default search action
Fuyuan Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j10]Jingbin Wang, Renfei Wu, Yuwei Wu, Fuyuan Zhang, Sirui Zhang, Kun Guo:
MPNet: temporal knowledge graph completion based on a multi-policy network. Appl. Intell. 54(3): 2491-2507 (2024) - [j9]Fuyuan Zhang, Hongzhe Cao, Helong Si, Jinping Zang, Jingao Dong, Jihong Xing, Kang Zhang:
FGCD: a database of fungal gene clusters related to secondary metabolism. Database J. Biol. Databases Curation 2024 (2024) - [j8]Jingbin Wang, Hao Huang, Yuwei Wu, Fuyuan Zhang, Sirui Zhang, Kun Guo:
Open Knowledge Graph Link Prediction with Semantic-Aware Embedding. Expert Syst. Appl. 249: 123542 (2024) - 2023
- [j7]Hua Qi, Zhijie Wang, Qing Guo, Jianlang Chen, Felix Juefei-Xu, Fuyuan Zhang, Lei Ma, Jianjun Zhao:
ArchRepair: Block-Level Architecture-Oriented Repairing for Deep Neural Networks. ACM Trans. Softw. Eng. Methodol. 32(5): 129:1-129:31 (2023) - 2021
- [j6]Xinwen Hu, Yi Zhuang, Shangwei Lin, Fuyuan Zhang, Shuanglong Kan, Zining Cao:
A security type verifier for smart contracts. Comput. Secur. 108: 102343 (2021) - 2020
- [j5]Xinwen Hu, Yi Zhuang, Fuyuan Zhang:
A security modeling and verification method of embedded software based on Z and MARTE. Comput. Secur. 88 (2020) - [j4]Caterina Urban, Maria Christakis, Valentin Wüstholz, Fuyuan Zhang:
Perfectly parallel fairness certification of neural networks. Proc. ACM Program. Lang. 4(OOPSLA): 185:1-185:30 (2020) - 2019
- [j3]Xiaolu Hou, Jakub Breier, Fuyuan Zhang, Yang Liu:
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(3): 1-29 (2019) - [j2]Yongwang Zhao, David Sanán, Fuyuan Zhang, Yang Liu:
Refinement-Based Specification and Security Analysis of Separation Kernels. IEEE Trans. Dependable Secur. Comput. 16(1): 127-141 (2019) - 2016
- [j1]Yongwang Zhao, David Sanán, Fuyuan Zhang, Yang Liu:
Formal Specification and Analysis of Partitioning Operating Systems by Integrating Ontology and Refinement. IEEE Trans. Ind. Informatics 12(4): 1321-1331 (2016)
Conference and Workshop Papers
- 2024
- [c26]Paolo Arcaini, Fuyuki Ishikawa, Lei Ma, Yuta Maezawa, Nobukazu Yoshioka, Fuyuan Zhang:
Technical Briefing on Deep Neural Network Repair. ICSE Companion 2024: 428-430 - 2023
- [c25]Xuan Xie, Fuyuan Zhang, Xinwen Hu, Lei Ma:
DeepGemini: Verifying Dependency Fairness for Deep Neural Network. AAAI 2023: 15251-15259 - [c24]Changkai You, Xinyu Lin, Yuwei Wu, Sirui Zhang, Fuyuan Zhang, Jingbin Wang:
Time Split Network for Temporal Knowledge Graph Completion. ChineseCSCW (1) 2023: 333-347 - [c23]Xiaohong Xiang, Fuyuan Zhang, Xin Deng, Xiaoyu Ding:
Visualization Enhancement of Saliency Methods Based on the Sliding Window Mechanism. ECAI 2023: 2728-2735 - [c22]Xiaohong Xiang, Fuyuan Zhang, Xin Deng, Ke Hu:
MSG-CAM:Multi-scale inputs make a better visual interpretation of CNN networks. ICME 2023: 312-317 - [c21]Zhuo Li, Xiongfei Wu, Derui Zhu, Mingfei Cheng, Siyuan Chen, Fuyuan Zhang, Xiaofei Xie, Lei Ma, Jianjun Zhao:
Generative Model-Based Testing on Decision-Making Policies. ASE 2023: 243-254 - [c20]Jiaming Ye, Shangzhou Xia, Fuyuan Zhang, Paolo Arcaini, Lei Ma, Jianjun Zhao, Fuyuki Ishikawa:
QuraTest: Integrating Quantum Specific Features in Quantum Program Testing. ASE 2023: 1149-1161 - [c19]Fuyuan Zhang, Xiaohong Xiang, Xin Deng, Xiaoyu Ding:
