[go: up one dir, main page]

Follow
Fang Yu
Fang Yu
Associate Professor, Dept. Management Information Systems, National Chengchi University
Verified email at nccu.edu.tw - Homepage
Title
Cited by
Cited by
Year
Securing web application code by static analysis and runtime protection
YW Huang, F Yu, C Hang, CH Tsai, DT Lee, SY Kuo
Proceedings of the 13th international conference on World Wide Web, 40-52, 2004
9262004
Stranger: An automata-based string analysis tool for PHP
F Yu, M Alkhalaf, T Bultan
International Conference on Tools and Algorithms for the Construction and …, 2010
2012010
System and method for securing web application code and verifying correctness of software
YW Huang, F Yu, C Tsai, C Hang, DT Lee, SY Kuo
US Patent 8,555,269, 2013
1302013
Topological pattern discovery and feature extraction for fraudulent financial reporting
SY Huang, RH Tsaih, F Yu
Expert Systems with Applications 41 (9), 4360-4372, 2014
1162014
Symbolic string verification: An automata-based approach
F Yu, T Bultan, M Cova, OH Ibarra
Model Checking Software: 15th International SPIN Workshop, Los Angeles, CA …, 2008
1122008
Automata-based symbolic string analysis for vulnerability detection
F Yu, M Alkhalaf, T Bultan, OH Ibarra
Formal Methods in System Design 44 (1), 44-70, 2014
972014
Verifying web applications using bounded model checking
YW Huang, F Yu, C Hang, CH Tsai, DT Lee, SY Kuo
International Conference on Dependable Systems and Networks, 2004, 199-208, 2004
902004
System and method for securing web application code and verifying correctness of software
YW Huang, F Yu, C Tsai, C Hang, DT Lee, SY Kuo
US Patent 7,779,399, 2010
862010
Symbolic string verification: Combining string analysis and size analysis
F Yu, T Bultan, OH Ibarra
Tools and Algorithms for the Construction and Analysis of Systems: 15th …, 2009
772009
Relational string verification using multi-track automata
F Yu, T Bultan, OH Ibarra
International Journal of Foundations of Computer Science 22 (08), 1909-1924, 2011
762011
Patching vulnerabilities with sanitization synthesis
F Yu, M Alkhalaf, T Bultan
Proceedings of the 33rd International Conference on Software Engineering …, 2011
752011
Generating vulnerability signatures for string manipulating programs using automata-based forward and backward symbolic analyses
F Yu, M Alkhalaf, T Bultan
2009 IEEE/ACM International Conference on Automated Software Engineering …, 2009
642009
String analysis via automata manipulation with logic circuit representation
HE Wang, TL Tsai, CH Lin, F Yu, JHR Jiang
Computer Aided Verification: 28th International Conference, CAV 2016 …, 2016
602016
System and method for securing web application code and verifying correctness of software
YW Huang, F Yu, C Tsai, C Hang, DT Lee, SY Kuo
US Patent 8,555,269, 2013
592013
String Analysis for Software Verification and Security
T Bultan, F Yu, M Alkhalaf, A Aydin
Springer 10, 978-3, 2017
542017
XFlag: Explainable fake news detection model on social media
SY Chien, CJ Yang, F Yu
International Journal of Human–Computer Interaction 38 (18-20), 1808-1827, 2022
482022
TCTL inevitability analysis of dense-time systems: From theory to engineering
F Wang, GD Huang, F Yu
IEEE Transactions on Software Engineering 32 (7), 510-526, 2006
45*2006
Parameterized model counting for string and numeric constraints
A Aydin, W Eiers, L Bang, T Brennan, M Gavrilov, T Bultan, F Yu
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
412018
On spiking neural P systems and partially blind counter machines
OH Ibarra, S Woodworth, F Yu, A Păun
Unconventional Computation: 5th International Conference, UC 2006, York, UK …, 2006
352006
Optimal sanitization synthesis for web application vulnerability repair
F Yu, CY Shueh, CH Lin, YF Chen, BY Wang, T Bultan
Proceedings of the 25th International Symposium on Software Testing and …, 2016
342016
The system can't perform the operation now. Try again later.
Articles 1–20