Author of the publication

CMSS: Collaborative Modeling of Safety and Security Requirements for Network Protocols.

, , , and . ISPA/BDCloud/SocialCom/SustainCom, page 185-192. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MicroRNA annotation in plants: current status and challenges., , , , and . Briefings Bioinform., (2021)ChiselFV: A Formal Verification Framework for Chisel., , and . DATE, page 1-6. IEEE, (2023)Encoding Induction Proof in Dafny., , , and . TASE, page 95-102. IEEE, (2021)A Timed CSP Model for the Time-Triggered Language Giotto., , , , and . SEW, page 110-119. IEEE Computer Society, (2012)A Formally Verified Scheme for Security Protocols with the Operational Semantics of Strand Space., , and . TASE, volume 14777 of Lecture Notes in Computer Science, page 306-323. Springer, (2024)Towards a Combination of CafeOBJ and PAT., , , and . Specification, Algebra, and Software, volume 8373 of Lecture Notes in Computer Science, page 151-170. Springer, (2014)Release of Trajectory Data based on Space Segmentation using Differential Privacy., , and . TrustCom, page 1246-1253. IEEE, (2021)Dispatching and Scheduling Dependent Tasks Based on Multi-agent Deep Reinforcement Learning., , , and . SEKE, page 280-285. KSI Research Inc., (2023)An Information Flow Security Logic for Permission-Based Declassification Strategy., , and . SEKE, page 519-524. KSI Research Inc., (2022)Generating Natural Language Adversarial Examples Based on the Approximating Top-K Combination Token Substitution., , and . HPCC/DSS/SmartCity/DependSys, page 1675-1681. IEEE, (2022)