Signed cryptographic program verification with typed cryptoline YF Fu, J Liu, X Shi, MH Tsai, BY Wang, BY Yang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 21 | 2019 |
Handcrafted inversions made operational on operational semantics JF Monin, X Shi International Conference on Interactive Theorem Proving, 338-353, 2013 | 17 | 2013 |
First steps towards the certification of an ARM simulator using Compcert X Shi, JF Monin, F Tuong, F Blanqui International Conference on Certified Programs and Proofs, 346-361, 2011 | 16 | 2011 |
Designing a CPU model: from a pseudo-formal document to fast code F Blanqui, C Helmstetter, V Joloboff, JF Monin, X Shi arXiv preprint arXiv:1109.4351, 2011 | 16 | 2011 |
Verifying arithmetic in cryptographic c programs J Liu, X Shi, MH Tsai, BY Wang, BY Yang 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 12 | 2019 |
CoqQFBV: A Scalable Certified SMT Quantifier-Free Bit-Vector Solver X Shi, YF Fu, J Liu, MH Tsai, BY Wang, BY Yang Computer Aided Verification: 33rd International Conference, CAV 2021 …, 2021 | 7 | 2021 |
Certification of an instruction set simulator X Shi Université de Grenoble, 2013 | 7 | 2013 |
Verified NTT multiplications for NISTPQC KEM lattice finalists: Kyber, SABER, and NTRU V Hwang, J Liu, G Seiler, X Shi, MH Tsai, BY Wang, BY Yang IACR Transactions on Cryptographic Hardware and Embedded Systems, 718-750, 2022 | 6 | 2022 |
Safety analysis and optimization for networked avionics system C Zhang, X Shi, D Chen 2014 IEEE/AIAA 33rd Digital Avionics Systems Conference (DASC), 4C1-1-4C1-12, 2014 | 6 | 2014 |
Abstraction and refinement: Towards scalable and exact verification of neural networks J Liu, Y Xing, X Shi, F Song, Z Xu, Z Ming arXiv preprint arXiv:2207.00759, 2022 | 4 | 2022 |
Analyse d'un modèle AADL à l'aide de Pola PE Hladik, F Peres, X Shi 10es journées Francophones sur les Approches Formelles dans l'Assistance au …, 2010 | 4 | 2010 |
Automatic Certified Verification of Cryptographic Programs with COQCRYPTOLINE MH Tsai, YF Fu, X Shi, J Liu, BY Wang, BY Yang Cryptology ePrint Archive, 2022 | 2 | 2022 |
Towards verified faithful simulation V Joloboff, JF Monin, X Shi Dependable Software Engineering: Theories, Tools, and Applications: First …, 2015 | 2 | 2015 |
Correction to: CoqCryptoLine: A Verified Model Checker with Certified Results MH Tsai, YF Fu, J Liu, X Shi, BY Wang, BY Yang International Conference on Computer Aided Verification, C1-C1, 2023 | | 2023 |
Certified Verification for Algebraic Abstraction MH Tsai, YF Fu, J Liu, X Shi, BY Wang, BY Yang International Conference on Computer Aided Verification, 329-349, 2023 | | 2023 |
CoqCryptoLine: A Verified Model Checker with Certified Results MH Tsai, YF Fu, J Liu, X Shi, BY Wang, BY Yang International Conference on Computer Aided Verification, 227-240, 2023 | | 2023 |
MpBP: verifying robustness of neural networks with multi-path bound propagation Y Zheng, J Liu, X Shi Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022 | | 2022 |
Multi-path Back-propagation Method for Neural Network Verification. Y Zheng, X Shi, J Liu International Journal of Software & Informatics 12 (4), 2022 | | 2022 |
SimSoC: A Fast, Proven Faithful, Full System Virtual Prototyping Framework V Joloboff, JF Monin, X Shi Model-Implementation Fidelity in Cyber Physical System Design, 129-156, 2017 | | 2017 |
Virtual Reality For Missile Combat Simulation X Shi AIAA Modeling and Simulation Technologies Conference, 3672, 2017 | | 2017 |