default search action
Bow-Yaw Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c61]Li-Chang Lai, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking. ESORICS (4) 2024: 377-395 - 2023
- [j14]Depeng Liu, Bow-Yaw Wang, Chen Fu, Lijun Zhang:
Model checking differentially private properties. Theor. Comput. Sci. 943: 153-170 (2023) - [c60]Ming-Hsien Tsai, Yu-Fu Fu, Jiaxiang Liu, Xiaomu Shi, Bow-Yaw Wang, Bo-Yin Yang:
CoqCryptoLine: A Verified Model Checker with Certified Results. CAV (2) 2023: 227-240 - [c59]Ming-Hsien Tsai, Yu-Fu Fu, Jiaxiang Liu, Xiaomu Shi, Bow-Yaw Wang, Bo-Yin Yang:
Certified Verification for Algebraic Abstraction. CAV (3) 2023: 329-349 - [c58]Ruiling Chen, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
llvm2CryptoLine: Verifying Arithmetic in Cryptographic C Programs. ESEC/SIGSOFT FSE 2023: 2167-2171 - [i9]Li-Chang Lai, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking. IACR Cryptol. ePrint Arch. 2023: 1861 (2023) - 2022
- [j13]Vincent Hwang, Jiaxiang Liu, Gregor Seiler, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 718-750 (2022) - [c57]Depeng Liu, Bow-Yaw Wang, Lijun Zhang:
Verifying Pufferfish Privacy in Hidden Markov Models. VMCAI 2022: 174-196 - [i8]Chen-Kai Lin, Bow-Yaw Wang:
Formal Analysis of FreeRTOS Scheduler on ARM Cortex-M4 Cores. CoRR abs/2205.07480 (2022) - [i7]Depeng Liu, Lutan Zhao, Pengfei Yang, Bow-Yaw Wang, Rui Hou, Lijun Zhang, Naijun Zhan:
Defensive Design of Saturating Counters Based on Differential Privacy. CoRR abs/2206.00279 (2022) - [i6]Ming-Hsien Tsai, Yu-Fu Fu, Xiaomu Shi, Jiaxiang Liu, Bow-Yaw Wang, Bo-Yin Yang:
Automatic Certified Verification of Cryptographic Programs with COQCRYPTOLINE. IACR Cryptol. ePrint Arch. 2022: 1116 (2022) - 2021
- [c56]Xiaomu Shi, Yu-Fu Fu, Jiaxiang Liu, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
CoqQFBV: A Scalable Certified SMT Quantifier-Free Bit-Vector Solver. CAV (2) 2021: 149-171 - 2020
- [j12]Qianshan Yu, Fei He, Bow-Yaw Wang:
Incremental predicate analysis for regression verification. Proc. ACM Program. Lang. 4(OOPSLA): 184:1-184:25 (2020) - [c55]Rongchen Xu, Fei He, Bow-Yaw Wang:
Interval counterexamples for loop invariant learning. ESEC/SIGSOFT FSE 2020: 111-122 - [i5]Depeng Liu, Bow-Yaw Wang, Lijun Zhang:
Verifying Pufferfish Privacy in Hidden Markov Models. CoRR abs/2008.01704 (2020)
2010 – 2019
- 2019
- [c54]Yu-Fu Fu, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Signed Cryptographic Program Verification with Typed CryptoLine. CCS 2019: 1591-1606 - [c53]Yongjian Li, Bow-Yaw Wang:
Parameterized Hardware Verification Through a Term-Level Generalized Symbolic Trajectory Evaluation. ICFEM 2019: 403-419 - [c52]Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Verifying Arithmetic in Cryptographic C Programs. ASE 2019: 552-564 - [c51]Yu-Fang Chen, Hsiao-chen Chung, Wen-Chi Hung, Ming-Hsien Tsai, Bow-Yaw Wang, Farn Wang:
Synthesize Models for Quantitative Analysis Using Automata Learning. NETYS 2019: 75-92 - 2018
- [c50]Depeng Liu, Bow-Yaw Wang, Lijun Zhang:
Model Checking Differentially Private Properties. APLAS 2018: 394-414 - [c49]Andy Polyakov, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Verifying Arithmetic Assembly Programs in Cryptographic Primitives (Invited Talk). CONCUR 2018: 4:1-4:16 - [i4]Chen-Kai Lin, Ching-Chun Huang, Bow-Yaw Wang:
A Spin-based model checking for the simple concurrent program on a preemptive RTOS. CoRR abs/1808.04239 (2018) - 2017
- [c48]Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs. CCS 2017: 1973-1987 - [c47]Chen Luo, Fei He, Dong Yan, Dan Zhang, Xin Zhou, Bow-Yaw Wang:
PSpec: a formal specification language for fine-grained control on distributed data analytics. ICSE (Companion Volume) 2017: 300-302 - [c46]Hsin-Hung Lin, Bow-Yaw Wang:
