Search

Your search keyword '"Jiaguang Sun"' showing total 74 results

Search Constraints

Start Over You searched for: Author "Jiaguang Sun" Remove constraint Author: "Jiaguang Sun" Publisher ieee Remove constraint Publisher: ieee
74 results on '"Jiaguang Sun"'

Search Results

1. Verification of Implementations of Cryptographic Hash Functions

2. A Multi-Player Minimax Game for Generative Adversarial Networks

3. Necessity and Capability of Flow, Context, Field and Quasi Path Sensitive Points-to Analysis

4. Train Driving Data Learning with S-CNN Model for Gear Prediction and Optimal Driving

5. TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis

6. A Sensor Attack Detection Method in Intelligent Vehicle with Multiple Sensors

7. Engineering a Better Fuzzer with Synergically Integrated Optimizations

8. Verification of Implementations of Cryptographic Hash Functions

9. Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design

10. Enabling Clone Detection For Ethereum Via Smart Contract Birthmarks

11. Vetting API Usages in C Programs with IMChecker

12. Scalable and Extensible Static Memory Safety Analysis with Summary over Access Path

13. Scalable Verification Framework for C Program

15. IntPTI: Automatic integer error repair with proper-type inference

16. A language model for statements of software code

17. A Constraint-Pattern Based Method for Reachability Determination

18. Assertion Recommendation for Formal Program Verification

19. Stochastic Optimization of Program Obfuscation

20. Automatic Fix for C Integer Errors by Precision Improvement

21. PLC programs' checking method and strategy based on module state transfer

22. From offline to onboard system solution for a control sequence optimization problem

23. Fault Localization with Partially Reliable Test Results Using Dempster-Shafer Theory

24. iDola: Bridge Modeling to Verification and Implementation of Interrupt-Driven Systems

26. Clause Replication and Reuse in Incremental Temporal Induction

27. A hierarchy framework on compositional verification for PLC software

28. Combinational testing of PLC programs based on the denotational semantics of instructions

29. Transfer Joint Matching for Unsupervised Domain Adaptation

30. Matching heterogeneous events with patterns

31. Transfer Feature Learning with Joint Distribution Adaptation

32. Verification and Implementation of the Protocol Standard in Train Control System

33. Transfer Sparse Coding for Robust Image Representation

34. Sequential dependency and reliability analysis of embedded systems

35. Uncertain Model and Algorithm for Hardware/Software Partitioning

36. Modeling and Validation of PLC-Controlled Systems: A Case Study

37. Mechanism design for finding experts using locally constructed social referral web

38. Parallel Spatial Hashing for Collision Detection of Deformable Surfaces

39. A Watermark-Aware Trusted Running Environment for Software Clouds

40. The Transition Between Sharp and Rounded Features and the Manipulation of Incompatible Boundary in Filling n-sided Holes

41. Reconstructing 3D Objects from 2D Sectional Views of Engineering Drawings Using Volume-Based Method

42. The testing approach of embedded real-time automatic control software based on control objects

43. Dynamically Constructing Mixed Pyramid for Fast VQ Encoding

44. Improved fingerprint-based remote user authentication scheme using smart cards

45. A Phase-Based Self-Tuning Algorithm for Reconfigurable Cache

47. Generating Compact Robust and Non-Robust Tests for Complete Coverage of Path Delay Faults Based on Stuck-at Tests

48. A Distributed Domain Administration of RBAC Model in Collaborative Environments

49. Efficient Discovery of Emerging Frequent Patterns in ArbitraryWindows on Data Streams

50. Fault-Tolerant Routing in Meshes/Tori Using Planarly Constructed Fault Blocks

Catalog

Books, media, physical & digital resources