Cited by
Cited by
Who is real bob? adversarial attacks on speaker recognition systems
G Chen, S Chenb, L Fan, X Du, Z Zhao, F Song, Y Liu
2021 IEEE Symposium on Security and Privacy (SP), 694-711, 2021
Spain: security patch analysis for binaries towards understanding the pain and pills
Z Xu, B Chen, M Chandramohan, Y Liu, F Song
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
Pushdown model checking for malware detection
F Song, T Touili
International Journal on Software Tools for Technology Transfer 16 (2), 147-173, 2014
Efficient malware detection using model-checking
F Song, T Touili
FM 2012: Formal Methods: 18th International Symposium, Paris, France, August …, 2012
Model-checking for android malware detection
F Song, T Touili
Programming Languages and Systems: 12th Asian Symposium, APLAS 2014 …, 2014
Efficient CTL model-checking for pushdown systems
F Song, T Touili
Theoretical Computer Science 549, 127-145, 2014
Patch based vulnerability matching for binary programs
Y Xu, Z Xu, B Chen, F Song, Y Liu, T Liu
Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020
PoMMaDe: pushdown model-checking for malware detection
F Song, T Touili
Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013
Android malware family classification and characterization using CFG and DFG
XU Zhiwu, K Ren, F Song
2019 International Symposium on Theoretical Aspects of Software Engineering …, 2019
SCInfer: Refinement-Based Verification of Software Countermeasures Against Side-Channel Attacks
J Zhang, P Gao, F Song, C Wang
Computer Aided Verification: 30th International Conference, CAV 2018, Held …, 2018
LTL model-checking for malware detection
F Song, T Touili
Tools and Algorithms for the Construction and Analysis of Systems: 19th …, 2013
Krust: A formal executable semantics of rust
F Wang, F Song, M Zhang, X Zhu, J Zhang
2018 International Symposium on Theoretical Aspects of Software Engineering …, 2018
Advanced evasion attacks and mitigations on practical ML‐based phishing website classifiers
F Song, Y Lei, S Chen, L Fan, Y Liu
International Journal of Intelligent Systems 36 (9), 5210-5240, 2021
Taking care of the discretization problem: A comprehensive study of the discretization problem and a black-box adversarial attack in discrete integer domain
L Bu, Z Zhao, Y Duan, F Song
IEEE Transactions on Dependable and Secure Computing, 2021
Attack as defense: Characterizing adversarial examples using robustness
Z Zhao, G Chen, J Wang, Y Yang, F Song, J Sun
Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021
A distributed clustering algorithm for voronoi cell-based large scale wireless sensor network
J Chen, C Kim, F Song
2010 International Conference on Communications and Mobile Computing 3, 209-213, 2010
Verifying and quantifying side-channel resistance of masked software implementations
P Gao, J Zhang, F Song, C Wang
ACM Transactions on Software Engineering and Methodology (TOSEM) 28 (3), 1-32, 2019
Verifying ReLU neural networks from a model checking perspective
WW Liu, F Song, THR Zhang, J Wang
Journal of Computer Science and Technology 35, 1365-1381, 2020
An Improved Online/Offline Identity-Based Signature Scheme for WSNs.
Y Gao, P Zeng, KKR Choo, F Song
Int. J. Netw. Secur. 18 (6), 1143-1151, 2016
Modeling and verifying Google file system
B Li, M Wang, Y Zhao, G Pu, H Zhu, F Song
2015 IEEE 16th International Symposium on High Assurance Systems Engineering …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20