Остановите войну!
for scientists:
default search action
Jiaxiang Liu 0001
Person information
- affiliation: Shenzhen University, China
Other persons with the same name
- Jiaxiang Liu — disambiguation page
- Jiaxiang Liu 0002 — Beijing University of Posts and Telecommunications, Beijing, China
- Jiaxiang Liu 0003 — Wuhan University of Science and Technology, Wuhan, China
- Jiaxiang Liu 0004 — Baidu Inc., Beijing, China
- Jiaxiang Liu 0005 — Anqing Normal University, Anqing, China
- Jiaxiang Liu 0006 — Beijing Institute of Technology, School of Computer Technology, Zhuhai City, China
- Jiaxiang Liu 0007 — University of Waterloo, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c14]Ming-Hsien Tsai, Yu-Fu Fu, Jiaxiang Liu, Xiaomu Shi, Bow-Yaw Wang, Bo-Yin Yang:
CoqCryptoLine: A Verified Model Checker with Certified Results. CAV (2) 2023: 227-240 - [c13]Ming-Hsien Tsai, Yu-Fu Fu, Jiaxiang Liu, Xiaomu Shi, Bow-Yaw Wang, Bo-Yin Yang:
Certified Verification for Algebraic Abstraction. CAV (3) 2023: 329-349 - [c12]Xuezhou Tang, Ye Zheng, Jiaxiang Liu:
Boosting Multi-neuron Convex Relaxation for Neural Network Verification. SAS 2023: 540-563 - [c11]Ruiling Chen, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
llvm2CryptoLine: Verifying Arithmetic in Cryptographic C Programs. ESEC/SIGSOFT FSE 2023: 2167-2171 - [i4]Li-Chang Lai, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking. IACR Cryptol. ePrint Arch. 2023: 1861 (2023) - 2022
- [j5]Ye Zheng, Xiaomu Shi, Jiaxiang Liu:
Multi-path Back-propagation Method for Neural Network Verification. Int. J. Softw. Informatics 12(4): 377-401 (2022) - [j4]Gilles Dowek, Gaspard Férey, Jean-Pierre Jouannaud, Jiaxiang Liu:
Confluence of left-linear higher-order rewrite theories by checking their nested critical pairs. Math. Struct. Comput. Sci. 32(7): 898-933 (2022) - [j3]Vincent Hwang, Jiaxiang Liu, Gregor Seiler, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 718-750 (2022) - [c10]Zhe Zhao, Yedi Zhang, Guangke Chen, Fu Song, Taolue Chen, Jiaxiang Liu:
CLEVEREST: Accelerating CEGAR-based Neural Network Verification via Adversarial Attacks. SAS 2022: 449-473 - [c9]Ye Zheng, Jiaxiang Liu, Xiaomu Shi:
MpBP: verifying robustness of neural networks with multi-path bound propagation. ESEC/SIGSOFT FSE 2022: 1692-1696 - [i3]Jiaxiang Liu, Yunhan Xing, Xiaomu Shi, Fu Song, Zhiwu Xu, Zhong Ming:
Abstraction and Refinement: Towards Scalable and Exact Verification of Neural Networks. CoRR abs/2207.00759 (2022) - [i2]Ming-Hsien Tsai, Yu-Fu Fu, Xiaomu Shi, Jiaxiang Liu, Bow-Yaw Wang, Bo-Yin Yang:
Automatic Certified Verification of Cryptographic Programs with COQCRYPTOLINE. IACR Cryptol. ePrint Arch. 2022: 1116 (2022) - 2021
- [c8]Xiaomu Shi, Yu-Fu Fu, Jiaxiang Liu, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
CoqQFBV: A Scalable Certified SMT Quantifier-Free Bit-Vector Solver. CAV (2) 2021: 149-171
2010 – 2019
- 2019
- [c7]Yu-Fu Fu, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Signed Cryptographic Program Verification with Typed CryptoLine. CCS 2019: 1591-1606 - [c6]Zuxing Gu, Jiecheng Wu, Jiaxiang Liu, Min Zhou, Ming Gu:
An Empirical Study on API-Misuse Bugs in Open-Source C Programs. COMPSAC (1) 2019: 11-20 - [c5]Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Verifying Arithmetic in Cryptographic C Programs. ASE 2019: 552-564 - [c4]Zuxing Gu, Min Zhou, Jiecheng Wu, Yu Jiang, Jiaxiang Liu, Ming Gu:
IMSpec: An Extensible Approach to Exploring the Incorrect Usage of APIs. TASE 2019: 216-223 - 2017
- [j2]Jiaxiang Liu, Min Zhou, Xiaoyu Song, Ming Gu, Jiaguang Sun:
Formal Modeling and Verification of a Rate-Monotonic Scheduling Implementation with Real-Time Maude. IEEE Trans. Ind. Electron. 64(4): 3239-3249 (2017) - 2016
- [b1]Jiaxiang Liu:
Confluence properties of rewrite rules by decreasing diagrams. (Propriétés de confluence des règles de réécriture par des diagrammes décroissants). University of Paris-Saclay, France, 2016 - 2015
- [c3]Jiaxiang Liu, Jean-Pierre Jouannaud, Mizuhito Ogawa:
Confluence of Layered Rewrite Systems. CSL 2015: 423-440 - [i1]Jean-Pierre Jouannaud, Jiaxiang Liu, Mizuhito Ogawa:
Confluence of Layered Rewrite Systems. CoRR abs/1509.04699 (2015) - 2014
- [c2]Jiaxiang Liu, Jean-Pierre Jouannaud:
Confluence: The Unifying, Expressive Power of Locality. Specification, Algebra, and Software 2014: 337-358 - [c1]Jiaxiang Liu, Nachum Dershowitz, Jean-Pierre Jouannaud:
Confluence by Critical Pair Analysis. RTA-TLCA 2014: 287-302 - 2012
- [j1]Jean-Pierre Jouannaud, Jiaxiang Liu:
From diagrammatic confluence to modularity. Theor. Comput. Sci. 464: 20-34 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-08 00:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint