國立政治大學 |
2014-09 |
Resistant learning on the envelope bulk for identifying anomalous patterns
|
Huang, S.-Y.;Yu, Fang;Tsaih, Ray;Huang, Y.; 郁方;蔡瑞煌 |
國立政治大學 |
2014-02 |
Securing KVM-based cloud systems via virtualization introspection
|
Lee, Sheng Wei;Yu, Fang; 郁方 |
國立政治大學 |
2014-02 |
Patcher: An online service for detecting, viewing and patching web application vulnerabilities
|
Yu, Fang;Tung, Yi Yang; 郁方;董亦揚 |
國立政治大學 |
2013.06 |
Automata-Based Symbolic String Analysis for Vulnerability Detection
|
郁方; Yu, Fang ; Alkhalaf, Muath ; Bultan, Tevfik ; Ibarra, Oscar H. |
國立政治大學 |
2013.04 |
A novel liveness condition for S3PGR2
|
Chao, Daniel Y. ;Chen, Jiun-Ting ;Yu, Fang; 趙玉 |
國立政治大學 |
2013-08 |
Control policy for a subclass of Petri nets without reachability analysis
|
趙玉; Liu, GaiYun;Chao, Daniel Yuh;Yu, Fang |
國立政治大學 |
2013 |
A control policy for γ-nets without reachability analysis and siphon enumeration
|
Wu, W.;Chao, D.Y.;Yu, Fang; 郁方 |
國立政治大學 |
2013 |
Quantitative analysis of cloud-based streaming services
|
Yu, Fang;Wan, Y.-W.;Tsaih, Rua-Huan; 蔡瑞煌;郁方 |
國立政治大學 |
2012.05 |
Symbolic Consistency Checking of OpenMP Parallel Programs
|
郁方; Yu,Fang ; Yang,Shun-Ching ; Wang,Farn ; Chen,Guan-Cheng ; Chan,Che-Chang |
國立政治大學 |
2012 |
Enumeration of reachable and other states of simple version of Systems of Simple Sequential Processes with Resources (S3PR)
|
Chao, Daniel Yuh ; Yu, Fang; 趙玉;郁方 |
國立政治大學 |
2011-05 |
Patching vulnerabilities with sanitization synthesis
|
Yu, Fang;Alkhalaf, Muath;Bultan, Tevfik; 郁方 |
國立政治大學 |
2011 |
A temporal logic for the interaction of strategies
|
Wang, F.;Huang, C.-H.;Yu, Fang; 郁方 |
國立政治大學 |
2011 |
String abstractions for string verification
|
Yu, Fang;Bultan, T.;Hardekopf, B.; 郁方 |
臺大學術典藏 |
2006-11-15 |
TCTL Inevitability Analysis of Dense-Time Systems: From Theory to Engineering
|
Wang, Farn; Huang, Geng-Dian; Yu, Fang; Wang, Farn; Huang, Geng-Dian; Yu, Fang |
國立臺灣大學 |
2006-07 |
TCTL Inevitability Analysis of Dense-Time Systems: From Theory to Engineering
|
Wang, Farn; Huang, Geng-Dian; Yu, Fang |
國立臺灣大學 |
2005 |
Symbolic simulation of industrial real-time and embedded systems -experiments with the bluetooth baseband communication protocol
|
Wang, Farn; Huang, Geng-Dian; Yu, Fang |
臺大學術典藏 |
2005 |
Symbolic simulation of industrial real-time and embedded systems -experiments with the bluetooth baseband communication protocol
|
Wang, Farn; Huang, Geng-Dian; Yu, Fang; Wang, Farn; Huang, Geng-Dian; Yu, Fang |
國立臺灣大學 |
2004 |
BDD-based safety-analysis of concurrent software with pointer data structures using graph automorphism symmetry reduction
|
Wang, Farn; Schmidt, K.; Yu, Fang; Huang, Geng-Dian; Wang, Bow-Yaw |
臺大學術典藏 |
2004 |
BDD-based safety-analysis of concurrent software with pointer data structures using graph automorphism symmetry reduction
|
Wang, Farn; Schmidt, K.; Yu, Fang; Huang, Geng-Dian; Wang, Bow-Yaw; Wang, Farn; Schmidt, K.; Yu, Fang; Huang, Geng-Dian; Wang, Bow-Yaw |