A security modeling and verification method of embedded software based on Z and MARTE X Hu, Y Zhuang, F Zhang Computers & Security 88, 101615, 2020 | 17 | 2020 |
A security type verifier for smart contracts X Hu, Y Zhuang, SW Lin, F Zhang, S Kan, Z Cao Computers & Security 108, 102343, 2021 | 13 | 2021 |
Fine-grained Binary Analysis Method for Privacy Leakage Detection on the Cloud Platform Jiaye Pan, Yi Zhuang, Xinwen Hu, Wenbing Zhao Computers, Materials & Continua 64 (1), 607--622, 2020 | 5 | 2020 |
Modeling and validation for embedded software confidentiality and integrity X Hu, Y Zhuang, Z Cao, T Ye, M Li 2017 12th International Conference on Intelligent Systems and Knowledge …, 2017 | 5 | 2017 |
PHRiMA: A permission-based hybrid risk management framework for android apps X Hu, Y Zhuang Computers & Security 94, 101791, 2020 | 4 | 2020 |
DeepRover: A Query-Efficient Blackbox Attack for Deep Neural Networks F Zhang, X Hu, L Ma, J Zhao Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 2 | 2023 |
TySA: Enforcing Security Policies for Safeguarding Against Permission-Induced Attacks in Android Applications X Hu IEEE Access, 2024 | | 2024 |
TPAM: Timed-Permission based Access Control Analysis and Modeling Method for Android Apps X Hu Proceedings of the 2024 6th International Conference on Software Engineering …, 2024 | | 2024 |
一种结合 AADL 与 Z 的嵌入式软件可靠性建模与评估方法 李蜜, 庄毅, 胡镡文 计算机科学 46 (8), 217-223, 2019 | | 2019 |