Author of the publication

WANA: Symbolic Execution of Wasm Bytecode for Extensible Smart Contract Vulnerability Detection.

, , , , and . QRS, page 926-937. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Magiclock: Scalable Detection ofPotential Deadlocks in Large-ScaleMultithreaded Programs., and . IEEE Trans. Software Eng., 40 (3): 266-281 (2014)A Study on the Efficiency Aspect of Data Race Detection: A Compiler Optimization Level Perspective., and . QSIC, page 35-44. IEEE, (2013)A New Approach for Direct Manipulation of Free-Form Curve., , and . Comput. Graph. Forum, 17 (3): 327-334 (1998)Investigation of Hybrid Particle Swarm Optimization Methods for Solving Transient-Stability Constrained Optimal Power Flow Problems., , and . Eng. Lett., 16 (1): 61-67 (2008)Accuracy Graphs of Spectrum-Based Fault Localization Formulas., , , and . IEEE Trans. Reliability, 66 (2): 403-424 (2017)Optimal Multiresolution Polygonal Approximation., and . COCOON, volume 1276 of Lecture Notes in Computer Science, page 32-41. Springer, (1997)Testing pervasive software in the presence of context inconsistency resolution services., , and . ICSE, page 61-70. ACM, (2008)Facilitating Monkey Test by Detecting Operable Regions in Rendered GUI of Mobile Game Apps., , , and . QRS, page 298-306. IEEE, (2016)A web search-centric approach to recommender systems with URLs as minimal user contexts., , and . J. Syst. Softw., 84 (6): 930-941 (2011)XML-manipulating test case prioritization for XML-manipulating services., , , and . J. Syst. Softw., 84 (4): 603-619 (2011)