Multi-size Scaled CAM for More Accurate Visual Interpretation of CNNs. NCAA (2) 2023: 147-161 - [c18]Fuyuan Zhang, Xinwen Hu, Lei Ma, Jianjun Zhao:
DeepRover: A Query-Efficient Blackbox Attack for Deep Neural Networks. ESEC/SIGSOFT FSE 2023: 1384-1394 - 2020
- [c17]Xin-Yi Peng, Jun Cao, Fuyuan Zhang:
Masked Face Detection Based on Locally Nonlinear Feature Fusion. ICSCA 2020: 114-118 - [c16]Muhammad Numair Mansur, Maria Christakis, Valentin Wüstholz, Fuyuan Zhang:
Detecting critical bugs in SMT solvers using blackbox mutational fuzzing. ESEC/SIGSOFT FSE 2020: 701-712 - [c15]Fuyuan Zhang, Sankalan Pal Chowdhury, Maria Christakis:
DeepSearch: a simple and effective blackbox attack for deep neural networks. ESEC/SIGSOFT FSE 2020: 800-812 - 2019
- [c14]Yongwang Zhao, David Sanán, Fuyuan Zhang, Yang Liu:
A Parametric Rely-Guarantee Reasoning Framework for Concurrent Reactive Systems. FM 2019: 161-178 - [c13]Chengyu Zhang, Ting Su, Yichen Yan, Fuyuan Zhang, Geguang Pu, Zhendong Su:
Finding and understanding bugs in software model checkers. ESEC/SIGSOFT FSE 2019: 763-773 - 2018
- [c12]Flemming Nielson, Hanne Riis Nielson, Fuyuan Zhang:
Multi-valued Logic for Static Analysis and Model Checking. Models, Mindsets, Meta 2018: 89-109 - [c11]Fuyuan Zhang, Yongwang Zhao, David Sanán, Yang Liu, Alwen Tiu, Shang-Wei Lin, Jun Sun:
Compositional Reasoning for Shared-Variable Concurrent Programs. FM 2018: 523-541 - [c10]Lei Ma, Fuyuan Zhang, Jiyuan Sun, Minhui Xue, Bo Li, Felix Juefei-Xu, Chao Xie, Li Li, Yang Liu, Jianjun Zhao, Yadong Wang:
DeepMutation: Mutation Testing of Deep Learning Systems. ISSRE 2018: 100-111 - [c9]Lei Ma, Felix Juefei-Xu, Fuyuan Zhang, Jiyuan Sun, Minhui Xue, Bo Li, Chunyang Chen, Ting Su, Li Li, Yang Liu, Jianjun Zhao, Yadong Wang:
DeepGauge: multi-granularity testing criteria for deep learning systems. ASE 2018: 120-131 - 2017
- [c8]Yang Han, Jun Cao, Fuyuan Zhang, Qiyu Jin:
The control regularization-term iterative algorithm for image deconvolution. ICSAI 2017: 1191-1196 - [c7]David Sanán, Yongwang Zhao, Zhe Hou, Fuyuan Zhang, Alwen Tiu, Yang Liu:
CSimpl: A Rely-Guarantee-Based Framework for Verifying Concurrent Programs. TACAS (1) 2017: 481-498 - 2016
- [c6]Yongwang Zhao, David Sanán, Fuyuan Zhang, Yang Liu:
Reasoning About Information Flow Security of Separation Kernels with Channel-Based Communication. TACAS 2016: 791-810 - 2014
- [c5]Fuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun-Jin Kim, Yih-Chun Hu, Adrian Perrig:
Mechanized Network Origin and Path Authenticity Proofs. CCS 2014: 346-357 - 2012
- [c4]Fuyuan Zhang, Flemming Nielson, Hanne Riis Nielson:
Model Checking as Static Analysis: Revisited. IFM 2012: 99-112 - 2010
- [c3]Zhenhe Wang, Shaocong Guo, Fuyuan Zhang:
A Mathematical Model of Magnetic Bearing Control Based on Fuzzy Logic and Single Neuron. APWCS 2010: 371-374 - 2009
- [c2]Zhengwei Qi, Liang Liu, Fuyuan Zhang, Haibing Guan, Hao Wang, Ying Chen:
FLTL-MC: Online High Level Program Analysis for Web Services. SERVICES I 2009: 171-178 - [c1]Fuyuan Zhang, Zhengwei Qi, Haibing Guan, Xuezheng Liu, Mao Yang, Zheng Zhang:
FiLM: A Runtime Monitoring Tool for Distributed Systems. SSIRI 2009: 40-46
Informal and Other Publications
- 2024
