Xu Shenglin, Xie Peidai and Wang Yongjun.
AT-ROP: Using static analysis and binary patch technology to defend against ROP attacks based on return instruction
Wanling Xie, Huibiao Zhu and Shengchao Qin.
An Axiomatic Approach to BigrTiMo
Chenyi Zhang and Jun Pang.
Characterising Probabilistic Alternating Simulation for Concurrent Games
Liu Yang, Li Wang, Zhigang Hu, Yanwen Wang and Jun Long.
Automatic Tagging for Open Source Software by Utilizing Package Dependency Information
Jianlin Wang, Chao Peng and Zhenbing Zeng.
A Formal Proof of the Soundness of the Hybrid CPS Clock Theory
Cheng-Hao Cai, Jing Sun and Gillian Dobbie.
Measuring the Quality of B Abstract Machines with ISO/IEC 25010
Chunyuan Wu, Aijuan Qian, Xiaoju Dong and Yanling Zhang.
Feature-oriented Design of Visual Analytics System for Interpretable Deep Learning based Intrusion Detection
Feifei Xu, Guanqun Ding and Wenkai Zhang.
RKC-H: A Rich Knowledge Based Model for Multi-turn Dialogue Generation
Yao Li, Wenbing Tang, Bochen Chen and Zuohua Ding.
Tracking a Ground Moving Target with UAV Based on Interval Type-2 Fuzzy Logic
10. Zhen Wang, Xiaoning Han, Weiqiang Kong, Gang Hou, Masahiko Watanabe and Akira Fukuda.
A Multi-Strategy Combination Framework for Android Malware Detection Based on Various Features
11. Mengmeng Jiang, Xiaohong Li, Xiaofei Xie and Yao Zhang.
An Empirical Study in Software Verification Tools
12. Wenjing Chu and Marcello Bonsangue.
Learning probabilistic languages by k-testable machine
13. Kai Zhang, Yongtai Zhang, Liwei Zhang, Hongyu Gao, Rongjie Yan and Jun Yan.
Neuron Activation Frequency Based Test Case Prioritization
14. Zuohua Ding, Qingfen Zhang and Mingyue Jiang.
Metamorphic Testing of Code Search Engines
15. Daisuke Ishii and Saito Fujii.
Formalizing the Soundness of the Encoding Methods of SAT-based Model Checking
16. Chenguang Mao, Hao Wang, Gaojie Han and Xiaofang Zhang.
Droidlens: Robust and Fine-Grained Detection for Android Code Smells
17. Shiming Guo, Xin Chen and Dongjin Yu.
Defect Report Severity Prediction Based on Genetic Algorithms and Convolutional Neural Network
18. Hong Lu, Jiacheng Gui, Chengyi Wang and Hao Huang.
A Novel Data-Driven Approach for Generating Verified Loop Invariants
19. Liu Yang, Zhou Chen, Yiqing Feng, Zhifang Liao, Zhigang Hu and Jun Long.
WLeidenRDF：RDF Data Query Method based on Semantic-Enhanced Graph-Clustering Algorithm
20. Gaigai Tang, Shuangyin Ren, Weipeng Cao, Lianxiao Meng, Qiang Wang, Lin Yang and Huiqiang Wang.
A comparative study of neural network techniques for automatic software vulnerability detection
21. Zhiwu Xu, Xiongya Hu, Yida Tao and Shengchao Qin.
Analyzing Cryptographic API Usages for Android Applications
22. André De Matos Pedro, Martin Leucker, David Pereira and Jorge Sousa Pinto.
Real-time MTL with durations as SMT with applications to schedulability analysis
23. Chenyang Zhu, Michael Butler and Corina Cirstea.
Real-time Trigger-Response Properties for Event-B Applied to the Pacemaker
24. Xiaohong Chen, Frederic Mallet and Xiaoshan Liu.
Formally Verifying Sequence diagrams for Safety Critical Systems
25. Wenjing Xu, Yongwang Zhao, Yuxin Zhang, Qian Xiao and Dianfu Ma.
Rely-Guarantee Reasoning about Messaging System for Autonomous Vehicles
26. Yu Zhang and Xiaohong Li.
The Scheme of Security Requirement Acquisition Based on Knowledge Graph
27. Robert Husák, Filip Zavoral and Jan Kofroň.
Optimizing Transformations of Dynamic Languages Compiled to Intermediate Representationss
28. Chunyan Mu.
A language-based approach to analysing flow security properties in virtualised computing systems
29. Shiraj Arora and M V Panduranga Rao.
The Bouquet Algorithm for Model Checking Unbounded Until