Abstract is missing.
- String Constraints with Regex-Counting and String-Length Solved More EfficientlyDenghang Hu, Zhilin Wu. 1-20 [doi]
- Reachability Based Uniform Controllability to Target Set with Evolution FunctionJia Geng, Ruiqi Hu, Kairong Liu, Zhihui Li, Zhikun She. 21-37 [doi]
- Enhancing Branch and Bound for Robustness Verification of Neural Networks via an Effective Branching StrategyShaocong Han, Yi Zhang 0029. 38-54 [doi]
- Graph-Based Log Anomaly Detection via Adversarial TrainingZhangyue He, Yanni Tang, Kaiqi Zhao 0001, Jiamou Liu, Wu Chen. 55-71 [doi]
- Formal Verification Based Synthesis for Behavior TreesWeijiang Hong, Zhenbang Chen, Minglong Li, Yuhan Li, Peishan Huang, Ji Wang 0001. 72-91 [doi]
- SeHBPL: Behavioral Semantics-Based Patch Presence Test for BinariesJintao Huang, Gaosheng Wang, Zhiqiang Shi, Fei Lv, Weidong Zhang, Shichao Lv. 92-111 [doi]
- Session Types with Multiple Senders Single ReceiverZekun Ji, Shuling Wang, Xiong Xu. 112-131 [doi]
- Understanding the Reproducibility Issues of Monkey for GUI TestingHuiyu Liu, Qichao Kong, Jue Wang, Ting Su, Haiying Sun. 132-151 [doi]
- Multi-dimensional Abstraction and Decomposition for Separation of ConcernsZhiming Liu 0001, Jiadong Teng, Bo Liu 0033. 152-170 [doi]
- Solving SMT over Non-linear Real Arithmetic via Numerical Sampling and Symbolic VerificationXinpeng Ni, Yulun Wu, Bican Xia. 171-188 [doi]
- + Specifications to Improve the Reliability of the ZooKeeperCoordination ServiceLingzhi Ouyang, Yu Huang 0002, Binyu Huang, Xiaoxing Ma. 189-205 [doi]
- Modeling Regex Operators for Solving Regex Crossword PuzzlesWeihao Su, Haiming Chen, Rongchen Li, Zixuan Chen. 206-225 [doi]
- Software Vulnerability Detection Using an Enhanced Generalization StrategyHao Sun, Zhe Bu, Yang Xiao, Chengsheng Zhou, Zhiyu Hao, Hongsong Zhu. 226-242 [doi]
- HeatC: A Variable-Grained Coverage Criterion for Deep Learning SystemsWeidi Sun, Yuteng Lu, Xiaokun Luan, Meng Sun 0002. 243-261 [doi]
- Formalization of Lambda Calculus with Explicit Names as a Nominal Reasoning FrameworkXinyi Wan, Qinxiang Cao. 262-278 [doi]
- Vulnerability Report Analysis and Vulnerability Reproduction for Web ApplicationsWeiwei Wang, Zidong Li, Feng You, Ruilian Zhao. 279-297 [doi]
- Run-Time Assured Reinforcement Learning for Safe Spacecraft Rendezvous with Obstacle AvoidanceYingmin Xiao, Zhibin Yang, Yong Zhou, Zhiqiu Huang. 298-313 [doi]
- An Abstract Domain of Linear Templates with Disjunctive Right-Hand-Side IntervalsHan Xu, Liqian Chen, Guangsheng Fan, Banghu Yin, Ji Wang 0001. 314-330 [doi]
- Deducing Matching Strings for Real-World Regular ExpressionsYixuan Yan, Weihao Su, Lixiao Zheng, Mengxi Wang, Haiming Chen, Chengyao Peng, Rongchen Li, Zixuan Chen. 331-350 [doi]
- Binary Level Concolic Execution on Windows with Rich Instrumentation Based Taint AnalysisYixiao Yang, Chen Gao, Zhiqi Li, Yifan Wang, Rui Wang. 351-367 [doi]
- Cheat-FlipIt: An Approach to Modeling and Perception of a Deceptive OpponentQian Yao, Xinli Xiong, YongJie Wang. 368-384 [doi]
- Making an eBPF Virtual Machine Faster on Microcontrollers: Verified Optimization and Proof SimplificationShenghao Yuan, Benjamin Lion, Frédéric Besson, Jean-Pierre Talpin. 385-401 [doi]
- An Optimized Solution for Highly Contended Transactional WorkloadsChunxi Zhang, Shuyan Zhang, Ting Chen, Rong Zhang 0002, Kai Liu. 402-418 [doi]
- DeepTD: Diversity-Guided Deep Neural Network Test GenerationJin Zhu, Chuanqi Tao, Hongjing Guo, Yue Ju. 419-433 [doi]