國立政治大學 |
2016-07 |
Optimal Sanitization Synthesis for Web Application Vulnerability Repair
|
郁方; Yu, Fang; Shueh, Ching-Yuan; Lin, Chun-Han; Chen, Yu-Fang; Wang, Bow-Yaw; Bultan, Tevfik |
國立政治大學 |
2016-05 |
Simulating Time-Varying Demand Services with Queuing Models
|
郁方; Chu, Hsuan-Kai;Cheny, Wan-Ping;Yu, Fang |
國立政治大學 |
2016-02 |
VISO: Characterizing malicious behaviors of virtual machines with unsupervised clustering
|
曾宇瑞; 郁方; Li, Yen Han; Tzeng, Yeu Ruey; Yu, Fang |
國立政治大學 |
2016-02 |
Investigating security mechanisms for ICT-enabled services of the National Palace Museum
|
郁方; Yu, Fang |
國立政治大學 |
2016 |
String analysis via automata manipulation with logic circuit representation
|
郁方; Wang, Hung En; Tsai, Tzung Lin; Lin, Chun Han; Yu, Fang; Jiang, Jie-Hong Roland |
淡江大學 |
2015-05-06 |
Quality of life changes in patients undergoing treatment for hepatocellular carcinoma
|
Chie, Wei-Chu;Yu, Fang;Li, Mengqian;Baccaglini, Lorena;Blazeby, Jane M;Hsiao, Chin-Fu;Chiu, Herng-Chia;Poon, Ronnie T;Mikoshiba, Naoko;Gillian, Al-Kadhimi;Heaton, Nigel;Calara, Jozer;Collins, Peter;Caddick, Katharine;Costantini, Anna;Vilgrain, Valerie;Chiang, Chieh |
國立政治大學 |
2015-05 |
Space Connection: A New 3D Tele-Immersion Platform for Web-based Gesture-collaborative Games and Services
|
郁方; Lin, Chun-Han;Sun, Pei-Yu;Yu, Fang |
國立政治大學 |
2015 |
Network-traffic anomaly detection with incremental majority learning
|
郁方; Huang, Shin-Ying; Yu, Fang; Tsaih, Rua-Huan; Huang, Yennun; 蔡瑞煌 |
國立政治大學 |
2014.07 |
Topological pattern discovery and feature extraction for fraudulent financial reporting
|
Huang, Shin-Ying ; Tsaih, Rua-Huan ; Yu, Fang; 黃馨瑩;蔡瑞煌;郁方 |
國立政治大學 |
2014-11-15 |
雲端體感協作平台的服務創新與實踐
|
林君翰;Lin, Chun-Han; 孫珮瑜;Su, Pei-Yu; 郁方;Yu, Fang |
國立政治大學 |
2014-09 |
Resistant learning on the envelope bulk for identifying anomalous patterns
|
Huang, S.-Y.;Yu, Fang;Tsaih, Ray;Huang, Y.; 郁方;蔡瑞煌 |
國立政治大學 |
2014-02 |
Securing KVM-based cloud systems via virtualization introspection
|
Lee, Sheng Wei;Yu, Fang; 郁方 |
國立政治大學 |
2014-02 |
Patcher: An online service for detecting, viewing and patching web application vulnerabilities
|
Yu, Fang;Tung, Yi Yang; 郁方;董亦揚 |
國立政治大學 |
2013.06 |
Automata-Based Symbolic String Analysis for Vulnerability Detection
|
郁方; Yu, Fang ; Alkhalaf, Muath ; Bultan, Tevfik ; Ibarra, Oscar H. |
國立政治大學 |
2013.04 |
A novel liveness condition for S3PGR2
|
Chao, Daniel Y. ;Chen, Jiun-Ting ;Yu, Fang; 趙玉 |
國立政治大學 |
2013-08 |
Control policy for a subclass of Petri nets without reachability analysis
|
趙玉; Liu, GaiYun;Chao, Daniel Yuh;Yu, Fang |
國立政治大學 |
2013 |
A control policy for γ-nets without reachability analysis and siphon enumeration
|
Wu, W.;Chao, D.Y.;Yu, Fang; 郁方 |
國立政治大學 |
2013 |
Quantitative analysis of cloud-based streaming services
|
Yu, Fang;Wan, Y.-W.;Tsaih, Rua-Huan; 蔡瑞煌;郁方 |
國立政治大學 |
2012.05 |
Symbolic Consistency Checking of OpenMP Parallel Programs
|
郁方; Yu,Fang ; Yang,Shun-Ching ; Wang,Farn ; Chen,Guan-Cheng ; Chan,Che-Chang |
國立政治大學 |
2012 |
Enumeration of reachable and other states of simple version of Systems of Simple Sequential Processes with Resources (S3PR)
|
Chao, Daniel Yuh ; Yu, Fang; 趙玉;郁方 |
國立政治大學 |
2011-05 |
Patching vulnerabilities with sanitization synthesis
|
Yu, Fang;Alkhalaf, Muath;Bultan, Tevfik; 郁方 |
國立政治大學 |
2011 |
A temporal logic for the interaction of strategies
|
Wang, F.;Huang, C.-H.;Yu, Fang; 郁方 |
國立政治大學 |
2011 |
String abstractions for string verification
|
Yu, Fang;Bultan, T.;Hardekopf, B.; 郁方 |
臺大學術典藏 |
2006-11-15 |
TCTL Inevitability Analysis of Dense-Time Systems: From Theory to Engineering
|
Wang, Farn; Huang, Geng-Dian; Yu, Fang; Wang, Farn; Huang, Geng-Dian; Yu, Fang |
國立臺灣大學 |
2006-07 |
TCTL Inevitability Analysis of Dense-Time Systems: From Theory to Engineering
|
Wang, Farn; Huang, Geng-Dian; Yu, Fang |