default search action
Liangze Yin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c26]Peng Xu, Liangze Yin, Jiantong Ma, Dong Yang, Wei Dong:
FAEG: Feature-Driven Automatic Exploit Generation. Internetware 2023: 165-173 - [c25]Liang Sun, Bailin Lu, Liangze Yin, Zhe Bu, Wenjing Jin:
OpenMP Program Verification Based on Bounded Model Checking. QRS Companion 2023: 849-850 - 2021
- [j7]Ying-Jie Wang, Liangze Yin, Wei Dong:
AMCheX: Accurate Analysis of Missing-Check Bugs for Linux Kernel. J. Comput. Sci. Technol. 36(6): 1325-1341 (2021) - [c24]Xiang Du, Liangze Yin, Haining Feng, Wei Dong:
Program Verification Enhanced Precise Analysis of Interrupt-Driven Program Vulnerabilities. APSEC 2021: 253-263 - [c23]Xiang Du, Liangze Yin, Wei Dong:
Simplify Array Processing Loops for Efficient Program Verification. ISSRE 2021: 401-411 - [c22]Ranjie Ding, Wenfeng Lin, Xiang Du, Liangze Yin:
Extend Rchecker for Accurate Analysis of Real Embedded Projects. QRS Companion 2021: 256-261 - 2020
- [j6]Liangze Yin, Wei Dong, Wanwei Liu, Ji Wang:
On Scheduling Constraint Abstraction for Multi-Threaded Program Verification. IEEE Trans. Software Eng. 46(5): 549-565 (2020) - [c21]Peng Wu, Liangze Yin, Xiang Du, Liyuan Jia, Wei Dong:
Graph-based Vulnerability Detection via Extracting Features from Sliced Code. QRS Companion 2020: 38-45 - [c20]Xiang Du, Liangze Yin, Peng Wu, Liyuan Jia, Wei Dong:
Vulnerability Analysis through Interface-based Checker Design. QRS Companion 2020: 46-52 - [c19]Haining Feng, Liangze Yin, Wenfeng Lin, Xudong Zhao, Wei Dong:
Rchecker: A CBMC-based Data Race Detector for Interrupt-driven Programs. QRS Companion 2020: 465-471 - [c18]Wanwei Liu, Liangze Yin, Tun Li:
Compiling FLres on Finite Words. SETTA 2020: 108-123
2010 – 2019
- 2019
- [c17]Liangze Yin, Wei Dong, Wanwei Liu, Ji Wang:
Parallel refinement for multi-threaded program verification. ICSE 2019: 643-653 - 2018
- [j5]Liangze Yin, Wei Dong, Fei He, Ji Wang:
A True-Concurrency Encoding for BMC of Compositional Systems. Comput. J. 61(5): 658-671 (2018) - [j4]Fei He, Yuan Gao, Liangze Yin:
Efficient software product-line model checking using induction and a SAT solver. Frontiers Comput. Sci. 12(2): 264-279 (2018) - [j3]Luhang Xu, Liangze Yin, Wei Dong, Weixi Jia, Yongjun Li:
Expediting Binary Fuzzing with Symbolic Analysis. Int. J. Softw. Eng. Knowl. Eng. 28(11-12): 1701-1718 (2018) - [c16]Xinjun Mao, Yao Lu, Liangze Yin, Tao Wang, Gang Yin:
Model and Practice of Crowd-Based Education. APWeb/WAIM Workshops 2018: 293-305 - [c15]Liangze Yin, Wei Dong, Wanwei Liu, Ji Wang:
Scheduling constraint based abstraction refinement for weak memory models. ASE 2018: 645-655 - [c14]Luhang Xu, Wei Dong, Liangze Yin, Qiuxi Zhong:
Guide Fuzzing with Multi-Factor Potential Analysis. QRS Companion 2018: 477-482 - [c13]Bailin Lu, Wei Dong, Liangze Yin, Li Zhang:
Evaluating and Integrating Diverse Bug Finders for Effective Program Analysis. SATE 2018: 51-67 - [c12]Luhang Xu, Wei Dong, Liangze Yin, Weixi Jia, Shenzhi Li:
Expediting Binary Fuzzing with Symbolic Analysis. SEKE 2018: 604-603 - [c11]Liangze Yin, Wei Dong, Wanwei Liu, Yunchou Li, Ji Wang:
YOGAR-CBMC: CBMC with Scheduling Constraint Based Abstraction Refinement - (Competition Contribution). TACAS (2) 2018: 422-426 - 2017
- [j2]Qilin Liu, Wei Dong, Liangze Yin, Xuan Qi, Shazhou Yang:
混源软件质量模型与度量方法研究 (Research on Mixed Source Software Quality Model and Measurement Method). 计算机科学 44(4): 82-84 (2017) - [c10]Ge Zhou, Wei Dong, Wanwei Liu, Hao Shi, Chi Hu, Liangze Yin:
Optimizing Monitor Code Based on Patterns in Runtime Verification. QRS Companion 2017: 348-354 - [c9]Hao Shi, Wei Dong, Ge Zhou, Liangze Yin:
Monitor Synthesis for Parametric MTL Properties in Discrete Control Software. QRS Companion 2017: 355-362 - [i1]Liangze Yin, Wei Dong, Wanwei Liu, Ji Wang:
Scheduling Constraint Based Abstraction Refinement for Multi-Threaded Program Verification. CoRR abs/1708.08323 (2017) - 2014
- [c8]Liangze Yin, Fei He, Ming Gu, Jia-Guang Sun:
Clause Replication and Reuse in Incremental Temporal Induction. ICECCS 2014: 108-115 - [c7]Fei He, Bow-Yaw Wang, Liangze Yin, Lei Zhu:
Symbolic assume-guarantee reasoning through BDD learning. ICSE 2014: 1071-1082 - 2013
- [c6]Fei He, Liangze Yin, Bow-Yaw Wang, Lianyi Zhang, Guanyu Mu, Wenrui Meng:
VCS: A Verifier for Component-Based Systems. ATVA 2013: 478-481 - [c5]Min Zhou, Hai Wan, Chen Su, Liangze Yin, Lianyi Zhang, Fei He, Ming Gu:
Component-Based Modeling and Code Synthesis for Cyclic Programs. COMPSAC 2013: 569-578 - [c4]Chen Su, Min Zhou, Liangze Yin, Hai Wan, Ming Gu:
Modeling and Verification of Component-Based Systems with Data Passing Using BIP. ICECCS 2013: 4-13 - [c3]Liangze Yin, Fei He, Min Zhou, Ming Gu:
Reusing Search Tree for Incremental SAT Solving of Temporal Induction. ICECCS 2013: 85-92 - [c2]Liangze Yin, Fei He, Ming Gu:
Optimizing the SAT Decision Ordering of Bounded Model Checking by Structural Information. TASE 2013: 23-26 - 2012
- [j1]Liangze Yin, Fei He, William N. N. Hung, Xiaoyu Song, Ming Gu:
Maxterm Covering for Satisfiability. IEEE Trans. Computers 61(3): 420-426 (2012) - [c1]Rui Wang, Min Zhou, Liangze Yin, Lianyi Zhang, Jiaguang Sun, Ming Gu, Marius Bozga:
Modeling and Validation of PLC-Controlled Systems: A Case Study. TASE 2012: 161-166
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint