default search action
Weiqiang Kong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Huanzhang Xiong, Gang Hou, Yueyuan Qin, Jie Wang, Weiqiang Kong:
A Dual Relaxation Method for Neural Network Verification. Int. J. Softw. Eng. Knowl. Eng. 34(8): 1199-1220 (2024) - 2023
- [j19]Xiaozhen Zhang, Zhaoming Yang, Hui Kong, Weiqiang Kong:
Verification of Safety for Synchronous-Reactive System Using Bounded Model Checking. Int. J. Softw. Eng. Knowl. Eng. 33(6): 885-932 (2023) - [c36]Huanzhang Xiong, Gang Hou, Long Zhu, Jie Wang, Weiqiang Kong:
A Single-sample Pruning and Clustering Method for Neural Network Verification. APSEC 2023: 319-328 - 2022
- [j18]Yixuan Tang, Zhilei Ren, He Jiang, Lei Qiao, Dong Liu, Zhide Zhou, Weiqiang Kong:
Detecting Compiler Bugs Via a Deep Learning-Based Framework. Int. J. Softw. Eng. Knowl. Eng. 32(5): 661-691 (2022) - [j17]Yixuan Tang, He Jiang, Zhide Zhou, Xiaochen Li, Zhilei Ren, Weiqiang Kong:
Detecting Compiler Warning Defects Via Diversity-Guided Program Mutation. IEEE Trans. Software Eng. 48(11): 4411-4432 (2022) - [c35]Xiaozhen Zhang, Zhaoming Yang, Hui Kong, Weiqiang Kong:
Bounded Model Checking of Synchronous Reactive Models in Ptolemy II. APSEC 2022: 407-416 - [c34]Xiaozhen Zhang, Zhaoming Yang, Hui Kong, Weiqiang Kong:
Formal Verification of Hierarchical Ptolemy II Synchronous-Reactive Models with Bounded Model Checking. QRS 2022: 410-421 - 2021
- [j16]Huihui Wu, Deyun Lv, Tengxiang Cui, Gang Hou, Masahiko Watanabe, Weiqiang Kong:
SDLV: Verification of Steering Angle Safety for Self-Driving Cars. Formal Aspects Comput. 33(3): 325-341 (2021) - [j15]Yixuan Tang, Zhilei Ren, He Jiang, Xiao-Chen Li, Weiqiang Kong:
An Empirical Comparison Between Tutorials and Crowd Documentation of Application Programming Interface. J. Comput. Sci. Technol. 36(4): 856-876 (2021) - 2020
- [j14]Yixuan Tang, Zhilei Ren, Weiqiang Kong, He Jiang:
Compiler testing: a systematic literature analysis. Frontiers Comput. Sci. 14(1): 1-20 (2020) - [c33]Zhen Wang, Xiaoning Han, Weiqiang Kong, Yong Piao, Gang Hou, Masahiko Watanabe, Akira Fukuda:
A Multi-Strategy Combination Framework for Android Malware Detection Based on Various Features. TASE 2020: 193-200
2010 – 2019
- 2019
- [j13]He Jiang, Liming Nie, Zeyi Sun, Zhilei Ren, Weiqiang Kong, Tao Zhang, Xiapu Luo:
ROSF: Leveraging Information Retrieval and Supervised Learning for Recommending Code Snippets. IEEE Trans. Serv. Comput. 12(1): 34-46 (2019) - [c32]Zhen Wang, Kai Li, Yan Hu, Akira Fukuda, Weiqiang Kong:
Multilevel Permission Extraction in Android Applications for Malware Detection. CITS 2019: 1-5 - [c31]Yuan Yuan, Weiqiang Kong, Gang Hou, Yan Hu, Masahiko Watanabe, Akira Fukuda:
From Local to Global Semantic Clone Detection. DSA 2019: 13-24 - [c30]Kun Liu, Xiaozhen Zhang, Weiqiang Kong, Gang Hou, Masahiko Watanabe, Akira Fukuda:
