Folgen
Xiaomu SHI
Xiaomu SHI
Zugehörigkeit unbekannt
Bestätigte E-Mail-Adresse bei szu.edu.cn
Titel
Zitiert von
Zitiert von
Jahr
Signed cryptographic program verification with typed cryptoline
YF Fu, J Liu, X Shi, MH Tsai, BY Wang, BY Yang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
282019
Handcrafted inversions made operational on operational semantics
JF Monin, X Shi
International Conference on Interactive Theorem Proving, 338-353, 2013
192013
Verifying arithmetic in cryptographic C programs
J Liu, X Shi, MH Tsai, BY Wang, BY Yang
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
172019
Designing a CPU model: from a pseudo-formal document to fast code
F Blanqui, C Helmstetter, V Joloboff, JF Monin, X Shi
arXiv preprint arXiv:1109.4351, 2011
162011
First steps towards the certification of an ARM simulator using Compcert
X Shi, JF Monin, F Tuong, F Blanqui
International Conference on Certified Programs and Proofs, 346-361, 2011
152011
Verified NTT multiplications for NISTPQC KEM lattice finalists: Kyber, SABER, and NTRU
V Hwang, J Liu, G Seiler, X Shi, MH Tsai, BY Wang, BY Yang
IACR Transactions on Cryptographic Hardware and Embedded Systems, 718-750, 2022
112022
CoqQFBV: a scalable certified SMT quantifier-free bit-vector solver
X Shi, YF Fu, J Liu, MH Tsai, BY Wang, BY Yang
Computer Aided Verification: 33rd International Conference, CAV 2021 …, 2021
102021
Abstraction and refinement: Towards scalable and exact verification of neural networks
J Liu, Y Xing, X Shi, F Song, Z Xu, Z Ming
ACM Transactions on Software Engineering and Methodology, 2022
82022
Safety analysis and optimization for networked avionics system
C Zhang, X Shi, D Chen
2014 IEEE/AIAA 33rd Digital Avionics Systems Conference (DASC), 4C1-1-4C1-12, 2014
72014
Certification of an instruction set simulator
X Shi
Université de Grenoble, 2013
72013
Automatic certified verification of cryptographic programs with COQCRYPTOLINE
MH Tsai, YF Fu, X Shi, J Liu, BY Wang, BY Yang
Cryptology ePrint Archive, 2022
42022
Towards verified faithful simulation
V Joloboff, JF Monin, X Shi
Dependable Software Engineering: Theories, Tools, and Applications: First …, 2015
32015
Analyse d'un modèle AADL à l'aide de Pola
PE Hladik, F Peres, X Shi
10es journées Francophones sur les Approches Formelles dans l'Assistance au …, 2010
32010
Certified Verification for Algebraic Abstraction
MH Tsai, YF Fu, J Liu, X Shi, BY Wang, BY Yang
International Conference on Computer Aided Verification, 329-349, 2023
12023
Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking
LC Lai, J Liu, X Shi, MH Tsai, BY Wang, BY Yang
Cryptology ePrint Archive, 2023
12023
MpBP: verifying robustness of neural networks with multi-path bound propagation
Y Zheng, J Liu, X Shi
Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022
12022
llvm2CryptoLine: Verifying Arithmetic in Cryptographic C Programs
R Chen, J Liu, X Shi, MH Tsai, BY Wang, BY Yang
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
2023
Correction to: CoqCryptoLine: A Verified Model Checker with Certified Results
MH Tsai, YF Fu, J Liu, X Shi, BY Wang, BY Yang
International Conference on Computer Aided Verification, C1-C1, 2023
2023
CoqCryptoLine: A Verified Model Checker with Certified Results
MH Tsai, YF Fu, J Liu, X Shi, BY Wang, BY Yang
International Conference on Computer Aided Verification, 227-240, 2023
2023
Multi-path Back-propagation Method for Neural Network Verification.
Y Zheng, X Shi, J Liu
Int. J. Softw. Informatics 12 (4), 377-401, 2022
2022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20