PAT: Towards flexible verification under fairness J Sun, Y Liu, J Dong, J Pang Computer Aided Verification, 709-714, 2009 | 535 | 2009 |
Anomaly detection for a water treatment system using unsupervised machine learning J Inoue, Y Yamagata, Y Chen, CM Poskitt, J Sun 2017 IEEE international conference on data mining workshops (ICDMW), 1058-1065, 2017 | 342 | 2017 |
Fault analysis and debugging of microservice systems: Industrial survey, benchmark system, and empirical study X Zhou, X Peng, T Xie, J Sun, C Ji, W Li, D Ding IEEE Transactions on Software Engineering 47 (2), 243-260, 2018 | 308 | 2018 |
Model checking CSP revisited: Introducing a process analysis toolkit J Sun, Y Liu, JS Dong Leveraging Applications of Formal Methods, Verification and Validation, 307-322, 2009 | 242 | 2009 |
sfuzz: An efficient adaptive fuzzer for solidity smart contracts TD Nguyen, LH Pham, J Sun, Y Lin, QT Minh Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 241 | 2020 |
Latent error prediction and fault localization for microservice applications by learning from system trace logs X Zhou, X Peng, T Xie, J Sun, C Ji, D Liu, Q Xiang, C He Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019 | 212 | 2019 |
Adversarial sample detection for deep neural network through model mutation testing J Wang, G Dong, J Sun, X Wang, P Zhang 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019 | 180 | 2019 |
Benchmarking microservice systems for software engineering research X Zhou, X Peng, T Xie, J Sun, C Xu, C Ji, W Zhao Proceedings of the 40th International Conference on Software Engineering …, 2018 | 170 | 2018 |
Learning from mutants: Using code mutation to learn and monitor invariants of a cyber-physical system Y Chen, CM Poskitt, J Sun 2018 IEEE Symposium on Security and Privacy (SP), 648-660, 2018 | 157 | 2018 |
Integrating specification and programs for system modeling and verification J Sun, Y Liu, JS Dong, C Chen Theoretical Aspects of Software Engineering, 2009. TASE 2009. Third IEEE …, 2009 | 156 | 2009 |
AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations G Bai, J Lei, G Meng, SS Venkatraman, P Saxena, J Sun, Y Liu, J Dong Proceeding of the Network and Distributed System Security Symposium (NDSS), 2013 | 149 | 2013 |
Social-Loc: Improving indoor localization with social sensing J Jun, Y Gu, L Cheng, B Lu, J Sun, T Zhu, J Niu Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems …, 2013 | 114 | 2013 |
Pat 3: An extensible architecture for building multi-domain model checkers Y Liu, J Sun, JS Dong The 22nd annual International Symposium on Software Reliability Engineering …, 2011 | 113 | 2011 |
White-box fairness testing through adversarial sampling P Zhang, J Wang, J Sun, G Dong, X Wang, X Wang, JS Dong, T Dai Proceedings of the ACM/IEEE 42nd international conference on software …, 2020 | 109 | 2020 |
sCompile: Critical path identification and analysis for smart contracts J Chang, B Gao, H Xiao, J Sun, Y Cai, Z Yang Formal Methods and Software Engineering: 21st International Conference on …, 2019 | 102 | 2019 |
Timed automata patterns JS Dong, P Hao, S Qin, J Sun, W Yi Software Engineering, IEEE Transactions on 34 (6), 844-859, 2008 | 100 | 2008 |
Modeling and verifying hierarchical real-time systems using stateful timed CSP J Sun, Y Liu, JS Dong, Y Liu, L Shi, É André ACM Transactions on Software Engineering and Methodology (TOSEM) 22 (1), 1-29, 2013 | 98 | 2013 |
Semantic understanding of smart contracts: Executable operational semantics of solidity J Jiao, S Kan, SW Lin, D Sanan, Y Liu, J Sun 2020 IEEE Symposium on Security and Privacy (SP), 1695-1712, 2020 | 92 | 2020 |
Auditing anti-malware tools by evolving android malware and dynamic loading technique Y Xue, G Meng, Y Liu, TH Tan, H Chen, J Sun, J Zhang IEEE Transactions on Information Forensics and Security 12 (7), 1529-1544, 2017 | 91 | 2017 |
Verification of computation orchestration via timed automata J Dong, Y Liu, J Sun, X Zhang Formal Methods and Software Engineering, 226-245, 2006 | 89 | 2006 |