Search

Your search keyword '"Jiaguang Sun"' showing total 193 results

Search Constraints

Start Over You searched for: Author "Jiaguang Sun" Remove constraint Author: "Jiaguang Sun" Topic computer science Remove constraint Topic: computer science
193 results on '"Jiaguang Sun"'

Search Results

1. Pluto: Exposing Vulnerabilities in Inter-Contract Scenarios

2. RNN-Test: Towards Adversarial Testing for Recurrent Neural Network Systems

3. Code Synthesis for Dataflow-Based Embedded Software Design

4. Semantic Learning and Emulation Based Cross-platform Binary Vulnerability Seeker

5. Automatic Integer Error Repair by Proper-Type Inference

6. Semantic Learning Based Cross-Platform Binary Vulnerability Search For IoT Devices

7. EM-Fuzz: Augmented Firmware Fuzzing via Memory Checking

8. Vulnerable Code Clone Detection for Operating System Through Correlation-Induced Learning

9. Improve Language Modeling for Code Completion Through Learning General Token Repetition of Source Code with Optimized Memory

10. Polar

11. Hypergraph-Induced Convolutional Networks for Visual Classification

12. Tolerating C Integer Error via Precision Elevation

13. A Multi-Player Minimax Game for Generative Adversarial Networks

14. Necessity and Capability of Flow, Context, Field and Quasi Path Sensitive Points-to Analysis

15. Dependable Model-driven Development of CPS

16. Beyond Pairwise Matching: Person Reidentification via High-Order Relevance Learning

17. Parallelizing SMT solving: Lazy decomposition and conciliation

18. Temporal Coverage Analysis for Dynamic Verification

19. Data-Centered Runtime Verification of Wireless Medical Cyber-Physical System

20. Formal Modeling and Verification of a Rate-Monotonic Scheduling Implementation with Real-Time Maude

21. Verification of Implementations of Cryptographic Hash Functions

22. Train Driving Data Learning with S-CNN Model for Gear Prediction and Optimal Driving

23. TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis

24. A Sensor Attack Detection Method in Intelligent Vehicle with Multiple Sensors

25. Engineering a Better Fuzzer with Synergically Integrated Optimizations

26. Industry practice of coverage-guided enterprise Linux kernel fuzzing

27. VFQL: combinational static analysis as query language

28. Go-clone: graph-embedding based clone detector for Golang

29. Uncertainty Theory Based Reliability-Centric Cyber-Physical System Design

30. Enabling Clone Detection For Ethereum Via Smart Contract Birthmarks

31. Vetting API Usages in C Programs with IMChecker

32. Scalable and Extensible Static Memory Safety Analysis with Summary over Access Path

33. Scalable Verification Framework for C Program

34. Efficient Recovery of Missing Events

35. Deep Learning of Transferable Representation for Scalable Domain Adaptation

36. An Energy-Efficient Train Control Framework for Smart Railway Transportation

37. Multi-Task Learning of Generalizable Representations for Video Action Recognition

38. PAFL: extend fuzzing optimizations of single mode to industrial parallel mode

39. EClone: detect semantic clones in Ethereum via symbolic transaction sketch

40. VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulation

41. S-gram: towards semantic-aware security auditing for Ethereum smart contracts

42. VulSeeker: a semantic learning based vulnerability seeker for cross-platform binary

43. SAFL

44. Weak-assert

45. DLFuzz: Differential Fuzzing Testing of Deep Learning Systems

46. First, Debug the Test Oracle

47. Design of Mixed Synchronous/Asynchronous Systems with Multiple Clocks

48. Domain Invariant Transfer Kernel Learning

49. Identifying and constructing elemental parts of shafts based on conditional random fields model

50. Deadlock detection in FPGA design: A practical approach

Catalog

Books, media, physical & digital resources