Interpolation-Based Multi-core Bounded Model Checking of HSTM Designs. DSA 2019: 25-36 - [c29]Gang Hou, Weiqiang Kong, Kuanjiu Zhou, Jie Wang, Chi Lin:
Non-Deterministic Behavior Analysis for Embedded Software Based on Probabilistic Model Checking. ICPADS 2019: 844-851 - [c28]Xiaozhen Zhang, Weiqiang Kong, Jianguo Jiang, Gang Hou, Akira Fukuda:
Steering Interpolants Generation with Efficient Interpolation Abstraction Exploration. TASE 2019: 113-120 - 2018
- [c27]Yan Hu, Weiqiang Kong, Deng Ding, Jun Yan:
Method-Level Permission Analysis Based on Static Call Graph of Android Apps. DSA 2018: 8-14 - [c26]Takahiro Ando, Bo Wang, Kenji Hisazumi, Weiqiang Kong, Akira Fukuda, Yasutaka Michiura, Keita Sakemi, Michihiro Matsumoto:
Verification Model Translation Method toward Behavior Model for CAST. DSA 2018: 142-147 - [c25]Akira Fukuda, Tsuneo Nakanishi, Kenji Hisazumi, Kunihiko Kaneko, Shigeaki Tagashira, Tsunenori Mine, Yutaka Arakawa, Shigemi Ishida, Takahiro Ando, Shuichi Ashihara, Masakatsu Ura, Yoshimichi Nakamura, Soichiro Nakamura, Weiqiang Kong, Guoqiang Li:
Toward Sustainable Smart Mobility Information Infrastructure Platform - Current Status -. IIAI-AAI 2018: 81-85 - [c24]Gang Hou, Weiqiang Kong, Kuanjiu Zhou, Jie Wang, Xun Cao, Akira Fukuda:
Analysis of Interrupt Behavior Based on Probabilistic Model Checking. IIAI-AAI 2018: 86-91 - [c23]Kun Liu, Weiqiang Kong, Gang Hou, Akira Fukuda:
A Survey of Formal Techniques for Hardware/Software Co-verification. IIAI-AAI 2018: 125-128 - [i3]Yixuan Tang, Zhilei Ren, Weiqiang Kong, He Jiang:
Compiler Testing: A Systematic Literature Analysis. CoRR abs/1810.02718 (2018) - 2017
- [j12]Gang Hou, Kuanjiu Zhou, Tie Qiu, Weiqiang Kong, Mingchu Li:
Performance Evaluation for Interrupt-Driven Embedded Software Based on EDSPN. IEEE Access 5: 5178-5189 (2017) - [j11]Yan Hu, Weiqiang Kong, Yizhi Ren, Kim-Kwang Raymond Choo:
A Branch History Directed Heuristic Search for Effective Binary Level Dynamic Symbolic Execution. IEEE Access 5: 8752-8762 (2017) - [i2]He Jiang, Liming Nie, Zeyi Sun, Zhilei Ren, Weiqiang Kong, Tao Zhang, Xiapu Luo:
ROSF: Leveraging Information Retrieval and Supervised Learning for Recommending Code Snippets. CoRR abs/1703.01446 (2017) - 2016
- [j10]Weiqiang Kong, Gang Hou, Xiangpei Hu, Takahiro Ando, Kenji Hisazumi, Akira Fukuda:
Garakabu2: an SMT-based bounded model checker for HSTM designs in ZIPC. J. Inf. Secur. Appl. 31: 61-74 (2016) - [c22]Weiqiang Kong, Gang Hou, Xiangpei Hu, Yasuhito Arimoto, Masahiko Watanabe, Takahiro Ando, Kenji Hisazumi, Akira Fukuda:
ZipPath: A Simple-But-Useful Path Finder for HSTM Designs in ZIPC. ICA 2016: 154-157 - [c21]Akira Fukuda, Kenji Hisazumi, Shigemi Ishida, Tsunenori Mine, Tsuneo Nakanishi, Hiroki Furusho, Shigeaki Tagashira, Yutaka Arakawa, Kunihiko Kaneko, Weiqiang Kong:
Towards Sustainable Information Infrastructure Platform for Smart Mobility - Project Overview. IIAI-AAI 2016: 211-214 - 2015
