BibTeX records: Wei Chen 0023

download as .bib file

@article{DBLP:journals/sncs/FloodCCA22,
  author       = {Robert Flood and
                  Sheung Chi Chan and
                  Wei Chen and
                  David Aspinall},
  title        = {Checking Contact Tracing App Implementations with Bespoke Static Analysis},
  journal      = {{SN} Comput. Sci.},
  volume       = {3},
  number       = {6},
  pages        = {496},
  year         = {2022},
  url          = {https://doi.org/10.1007/s42979-022-01357-w},
  doi          = {10.1007/S42979-022-01357-W},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/FloodCCA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FloodCC021,
  author       = {Robert Flood and
                  Sheung Shi Chan and
                  Wei Chen and
                  David Aspinall},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Checking Contact Tracing App Implementations},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {133--144},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010237201330144},
  doi          = {10.5220/0010237201330144},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FloodCC021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ChenLGNLA18,
  author       = {Wei Chen and
                  Yuhui Lin and
                  Vashti Galpin and
                  Vivek Nigam and
                  Myungjin Lee and
                  David Aspinall},
  editor       = {Lech Jan Janczewski and
                  Miroslaw Kutylowski},
  title        = {Formal Analysis of Sneak-Peek: {A} Data Centre Attack and Its Mitigations},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 33rd {IFIP} {TC} 11
                  International Conference, {SEC} 2018, Held at the 24th {IFIP} World
                  Computer Congress, {WCC} 2018, Poznan, Poland, September 18-20, 2018,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {529},
  pages        = {307--322},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99828-2\_22},
  doi          = {10.1007/978-3-319-99828-2\_22},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ChenLGNLA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/Chen0GSM16,
  author       = {Wei Chen and
                  David Aspinall and
                  Andrew D. Gordon and
                  Charles Sutton and
                  Igor Muttik},
  editor       = {David Aspinall and
                  Lorenzo Cavallaro and
                  Mohamed Nassim Seghir and
                  Melanie Volkamer},
  title        = {Explaining Unwanted Behaviours in Context},
  booktitle    = {Proceedings of the 1st International Workshop on Innovations in Mobile
                  Privacy and Security, {IMPS} 2016, co-located with the International
                  Symposium on Engineering Secure Software and Systems (ESSoS 2016),
                  London, UK, April 6, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1575},
  pages        = {38--45},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1575/paper\_1.pdf},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/Chen0GSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/ChenAGSM16,
  author       = {Wei Chen and
                  David Aspinall and
                  Andrew D. Gordon and
                  Charles Sutton and
                  Igor Muttik},
  editor       = {Michalis Polychronakis and
                  Cristiano Giuffrida},
  title        = {A text-mining approach to explain unwanted behaviours},
  booktitle    = {Proceedings of the 9th European Workshop on System Security, {EUROSEC}
                  2016, London, UK, April 18-21, 2016},
  pages        = {4:1--4:6},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2905760.2905763},
  doi          = {10.1145/2905760.2905763},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosec/ChenAGSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifm/ChenAGSM16,
  author       = {Wei Chen and
                  David Aspinall and
                  Andrew D. Gordon and
                  Charles Sutton and
                  Igor Muttik},
  editor       = {Erika {\'{A}}brah{\'{a}}m and
                  Marieke Huisman},
  title        = {On Robust Malware Classifiers by Verifying Unwanted Behaviours},
  booktitle    = {Integrated Formal Methods - 12th International Conference, {IFM} 2016,
                  Reykjavik, Iceland, June 1-5, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9681},
  pages        = {326--341},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-33693-0\_21},
  doi          = {10.1007/978-3-319-33693-0\_21},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifm/ChenAGSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChenAGSM16,
  author       = {Wei Chen and
                  David Aspinall and
                  Andrew D. Gordon and
                  Charles Sutton and
                  Igor Muttik},
  editor       = {Matthias Hollick and
                  Panos Papadimitratos and
                  William Enck},
  title        = {More Semantics More Robust: Improving Android Malware Classifiers},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany,
                  July 18-22, 2016},
  pages        = {147--158},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2939918.2939931},
  doi          = {10.1145/2939918.2939931},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ChenAGSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/0001C14,
  author       = {Martin Hofmann and
                  Wei Chen},
  editor       = {Thomas A. Henzinger and
                  Dale Miller},
  title        = {Abstract interpretation from B{\"{u}}chi automata},
  booktitle    = {Joint Meeting of the Twenty-Third {EACSL} Annual Conference on Computer
                  Science Logic {(CSL)} and the Twenty-Ninth Annual {ACM/IEEE} Symposium
                  on Logic in Computer Science (LICS), {CSL-LICS} '14, Vienna, Austria,
                  July 14 - 18, 2014},
  pages        = {51:1--51:10},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2603088.2603127},
  doi          = {10.1145/2603088.2603127},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/0001C14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HofmannC14,
  author       = {Martin Hofmann and
                  Wei Chen},
  title        = {B{\"{u}}chi Types for Infinite Traces and Liveness},
  journal      = {CoRR},
  volume       = {abs/1401.5107},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.5107},
  eprinttype    = {arXiv},
  eprint       = {1401.5107},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HofmannC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/Backhouse0F13,
  author       = {Roland Carl Backhouse and
                  Wei Chen and
                  Jo{\~{a}}o F. Ferreira},
  title        = {The algorithmics of solitaire-like games},
  journal      = {Sci. Comput. Program.},
  volume       = {78},
  number       = {11},
  pages        = {2029--2046},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.scico.2012.07.007},
  doi          = {10.1016/J.SCICO.2012.07.007},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scp/Backhouse0F13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mpc/BackhouseCF10,
  author       = {Roland Carl Backhouse and
                  Wei Chen and
                  Jo{\~{a}}o F. Ferreira},
  editor       = {Claude Bolduc and
                  Jos{\'{e}}e Desharnais and
                  B{\'{e}}chir Ktari},
  title        = {The Algorithmics of Solitaire-Like Games},
  booktitle    = {Mathematics of Program Construction, 10th International Conference,
                  {MPC} 2010, Qu{\'{e}}bec City, Canada, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6120},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13321-3\_1},
  doi          = {10.1007/978-3-642-13321-3\_1},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mpc/BackhouseCF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}