default search action
BibTeX records: Wei Chen 0023
@article{DBLP:journals/sncs/FloodCCA22, author = {Robert Flood and Sheung Chi Chan and Wei Chen and David Aspinall}, title = {Checking Contact Tracing App Implementations with Bespoke Static Analysis}, journal = {{SN} Comput. Sci.}, volume = {3}, number = {6}, pages = {496}, year = {2022}, url = {https://doi.org/10.1007/s42979-022-01357-w}, doi = {10.1007/S42979-022-01357-W}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/FloodCCA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FloodCC021, author = {Robert Flood and Sheung Shi Chan and Wei Chen and David Aspinall}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Checking Contact Tracing App Implementations}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {133--144}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010237201330144}, doi = {10.5220/0010237201330144}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FloodCC021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ChenLGNLA18, author = {Wei Chen and Yuhui Lin and Vashti Galpin and Vivek Nigam and Myungjin Lee and David Aspinall}, editor = {Lech Jan Janczewski and Miroslaw Kutylowski}, title = {Formal Analysis of Sneak-Peek: {A} Data Centre Attack and Its Mitigations}, booktitle = {{ICT} Systems Security and Privacy Protection - 33rd {IFIP} {TC} 11 International Conference, {SEC} 2018, Held at the 24th {IFIP} World Computer Congress, {WCC} 2018, Poznan, Poland, September 18-20, 2018, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {529}, pages = {307--322}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99828-2\_22}, doi = {10.1007/978-3-319-99828-2\_22}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ChenLGNLA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/Chen0GSM16, author = {Wei Chen and David Aspinall and Andrew D. Gordon and Charles Sutton and Igor Muttik}, editor = {David Aspinall and Lorenzo Cavallaro and Mohamed Nassim Seghir and Melanie Volkamer}, title = {Explaining Unwanted Behaviours in Context}, booktitle = {Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, {IMPS} 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, April 6, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1575}, pages = {38--45}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1575/paper\_1.pdf}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/essos/Chen0GSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosec/ChenAGSM16, author = {Wei Chen and David Aspinall and Andrew D. Gordon and Charles Sutton and Igor Muttik}, editor = {Michalis Polychronakis and Cristiano Giuffrida}, title = {A text-mining approach to explain unwanted behaviours}, booktitle = {Proceedings of the 9th European Workshop on System Security, {EUROSEC} 2016, London, UK, April 18-21, 2016}, pages = {4:1--4:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2905760.2905763}, doi = {10.1145/2905760.2905763}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosec/ChenAGSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/ChenAGSM16, author = {Wei Chen and David Aspinall and Andrew D. Gordon and Charles Sutton and Igor Muttik}, editor = {Erika {\'{A}}brah{\'{a}}m and Marieke Huisman}, title = {On Robust Malware Classifiers by Verifying Unwanted Behaviours}, booktitle = {Integrated Formal Methods - 12th International Conference, {IFM} 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9681}, pages = {326--341}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-33693-0\_21}, doi = {10.1007/978-3-319-33693-0\_21}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifm/ChenAGSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ChenAGSM16, author = {Wei Chen and David Aspinall and Andrew D. Gordon and Charles Sutton and Igor Muttik}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {More Semantics More Robust: Improving Android Malware Classifiers}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {147--158}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939931}, doi = {10.1145/2939918.2939931}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ChenAGSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/0001C14, author = {Martin Hofmann and Wei Chen}, editor = {Thomas A. Henzinger and Dale Miller}, title = {Abstract interpretation from B{\"{u}}chi automata}, booktitle = {Joint Meeting of the Twenty-Third {EACSL} Annual Conference on Computer Science Logic {(CSL)} and the Twenty-Ninth Annual {ACM/IEEE} Symposium on Logic in Computer Science (LICS), {CSL-LICS} '14, Vienna, Austria, July 14 - 18, 2014}, pages = {51:1--51:10}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2603088.2603127}, doi = {10.1145/2603088.2603127}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csl/0001C14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HofmannC14, author = {Martin Hofmann and Wei Chen}, title = {B{\"{u}}chi Types for Infinite Traces and Liveness}, journal = {CoRR}, volume = {abs/1401.5107}, year = {2014}, url = {http://arxiv.org/abs/1401.5107}, eprinttype = {arXiv}, eprint = {1401.5107}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HofmannC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/Backhouse0F13, author = {Roland Carl Backhouse and Wei Chen and Jo{\~{a}}o F. Ferreira}, title = {The algorithmics of solitaire-like games}, journal = {Sci. Comput. Program.}, volume = {78}, number = {11}, pages = {2029--2046}, year = {2013}, url = {https://doi.org/10.1016/j.scico.2012.07.007}, doi = {10.1016/J.SCICO.2012.07.007}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scp/Backhouse0F13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mpc/BackhouseCF10, author = {Roland Carl Backhouse and Wei Chen and Jo{\~{a}}o F. Ferreira}, editor = {Claude Bolduc and Jos{\'{e}}e Desharnais and B{\'{e}}chir Ktari}, title = {The Algorithmics of Solitaire-Like Games}, booktitle = {Mathematics of Program Construction, 10th International Conference, {MPC} 2010, Qu{\'{e}}bec City, Canada, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6120}, pages = {1--18}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13321-3\_1}, doi = {10.1007/978-3-642-13321-3\_1}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mpc/BackhouseCF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.