Follow
Fu SONG
Title
Cited by
Cited by
Year
Who is real bob? adversarial attacks on speaker recognition systems
G Chen, S Chenb, L Fan, X Du, Z Zhao, F Song, Y Liu
2021 IEEE Symposium on Security and Privacy (SP), 694-711, 2021
2392021
Spain: security patch analysis for binaries towards understanding the pain and pills
Z Xu, B Chen, M Chandramohan, Y Liu, F Song
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
1752017
Pushdown model checking for malware detection
F Song, T Touili
International Journal on Software Tools for Technology Transfer 16 (2), 147-173, 2014
942014
Efficient malware detection using model-checking
F Song, T Touili
International Symposium on Formal Methods, 418-433, 2012
902012
Coprotector: Protect open-source code against unauthorized training usage with data poisoning
Z Sun, X Du, F Song, M Ni, L Li
Proceedings of the ACM Web Conference 2022, 652-660, 2022
772022
Patch based vulnerability matching for binary programs
Y Xu, Z Xu, B Chen, F Song, Y Liu, T Liu
Proceedings of the 29th ACM SIGSOFT International Symposium on Software …, 2020
722020
Advanced evasion attacks and mitigations on practical ML‐based phishing website classifiers
F Song, Y Lei, S Chen, L Fan, Y Liu
International Journal of Intelligent Systems 36 (9), 5210-5240, 2021
552021
Android malware family classification and characterization using CFG and DFG
XU Zhiwu, K Ren, F Song
2019 International Symposium on Theoretical Aspects of Software Engineering …, 2019
492019
SCInfer: Refinement-Based Verification of Software Countermeasures Against Side-Channel Attacks
J Zhang, P Gao, F Song, C Wang
International Conference on Computer Aided Verification, 157-177, 2018
462018
Krust: A formal executable semantics of rust
F Wang, F Song, M Zhang, X Zhu, J Zhang
2018 International Symposium on Theoretical Aspects of Software Engineering …, 2018
422018
Model-checking for android malware detection
F Song, T Touili
Asian Symposium on Programming Languages and Systems, 216-235, 2014
422014
Towards understanding and mitigating audio adversarial examples for speaker recognition
G Chen, Z Zhao, F Song, S Chen, L Fan, F Wang, J Wang
IEEE Transactions on Dependable and Secure Computing 20 (5), 3970-3987, 2022
412022
PoMMaDe: pushdown model-checking for malware detection
F Song, T Touili
Proceedings of the 2013 9th Joint Meeting on Foundations of Software …, 2013
412013
Efficient CTL model-checking for pushdown systems
F Song, T Touili
Theoretical Computer Science 549, 127-145, 2014
382014
LTL model-checking for malware detection
F Song, T Touili
Tools and Algorithms for the Construction and Analysis of Systems: 19th …, 2013
382013
Attack as defense: Characterizing adversarial examples using robustness
Z Zhao, G Chen, J Wang, Y Yang, F Song, J Sun
Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021
342021
Taking care of the discretization problem: A comprehensive study of the discretization problem and a black-box adversarial attack in discrete integer domain
L Bu, Z Zhao, Y Duan, F Song
IEEE Transactions on Dependable and Secure Computing, 2021
34*2021
BDD4BNN: a BDD-based quantitative analysis framework for binarized neural networks
Y Zhang, Z Zhao, G Chen, F Song, T Chen
International Conference on Computer Aided Verification, 175-200, 2021
312021
Verifying ReLU neural networks from a model checking perspective
WW Liu, F Song, THR Zhang, J Wang
Journal of Computer Science and Technology 35, 1365-1381, 2020
312020
Verifying and quantifying side-channel resistance of masked software implementations
P Gao, J Zhang, F Song, C Wang
ACM Transactions on Software Engineering and Methodology (TOSEM) 28 (3), 1-32, 2019
312019
The system can't perform the operation now. Try again later.
Articles 1–20