Securing web application code by static analysis and runtime protection YW Huang, F Yu, C Hang, CH Tsai, DT Lee, SY Kuo Proceedings of the 13th international conference on World Wide Web, 40-52, 2004 | 910 | 2004 |
Stranger: An automata-based string analysis tool for PHP F Yu, M Alkhalaf, T Bultan International Conference on Tools and Algorithms for the Construction and …, 2010 | 186 | 2010 |
System and method for securing web application code and verifying correctness of software YW Huang, F Yu, C Tsai, C Hang, DT Lee, SY Kuo US Patent 8,555,269, 2013 | 129 | 2013 |
Symbolic string verification: An automata-based approach F Yu, T Bultan, M Cova, OH Ibarra Model Checking Software: 15th International SPIN Workshop, Los Angeles, CA …, 2008 | 112 | 2008 |
Topological pattern discovery and feature extraction for fraudulent financial reporting SY Huang, RH Tsaih, F Yu Expert Systems with Applications 41 (9), 4360-4372, 2014 | 99 | 2014 |
Verifying web applications using bounded model checking YW Huang, F Yu, C Hang, CH Tsai, DT Lee, SY Kuo International Conference on Dependable Systems and Networks, 2004, 199-208, 2004 | 91 | 2004 |
Automata-based symbolic string analysis for vulnerability detection F Yu, M Alkhalaf, T Bultan, OH Ibarra Formal Methods in System Design 44, 44-70, 2014 | 86 | 2014 |
System and method for securing web application code and verifying correctness of software YW Huang, F Yu, C Tsai, C Hang, DT Lee, SY Kuo US Patent 7,779,399, 2010 | 85 | 2010 |
Symbolic string verification: Combining string analysis and size analysis F Yu, T Bultan, OH Ibarra Tools and Algorithms for the Construction and Analysis of Systems: 15th …, 2009 | 77 | 2009 |
Relational string verification using multi-track automata F Yu, T Bultan, OH Ibarra International Journal of Foundations of Computer Science 22 (08), 1909-1924, 2011 | 72 | 2011 |
Patching vulnerabilities with sanitization synthesis F Yu, M Alkhalaf, T Bultan Proceedings of the 33rd International Conference on Software Engineering …, 2011 | 72 | 2011 |
Generating vulnerability signatures for string manipulating programs using automata-based forward and backward symbolic analyses F Yu, M Alkhalaf, T Bultan 2009 IEEE/ACM International Conference on Automated Software Engineering …, 2009 | 63 | 2009 |
System and method for securing web application code and verifying correctness of software YW Huang, F Yu, C Tsai, C Hang, DT Lee, SY Kuo US Patent 8,555,269, 2013 | 59 | 2013 |
String analysis via automata manipulation with logic circuit representation HE Wang, TL Tsai, CH Lin, F Yu, JHR Jiang Computer Aided Verification: 28th International Conference, CAV 2016 …, 2016 | 47 | 2016 |
TCTL inevitability analysis of dense-time systems: From theory to engineering F Wang, GD Huang, F Yu IEEE Transactions on Software Engineering 32 (7), 510-526, 2006 | 45* | 2006 |
String Analysis for Software Verification and Security T Bultan, F Yu, M Alkhalaf, A Aydin Springer 10, 978-3, 2017 | 40 | 2017 |
Parameterized model counting for string and numeric constraints A Aydin, W Eiers, L Bang, T Brennan, M Gavrilov, T Bultan, F Yu Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018 | 35 | 2018 |
On spiking neural P systems and partially blind counter machines OH Ibarra, S Woodworth, F Yu, A Păun Unconventional Computation: 5th International Conference, UC 2006, York, UK …, 2006 | 33 | 2006 |
String abstractions for string verification F Yu, T Bultan, B Hardekopf International SPIN Workshop on Model Checking of Software, 20-37, 2011 | 32 | 2011 |
XFlag: Explainable fake news detection model on social media SY Chien, CJ Yang, F Yu International Journal of Human–Computer Interaction 38 (18-20), 1808-1827, 2022 | 30 | 2022 |