- [j9]Weiqiang Kong, Leyuan Liu, Takahiro Ando, Hirokazu Yatsu, Kenji Hisazumi, Akira Fukuda:
Facilitating Multicore Bounded Model Checking with Stateless Explicit-State Exploration. Comput. J. 58(11): 2824-2840 (2015) - [c20]He Jiang, Xin Chen, Shuwei Zhang, Xin Zhang, Weiqiang Kong, Tao Zhang:
Software for Wearable Devices: Challenges and Opportunities. COMPSAC Workshops 2015: 592-597 - [i1]He Jiang, Xin Chen, Shuwei Zhang, Xin Zhang, Weiqiang Kong, Tao Zhang:
Software for Wearable Devices: Challenges and Opportunities. CoRR abs/1504.00747 (2015) - 2014
- [j8]Yoriyuki Yamagata, Weiqiang Kong, Akira Fukuda, Nguyen Van Tang, Hitoshi Ohsaki, Kenji Taguchi:
A formal semantics of extended hierarchical state transition matrices using CSP#. Formal Aspects Comput. 26(5): 943-962 (2014) - [j7]Takahiro Ando, Hirokazu Yatsu, Weiqiang Kong, Kenji Hisazumi, Akira Fukuda:
Translation rules of SysML state machine diagrams into CSP# toward formal model checking. Int. J. Web Inf. Syst. 10(2): 151-169 (2014) - 2013
- [c19]Weiqiang Kong, Leyuan Liu, Takahiro Ando, Hirokazu Yatsu, Kenji Hisazumi, Akira Fukuda:
Harnessing SMT-Based Bounded Model Checking through Stateless Explicit-State Exploration. APSEC (1) 2013: 355-362 - [c18]Takahiro Ando, Hirokazu Yatsu, Weiqiang Kong, Kenji Hisazumi, Akira Fukuda:
Formalization and Model Checking of SysML State Machine Diagrams by CSP#. ICCSA (3) 2013: 114-127 - [c17]Hirokazu Yatsu, Takahiro Ando, Weiqiang Kong, Kenji Hisazumi, Akira Fukuda, Toshiaki Aoki, Kokichi Futatsugi:
Towards Formal Description of Standards for Automotive Operating Systems. ICST Workshops 2013: 13-14 - 2012
- [j6]Yoriyuki Yamagata, Weiqiang Kong, Akira Fukuda, Nguyen Van Tang, Hitoshi Ohsaki, Kenji Taguchi:
Formal semantics of extended hierarchical state transition matrix by CSP. ACM SIGSOFT Softw. Eng. Notes 37(4): 1-8 (2012) - [c16]Leyuan Liu, Weiqiang Kong, Shijie Zhou, Zhiguang Qin, Akira Fukuda:
Formal Verification of Communicating HSTM Designs. CIT 2012: 383-390 - [c15]Weiqiang Kong, Leyuan Liu, Yoriyuki Yamagata, Kenji Taguchi, Hitoshi Ohsaki, Akira Fukuda:
On Accelerating SMT-based Bounded Model Checking of HSTM Designs. APSEC 2012: 614-623 - [c14]Ming Li, Long Han, Weiqiang Kong, Shigeaki Tagashira, Yutaka Arakawa, Akira Fukuda:
A dynamic channel assignment method based on location information of mobile terminals in indoor WLAN positioning systems. IPIN 2012: 1-9 - 2011
- [j5]Weiqiang Kong, Tomohiro Shiraishi, Noriyuki Katahira, Masahiko Watanabe, Tetsuro Katayama, Akira Fukuda:
An SMT-Based Approach to Bounded Model Checking of Designs in State Transition Matrix. IEICE Trans. Inf. Syst. 94-D(5): 946-957 (2011) - [c13]Weiqiang Kong, Noriyuki Katahira, Masahiko Watanabe, Tetsuro Katayama, Kenji Hisazumi, Akira Fukuda:
Formal Verification of Software Designs in Hierarchical State Transition Matrix with SMT-based Bounded Model Checking. APSEC 2011: 81-88 - [c12]Weiqiang Kong, Noriyuki Katahira, Wanpeng Qian, Masahiko Watanabe, Tetsuro Katayama, Akira Fukuda:
