Follow
Shengchao Qin
Shengchao Qin
Professor of Computer Science, Teesside University
Verified email at tees.ac.uk - Homepage
Title
Cited by
Cited by
Year
Automated verification of shape and size properties via separation logic
HH Nguyen, C David, S Qin, WN Chin
International Workshop on Verification, Model Checking, and Abstract†…, 2007
2072007
Automated verification of shape, size and bag properties via user-defined predicates in separation logic
WN Chin, C David, HH Nguyen, S Qin
Science of Computer Programming 77 (9), 1006-1036, 2012
1932012
Timed automata patterns
JS Dong, P Hao, S Qin, J Sun, W Yi
IEEE Transactions on Software Engineering 34 (6), 844-859, 2008
922008
Enhancing modular OO verification with separation logic
WN Chin, C David, HH Nguyen, S Qin
ACM SIGPLAN Notices 43 (1), 87-99, 2008
922008
Memory usage verification for oo programs
WN Chin, HH Nguyen, S Qin, M Rinard
International Static Analysis Symposium, 70-86, 2005
922005
Core hybrid Event-B I: single hybrid Event-B machines
R Banach, M Butler, S Qin, N Verma, H Zhu
Science of Computer Programming 105, 92-123, 2015
772015
Analysing memory resource bounds for low-level programs
WN Chin, HH Nguyen, C Popeea, S Qin
Proceedings of the 7th international symposium on Memory management, 151-160, 2008
722008
Memlock: Memory usage guided fuzzing
C Wen, H Wang, Y Li, S Qin, Y Liu, Z Xu, H Chen, X Xie, G Pu, T Liu
Proceedings of the ACM/IEEE 42nd International Conference on Software†…, 2020
712020
Region inference for an object-oriented language
WN Chin, F Craciun, S Qin, M Rinard
ACM SIGPLAN Notices 39 (6), 243-254, 2004
652004
Timed patterns: TCOZ to timed automata
JS Dong, P Hao, SC Qin, J Sun, W Yi
International Conference on Formal Engineering Methods, 483-498, 2004
642004
Shape analysis via second-order bi-abduction
QL Le, C Gherghina, S Qin, WN Chin
International Conference on Computer Aided Verification, 52-68, 2014
622014
A semantic foundation for TCOZ in unifying theories of programming
S Qin, JS Dong, WN Chin
International Symposium of Formal Methods Europe, 321-340, 2003
612003
Verifying simulink diagrams via a hybrid hoare logic prover
L Zou, N Zhany, S Wang, M Fršnzle, S Qin
2013 Proceedings of the International Conference on Embedded Software†…, 2013
592013
On information coverage for location category based point-of-interest recommendation
X Chen, Y Zeng, G Cong, S Qin, Y Xiang, Y Dai
Twenty-ninth AAAI conference on artificial intelligence, 2015
572015
Typestate-guided fuzzer for discovering use-after-free vulnerabilities
H Wang, X Xie, Y Li, C Wen, Y Li, Y Liu, S Qin, H Chen, Y Sui
2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE†…, 2020
562020
Optimal route search with the coverage of users' preferences
Y Zeng, X Chen, X Cao, S Qin, M Cavazza, Y Xiang
Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015
482015
Verifying safety policies with size properties and alias controls
WN Chin, SC Khoo, S Qin, C Popeea, HH Nguyen
Proceedings of the 27th international conference on Software engineering†…, 2005
482005
A relational model for object-oriented designs.
J He, Z Liu, X Li, S Qin
Springer, 2004
472004
Termination and non-termination specification inference
TC Le, S Qin, WN Chin
Proceedings of the 36th ACM SIGPLAN Conference on Programming Language†…, 2015
462015
CDGDroid: Android malware detection based on deep learning using CFG and DFG
Z Xu, K Ren, S Qin, F Craciun
International Conference on Formal Engineering Methods, 177-193, 2018
362018
The system can't perform the operation now. Try again later.
Articles 1–20