- [i18]Shangzhou Xia, Jianjun Zhao, Fuyuan Zhang, Xiaoyu Guo:
Concolic Testing of Quantum Programs. CoRR abs/2405.04860 (2024) - [i17]Xuan Xie, Jiayang Song, Yuheng Huang, Da Song, Fuyuan Zhang, Felix Juefei-Xu, Lei Ma:
LeCov: Multi-level Testing Criteria for Large Language Models. CoRR abs/2408.10474 (2024) - 2023
- [i16]Xuan Xie, Jiayang Song, Zhehua Zhou, Fuyuan Zhang, Lei Ma:
Mosaic: Model-based Safety Analysis Framework for AI-enabled Cyber-Physical Systems. CoRR abs/2305.03882 (2023) - [i15]Yongwang Zhao, David Sanán, Fuyuan Zhang, Yang Liu:
Event-based Compositional Reasoning of Information-Flow Security for Concurrent Systems. CoRR abs/2309.09141 (2023) - 2022
- [i14]Xuan Xie, Fuyuan Zhang:
DeepGalaxy: Testing Neural Network Verifiers via Two-Dimensional Input Space Exploration. CoRR abs/2201.08087 (2022) - [i13]Jiaming Ye, Mulong Xie, Siyuan Chen, Fuyuan Zhang, Lei Ma, Zhenchang Xing, Jianjun Zhao:
Towards Benchmarking GUI Compatibility Testing on Mobile Applications. CoRR abs/2212.13424 (2022) - 2020
- [i12]Muhammad Numair Mansur, Maria Christakis, Valentin Wüstholz, Fuyuan Zhang:
Detecting Critical Bugs in SMT Solvers Using Blackbox Mutational Fuzzing. CoRR abs/2004.05934 (2020) - 2019
- [i11]Fuyuan Zhang, Sankalan Pal Chowdhury, Maria Christakis:
DeepSearch: Simple and Effective Blackbox Fuzzing of Deep Neural Networks. CoRR abs/1910.06296 (2019) - [i10]Caterina Urban, Maria Christakis, Valentin Wüstholz, Fuyuan Zhang:
Perfectly Parallel Fairness Certification of Neural Networks. CoRR abs/1912.02499 (2019) - 2018
- [i9]Lei Ma, Felix Juefei-Xu, Jiyuan Sun, Chunyang Chen, Ting Su, Fuyuan Zhang, Minhui Xue, Bo Li, Li Li, Yang Liu, Jianjun Zhao, Yadong Wang:
DeepGauge: Comprehensive and Multi-Granularity Testing Criteria for Gauging the Robustness of Deep Learning Systems. CoRR abs/1803.07519 (2018) - [i8]Lei Ma, Fuyuan Zhang, Jiyuan Sun, Minhui Xue, Bo Li, Felix Juefei-Xu, Chao Xie, Li Li, Yang Liu, Jianjun Zhao, Yadong Wang:
DeepMutation: Mutation Testing of Deep Learning Systems. CoRR abs/1805.05206 (2018) - [i7]Lei Ma, Fuyuan Zhang, Minhui Xue, Bo Li, Yang Liu, Jianjun Zhao, Yadong Wang:
Combinatorial Testing for Deep Learning Systems. CoRR abs/1806.07723 (2018) - [i6]Yongwang Zhao, David Sanán, Fuyuan Zhang, Yang Liu:
An Event-based Compositional Reasoning Approach for Concurrent Reactive Systems. CoRR abs/1810.07855 (2018) - [i5]Xiaolu Hou, Jakub Breier, Fuyuan Zhang, Yang Liu:
Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms. IACR Cryptol. ePrint Arch. 2018: 545 (2018) - 2017
- [i4]Yongwang Zhao, David Sanán, Fuyuan Zhang, Yang Liu:
High-Assurance Separation Kernels: A Survey on Formal Methods. CoRR abs/1701.01535 (2017) - [i3]Yongwang Zhao, David Sanán, Fuyuan Zhang, Yang Liu:
Refinement-based Specification and Security Analysis of Separation Kernels. CoRR abs/1702.05997 (2017) - 2016
- [i2]Fuyuan Zhang, Yongwang Zhao, David Sanán, Yang Liu, Alwen Tiu, Shang-Wei Lin, Zhimin Wu, Jun Sun:
Compositional Reasoning for Shared-variable Concurrent Programs. CoRR abs/1611.00574 (2016) - 2015
- [i1]Yongwang Zhao, David Sanán, Fuyuan Zhang, Yang Liu:
Reasoning About Information Flow Security of Separation Kernels with Channel-based Communication. CoRR abs/1510.05091 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint