meng, Y Liu, SW Lin
2019 24th International Conference on Engineering of Complex Computer …, 2019
Learning Assumptions for Compositional Verification of Timed Systems
SW Lin, É André, Y Liu, J Sun, JS Dong
IEEE Transactions on Software Engineering 40 (2), 137-153, 2014
A neural model for method name generation from functional description
S Gao, C Chen, Z Xing, Y Ma, W Song, SW Lin
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
A distributed approach to robust control of multi-robot systems
Y Zhou, H Hu, Y Liu, SW Lin, Z Ding
Automatica 98, 1-13, 2018
Pasadena: Perceptually aware and stealthy adversarial denoise attack
Y Cheng, Q Guo, F Juefei-Xu, W Feng, SW Lin, W Lin, Y Liu
arXiv preprint arXiv:2007.07097, 2020
Automatic loop-invariant generation anc refinement through selective sampling
J Li, J Sun, L Li, QL Le, SW Lin
2017 32nd IEEE/ACM International Conference on Automated Software …, 2017
Diamonds are a girl’s best friend: partial order reduction for timed automata with abstractions
H Hansen, SW Lin, Y Liu, TK Nguyen, J Sun
International Conference on Computer Aided Verification, 391-406, 2014
Model checking prioritized timed automata
SW Lin, PA Hsiung, CH Huang, YR Chen
International Symposium on Automated Technology for Verification and …, 2005
Quasi-open bisimilarity with mismatch is intuitionistic
R Horne, KY Ahn, SW Lin, A Tiu
Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer …, 2018
VERTAF/Multi-Core: A SysML-based application framework for multi-core embedded software development
CS Lin, CH Lu, SW Lin, YR Chen, PA Hsiung
Journal of Computer Science and Technology 26 (3), 448-462, 2011
The system can't perform the operation now. Try again later.
Articles 1–20