Showing results 15 to 34 of 62
< previous
next >
Date | Title | Author(s) |
9-Aug-2017 | Network-traffic anomaly detection with incremental majority learning | 郁方; Huang, Shin-Ying; Yu, Fang; Tsaih, Rua-Huan; Huang, Yennun; 蔡瑞煌 |
5-Oct-2023 | On searching information leakage of Python model execution to detect adversarial examples | 郁方; Yu, Fang;Guo, Cheng-Yao |
29-Aug-2017 | Optimal Sanitization Synthesis for Web Application Vulnerability Repair | 郁方; Yu, Fang; Shueh, Ching-Yuan; Lin, Chun-Han; Chen, Yu-Fang; Wang, Bow-Yaw; Bultan, Tevfik |
27-Aug-2015 | Patching vulnerabilities with sanitization synthesis | Yu, Fang;Alkhalaf, Muath;Bultan, Tevfik; 郁方 |
1-Jun-2021 | Python指令碼的符號化分析與條件生成 | 詹語昕; Jan, Yu-Shin |
2-Dec-2022 | python程式執行的資訊洩漏研究與應用 | 藍加良; Lan, Jia-Liang |
24-Jul-2018 | Quantitative quality estimation of cloud-based streaming services | 郁方; Yu, Fang; Wan, Yat-wah; 蔡瑞煌; Tsaih, Rua-huan |
22-Apr-2020 | Runtime Hook on Blockchain and Smart Contract Systems | 林韋廷; 郁方; 蕭舜文 |
16-Jun-2015 | Securing KVM-based cloud systems via virtualization introspection | Lee, Sheng Wei;Yu, Fang; 郁方 |
6-Jun-2016 | Simulating Time-Varying Demand Services with Queuing Models | 郁方; Chu, Hsuan-Kai;Cheny, Wan-Ping;Yu, Fang |
17-Dec-2015 | Space Connection: A New 3D Tele-Immersion Platform for Web-based Gesture-collaborative Games and Services | 郁方; Lin, Chun-Han;Sun, Pei-Yu;Yu, Fang |
22-Jun-2015 | String abstractions for string verification | Yu, Fang;Bultan, T.;Hardekopf, B.; 郁方 |
17-Aug-2018 | String Analysis for Software Verification and Security | Bultan, Tevfik; 郁方; Yu, Fang; Alkhalaf, Muath |
1-Sep-2017 | String analysis via automata manipulation with logic circuit representation | 郁方; Wang, Hung En; Tsai, Tzung Lin; Lin, Chun Han; Yu, Fang; Jiang, Jie-Hong Roland |
26-Dec-2013 | Symbolic Consistency Checking of OpenMP Parallel Programs | 郁方; Yu,Fang ; Yang,Shun-Ching ; Wang,Farn ; Chen,Guan-Cheng ; Chan,Che-Chang |
29-Nov-2018 | A Symbolic Model Checking Approach to the Analysis of String and Length Constraints | 郁方; Yu, Fang; Wang, Hung-En;Chen, Shih-Yu;Yu, Fang;Jiang, Jie-Hong R. |
1-Sep-2017 | VISO: Characterizing malicious behaviors of virtual machines with unsupervised clustering | 曾宇瑞; 郁方; Li, Yen Han; Tzeng, Yeu Ruey; Yu, Fang |
12-Feb-2019 | 二元主體學習技術研究與張量流實作 | 李佳倫; Lee, Chia-Lun |
1-Sep-2023 | 以DeepSHAP生成決策邏輯的對抗樣本偵測研究 | 林苡晴; Lin, Yi-Ching |
2-Sep-2020 | 以相空間分割與階層序列合成預測學生表現 | 許甄珉; Hsu, Chen-Min |