Folgen
Hao Xiao
Hao Xiao
Veracode
Bestätigte E-Mail-Adresse bei veracode.com
Titel
Zitiert von
Zitiert von
Jahr
Detection and Classification of Malicious JavaScript via Attack Behavior Modelling
Y Xue, J Wang, Y Liu, H Xiao, J Sun, M Chandramohan
The International Symposium on Software Testing and Analysis (ISSTA), 48--59, 2015
552015
Automatically testing web services choreography with assertions
L Zhou, J Ping, H Xiao, Z Wang, G Pu, Z Ding
Formal Methods and Software Engineering: 12th International Conference on …, 2010
382010
TzuYu: Learning Stateful Typestates
H Xiao, J Sun, Y Liu, SW Lin, C Sun
Automated Software Engineering (ASE), 2013 IEEE/ACM 28th International …, 2013
362013
FiB: Squeezing Loop Invariants by Interpolation between Forward/Backward Predicate Transformers
SW Lin, J Sun, H Xiao, Y Liu, D Sana, H Hansen
The 32nd IEEE/ACM International Conference on Automated Software Engineering …, 2017
282017
Online Malware Defense Using Attack Behavior Model.
S Das, H Xiao, Y Liu, W Zhang
IEEE International Symposium on Circuits & Systems (ISCAS 2016), 2016
192016
TLV: Abstraction through Testing, Learning, and Validation
J Sun, H Xiao, Y Liu, SW Lin, S Qin
ACM SIGSOFT Symposium on Foundations of Software of Engineering (FSE), 698--709, 2015
182015
Web services choreography validation
Z Wang, L Zhou, Y Zhao, J Ping, H Xiao, G Pu, H Zhu
Service Oriented Computing and Applications 4, 291-305, 2010
122010
Improving Quality of Use Case Documents through Learning and User Interaction
S Liu, J Sun, H Xiao, B Wadhwa, J Dong, X Wang
International Conference on Engineering of Complex Computer Systems (ICECCS …, 2016
42016
Simulation and validation of Web services choreography
L Zhou, H Xiao, J Ping, G Pu, H Zhang
2009 IEEE International Conference on Service-Oriented Computing and …, 2009
42009
The semantics and verification of timed service choreography
Y Zhao, H Xiao, Z Wang, G Pu, T Su
International Journal of Computer Mathematics 91 (3), 384-402, 2014
32014
Automatic model learning and its applications in malware detection
X Hao
22017
A Unifying Approach to Validating Specification-Oriented XML Constraints
Y Zhao, Z Wang, H Xiao, J Ping, G Pu, J He, H Zhu
2011 IEEE 13th International Symposium on High-Assurance Systems Engineering …, 2011
12011
Constraint Checking for XML-Based Language Specification by SAT Solver
H Xiao, Z Wang, G Pu, B Gu
2010 Fourth International Conference on Secure Software Integration and …, 2010
12010
Detection and classification of malicious JavaScript via attack behavior modelling.(2015)
Y XUE, J WANG, Y LIU, H XIAO, J SUN, M CHANDRAMOHAN
Proceedings of the 2015 International Symposium on Software Testing and …, 0
Improving quality of use case documents through learning and user interaction.(2016)
S LIU, J SUN, H XIAO, B WADHWA, JS DONG, X WANG
Proceedings if the 21st International Conference on Engineering of Complex …, 0
FiB: Squeezing loop invariants by interpolation between forward/backward predicate transformers.(2017). ASE'17: Proceedings of the 32nd IEEE
SW LIN, J SUN, H XIAO, Y LIU, D SANA, H HANSEN
ACM International Conference on Automated Software Engineering: October, 793-803, 0
TzuYu: Learning stateful typestates.(2013)
H XIAO, J SUN, Y LIU, SW LIN, C SUN
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated …, 0
A Unifying Approach to Validate Specification-Oriented XML Constraints
Y Zhao, Z Wang, H Xiao, J Ping, G Pu, J He
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–18