Articles with public access mandates - Shengchao Qin - National Natural Science Foundation of ChinaLearn more
Not available based on mandate: 8
Expressive program verification via structured specifications
C Gherghina, C David, S Qin, WN Chin
International Journal on Software Tools for Technology Transfer 16, 363-380, 2014
Baton: symphony of random testing and concolic testing through machine learning and taint analysis
B Chen, Y Liu, X Peng, Y Wu, S Qin
Science China Information Sciences 66 (3), 132101, 2023
Formalization and Verification of the Powerlink Protocol using CSP
H Pang, J Li, Y Ruan, Y Huang, J Shi, S Qin
2016 23rd Asia-Pacific Software Engineering Conference (APSEC), 321-328, 2016
Output range analysis for feed-forward deep neural networks via linear programming
Z Xu, Y Liu, S Qin, Z Ming
IEEE Transactions on Reliability 72 (3), 1191-1205, 2022
Towards a program logic for C11 release-sequences
M He, S Qin, J Ferreira
2018 International Symposium on Theoretical Aspects of Software Engineering …, 2018
Probabilistic Denotational Semantics for an Interrupt Modelling Language
Y Huang, Y Zhao, S Qin, J He
2015 20th International Conference on Engineering of Complex Computer …, 2015
Detecting API-Misuse Based on Pattern Mining via API Usage Graph with Parameters
Y Wu, Z Xu, S Qin
International Symposium on Theoretical Aspects of Software Engineering, 344-363, 2023
An Axiomatic Approach to BigrTiMo
W Xie, H Zhu, S Qin
2020 International Symposium on Theoretical Aspects of Software Engineering …, 2020
Available based on mandate: 44
Memlock: Memory usage guided fuzzing
C Wen, H Wang, Y Li, S Qin, Y Liu, Z Xu, H Chen, X Xie, G Pu, T Liu
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
Typestate-guided fuzzer for discovering use-after-free vulnerabilities
H Wang, X Xie, Y Li, C Wen, Y Li, Y Liu, S Qin, H Chen, Y Sui
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
Core hybrid Event-B I: single hybrid Event-B machines
R Banach, M Butler, S Qin, N Verma, H Zhu
Science of Computer Programming 105, 92-123, 2015
CDGDroid: Android malware detection based on deep learning using CFG and DFG
Z Xu, K Ren, S Qin, F Craciun
Formal Methods and Software Engineering: 20th International Conference on …, 2018
Detecting energy bugs in android apps using static analysis
H Jiang, H Yang, S Qin, Z Su, J Zhang, J Yan
International Conference on Formal Engineering Methods, 192-208, 2017
Automated verification of the FreeRTOS scheduler in Hip/Sleek
JF Ferreira, C Gherghina, G He, S Qin, WN Chin
International Journal on Software Tools for Technology Transfer 16, 381-397, 2014
A deep convolution generative adversarial networks based fuzzing framework for industry control protocols
W Lv, J Xiong, J Shi, Y Huang, S Qin
Journal of Intelligent Manufacturing 32, 441-457, 2021
Maximizing influence under influence loss constraint in social networks
Y Zeng, X Chen, G Cong, S Qin, J Tang, Y Xiang
Expert Systems with Applications 55, 255-267, 2016
Bias field poses a threat to dnn-based x-ray recognition
B Tian, Q Guo, F Juefei-Xu, W Le Chan, Y Cheng, X Li, X Xie, S Qin
2021 IEEE international conference on multimedia and expo (ICME), 1-6, 2021
Core hybrid Event-B II: multiple cooperating hybrid Event-B machines
R Banach, M Butler, S Qin, H Zhu
Science of Computer Programming 139, 1-35, 2017
GPU accelerated on-the-fly reachability checking
Z Wu, Y Liu, J Sun, J Shi, S Qin
2015 20th International Conference on Engineering of Complex Computer …, 2015
Locating vulnerabilities in binaries via memory layout recovering
H Wang, X Xie, SW Lin, Y Lin, Y Li, S Qin, Y Liu, T Liu
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
Publication and funding information is determined automatically by a computer program