An SMT-Based Approach to Bounded Model Checking of Designs in Communicating State Transition Matrix. ICCSA Workshops 2011: 159-167 - 2010
- [j4]Weiqiang Kong, Kazuhiro Ogata, Kokichi Futatsugi:
Towards Reliable E-Government Systems with the OTS/CafeOBJ Method. IEICE Trans. Inf. Syst. 93-D(5): 974-984 (2010) - [c11]Weiqiang Kong, Tomohiro Shiraishi, Yuki Mizushima, Noriyuki Katahira, Akira Fukuda, Masahiko Watanabe:
An SMT Approach to Bounded Model Checking of Design in State Transition Matrix. ICCSA Workshops 2010: 231-238 - [c10]Tomohiro Shiraishi, Weiqiang Kong, Yuki Mizushima, Noriyuki Katahira, Michihiro Matsumoto, Masahiko Watanabe, Tetsuro Katayama, Akira Fukuda:
Model Checking of Software Design in State Transition Matrix. Software Engineering Research and Practice 2010: 507-513
2000 – 2009
- 2008
- [j3]Masaki Nakamura, Weiqiang Kong, Kazuhiro Ogata, Kokichi Futatsugi:
A Specification Translation from Behavioral Specifications to Rewrite Specifications. IEICE Trans. Inf. Syst. 91-D(5): 1492-1503 (2008) - [c9]Weiqiang Kong, Kazuhiro Ogata, Jian Cheng, Kokichi Futatsugi:
Trace anonymity in the OTS/CafeOBJ method. CIT 2008: 754-759 - 2007
- [j2]Weiqiang Kong, Kazuhiro Ogata, Kokichi Futatsugi:
Specification and Verification of Workflows with Rbac Mechanism and Sod Constraints. Int. J. Softw. Eng. Knowl. Eng. 17(1): 3-32 (2007) - [j1]Jianwen Xiang, Kazuhiro Ogata, Weiqiang Kong, Kokichi Futatsugi:
From Fault Tree Analysis to Formal System Specification and Verification with OTS/CafeOBJ. Inf. Media Technol. 2(2): 448-460 (2007) - [c8]Xiaoyi Chen, Weiqiang Kong, Kokichi Futatsugi:
Formal support for e-government system design with transparency consideration. ICEGOV 2007: 20-29 - [c7]Weiqiang Kong, Kazuhiro Ogata, Kokichi Futatsugi:
Algebraic Approaches to Formal Analysis of the Mondex Electronic Purse System. IFM 2007: 393-412 - 2006
- [c6]Kazuhiro Ogata, Masahiro Nakano, Weiqiang Kong, Kokichi Futatsugi:
Induction-Guided Falsification. ICFEM 2006: 114-131 - [c5]Kazuhiro Ogata, Weiqiang Kong, Kokichi Futatsugi:
Falsification of OTSs by Searches of Bounded Reachable State Spaces. SEKE 2006: 440-445 - [c4]Jianwen Xiang, Weiqiang Kong, Kokichi Futatsugi, Kazuhiro Ogata:
Analysis of Positive Incentives for Protecting Secrets in Digital Rights Management. WEBIST (2) 2006: 5-12 - 2005
- [c3]Weiqiang Kong, Takahiro Seino, Kokichi Futatsugi, Kazuhiro Ogata:
A Lightweight Integration of Theorem Proving and Model Checking for System Verification. APSEC 2005: 59-66 - [c2]Weiqiang Kong, Kazuhiro Ogata, Kokichi Futatsugi:
Formal Analysis of Workflow Systems with Security Considerations. SEKE 2005: 531-536 - 2004
- [c1]Weiqiang Kong, Kazuhiro Ogata, Jianwen Xiang, Kokichi Futatsugi:
Formal Analysis of an Anonymous Fair Exchange E-Commerce Protocol. CIT 2004: 1100-1107
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint