Signed cryptographic program verification with typed cryptoline YF Fu, J Liu, X Shi, MH Tsai, BY Wang, BY Yang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 17 | 2019 |
From diagrammatic confluence to modularity JP Jouannaud, J Liu Theoretical Computer Science 464, 20-34, 2012 | 15 | 2012 |
An Empirical Study on API-Misuse Bugs in Open-Source C Programs Z Gu, J Wu, J Liu, M Zhou, M Gu 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC …, 2019 | 12 | 2019 |
Verifying Arithmetic in Cryptographic C Programs J Liu, X Shi, MH Tsai, BY Wang, BY Yang 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 10 | 2019 |
Confluence of layered rewrite systems J Liu, JP Jouannaud, M Ogawa | 9* | 2015 |
Confluence by Critical Pair Analysis J Liu, N Dershowitz, JP Jouannaud | 8 | 2014 |
Confluence: The unifying, expressive power of locality J Liu, JP Jouannaud Specification, Algebra, and Software: Essays Dedicated to Kokichi Futatsugi …, 2014 | 6 | 2014 |
Formal Modeling and Verification of a Rate-Monotonic Scheduling Implementation with Real-Time Maude J Liu, M Zhou, X Song, M Gu, J Sun IEEE Transactions on Industrial Electronics 64 (4), 3239-3249, 2017 | 5 | 2017 |
Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU V Hwang, J Liu, G Seiler, X Shi, MH Tsai, BY Wang, BY Yang IACR Transactions on Cryptographic Hardware and Embedded Systems, 718-750, 2022 | 4 | 2022 |
CoqQFBV: A Scalable Certified SMT Quantifier-Free Bit-Vector Solver X Shi, YF Fu, J Liu, MH Tsai, BY Wang, BY Yang International Conference on Computer Aided Verification, 149-171, 2021 | 4 | 2021 |
Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks J Liu, Y Xing, X Shi, F Song, Z Xu, Z Ming arXiv preprint arXiv:2207.00759, 2022 | 3 | 2022 |
Untyped Confluence in Dependent Type Theories A Assaf, G Dowek, JP Jouannaud, J Liu Proceedings Higher-Order Rewriting Workshop, 2016 | 3 | 2016 |
Confluence of left-linear higher-order rewrite theories by checking their nested critical pairs G Dowek, G Férey, JP Jouannaud, J Liu Mathematical Structures in Computer Science, 1-36, 2022 | 2 | 2022 |
CLEVEREST: Accelerating CEGAR-based Neural Network Verification via Adversarial Attacks Z Zhao, Y Zhang, G Chen, F Song, T Chen, J Liu Static Analysis: 29th International Symposium, SAS 2022, Auckland, New …, 2022 | 1 | 2022 |
MpBP: verifying robustness of neural networks with multi-path bound propagation Y Zheng, J Liu, X Shi Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022 | | 2022 |
Multi-path Back-propagation Method for Neural Network Verification. Y Zheng, X Shi, J Liu International Journal of Software & Informatics 12 (4), 2022 | | 2022 |
Automatic Certified Verification of Cryptographic Programs with COQCRYPTOLINE MH Tsai, YF Fu, X Shi, J Liu, BY Wang, BY Yang Cryptology ePrint Archive, 2022 | | 2022 |
Confluence of Non-Terminating Left-Linear Higher-Order Rewrite Theories G Dowek, G Férey, JP Jouannaud, J Liu | | 2021 |
IMSpec: An Extensible Approach to Exploring the Incorrect Usage of APIs Z Gu, M Zhou, J Wu, Y Jiang, J Liu, M Gu 2019 International Symposium on Theoretical Aspects of Software Engineering …, 2019 | | 2019 |
Confluence properties of rewrite rules by decreasing diagrams J Liu | | 2016 |