Author of the publication

Automatic Verification for Later-Correspondence of Security Protocols.

, , , , , and . SOFL+MSVL, volume 8979 of Lecture Notes in Computer Science, page 111-126. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Demystifying Performance Regressions in String Solvers., , , , , , and . IEEE Trans. Software Eng., 49 (3): 947-961 (March 2023)CodeS: Towards Code Model Generalization Under Distribution Shift., , , , , , and . ICSE (NIER), page 1-6. IEEE, (2023)An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and Platforms., , , , , , , , and . ASE, page 810-822. IEEE, (2019)A Quantitative Analysis Framework for Recurrent Neural Network., , , , , and . ASE, page 1062-1065. IEEE, (2019)Cross-project Defect Prediction via ASTToken2Vec and BLSTM-based Neural Network., , , , , and . IJCNN, page 1-8. IEEE, (2019)Learning to Adversarially Blur Visual Object Tracking., , , , , , and . ICCV, page 10819-10828. IEEE, (2021)An Orchestrated Empirical Study on Deep Learning Frameworks and Platforms., , , , , , , , and . CoRR, (2018)ContrastRepair: Enhancing Conversation-Based Automated Program Repair via Contrastive Test Case Pairs., , , , , and . CoRR, (2024)DDoS family: A novel perspective for massive types of DDoS attacks., , , , , , , and . Comput. Secur., (March 2024)Decompiling x86 Deep Neural Network Executables., , , , and . USENIX Security Symposium, page 7357-7374. USENIX Association, (2023)