Releasing VDM proof obligations with SMT solvers. MEMOCODE 2017: 132-135 - [c45]Yu-Fang Chen, Chih-Duo Hong, Ondrej Lengál, Shin-Cheng Mu, Nishant Sinha, Bow-Yaw Wang:
An Executable Sequential Specification for Spark Aggregation. NETYS 2017: 421-438 - [i3]Yu-Fang Chen, Chih-Duo Hong, Ondrej Lengál, Shin-Cheng Mu, Nishant Sinha, Bow-Yaw Wang:
An Executable Sequential Specification for Spark Aggregation. CoRR abs/1702.02439 (2017) - 2016
- [j11]Fei He, Xiaowei Gao, Miaofei Wang, Bow-Yaw Wang, Lijun Zhang:
Learning Weighted Assumptions for Compositional Verification of Markov Decision Processes. ACM Trans. Softw. Eng. Methodol. 25(3): 21:1-21:39 (2016) - [c44]Fei He, Shu Mao, Bow-Yaw Wang:
Learning-Based Assume-Guarantee Regression Verification. CAV (1) 2016: 310-328 - [c43]Yu-Fang Chen, Chiao Hsieh, Ondrej Lengál, Tsung-Ju Lii, Ming-Hsien Tsai, Bow-Yaw Wang, Farn Wang:
PAC learning-based verification and model synthesis. ICSE 2016: 714-724 - [c42]Fang Yu, Ching-Yuan Shueh, Chun-Han Lin, Yu-Fang Chen, Bow-Yaw Wang, Tevfik Bultan:
Optimal sanitization synthesis for web application vulnerability repair. ISSTA 2016: 189-200 - 2015
- [j10]Yungbum Jung, Soonho Kong, Cristina David, Bow-Yaw Wang, Kwangkeun Yi:
Automatically inferring loop invariants via algorithmic learning. Math. Struct. Comput. Sci. 25(4): 892-915 (2015) - [c41]Yu-Fang Chen, Chih-Duo Hong, Bow-Yaw Wang, Lijun Zhang:
Counterexample-Guided Polynomial Loop Invariant Generation by Lagrange Interpolation. CAV (1) 2015: 658-674 - [c40]Fei He, Xiaowei Gao, Bow-Yaw Wang, Lijun Zhang:
Leveraging Weighted Automata in Compositional Reasoning about Concurrent Probabilistic Systems. POPL 2015: 503-514 - [c39]Yu-Fang Chen, Chih-Duo Hong, Nishant Sinha, Bow-Yaw Wang:
Commutativity of Reducers. TACAS 2015: 131-146 - [c38]Yu-Fang Chen, Chiao Hsieh, Ming-Hsien Tsai, Bow-Yaw Wang, Farn Wang:
CPArec: Verifying Recursive Programs via Source-to-Source Program Transformation - (Competition Contribution). TACAS 2015: 426-428 - [i2]Yu-Fang Chen, Chih-Duo Hong, Bow-Yaw Wang, Lijun Zhang:
Counterexample-Guided Polynomial Loop Invariant Generation by Lagrange Interpolation. CoRR abs/1502.04280 (2015) - [i1]Yu-Fang Chen, Chiao Hsieh, Ondrej Lengál, Tsung-Ju Lii, Ming-Hsien Tsai, Bow-Yaw Wang, Farn Wang:
PAC Learning-Based Verification and Model Synthesis. CoRR abs/1511.00754 (2015) - 2014
- [j9]Min Zhou, Fei He, Bow-Yaw Wang, Ming Gu, Jiaguang Sun:
Array Theory of Bounded Elements and its Applications. J. Autom. Reason. 52(4): 379-405 (2014) - [c37]Yu-Fang Chen, Bow-Yaw Wang, Kai-Chun Yang:
Learning Summaries of Recursive Functions. APSEC (1) 2014: 303-310 - [c36]Yu-Fang Chen, Chang-Hong Hsu, Hsin-Hung Lin, Peter Schwabe, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang, Shang-Yi Yang:
Verifying Curve25519 Software. CCS 2014: 299-309 - [c35]Fei He, Bow-Yaw Wang, Liangze Yin, Lei Zhu:
Symbolic assume-guarantee reasoning through BDD learning. ICSE 2014: 1071-1082 - [c34]Yu-Fang Chen, Chiao Hsieh, Ming-Hsien Tsai, Bow-Yaw Wang, Farn Wang:
Verifying Recursive Programs Using Intraprocedural Analyzers. SAS 2014: 118-133 - 2013
- [j8]Min Zhou, Fei He, Bow-Yaw Wang, Ming Gu, Jiaguang Sun:
A Unified Framework for DPLL(T) + Certificates. J. Appl. Math. 2013: 964682:1-964682:13 (2013) - [c33]Fei He, Liangze Yin, Bow-Yaw Wang, Lianyi Zhang, Guanyu Mu, Wenrui Meng:
VCS: A Verifier for Component-Based Systems. ATVA 2013: 478-481 - [c32]Yu-Fang Chen, Bow-Yaw Wang:
BULL: A Library for Learning Algorithms of Boolean Functions. TACAS 2013: 537-542 - [c31]Yu-Fang Chen, Bow-Yaw Wang, Di-De Yen:
A Finite Exact Representation of Register Automata Configurations. INFINITY 2013: 16-34 - 2012
- [j7]Wonchan Lee, Yungbum Jung, Bow-Yaw Wang, Kwangkeun Yi:
Predicate Generation for Learning-Based Quantifier-Free Loop Invariant Inference. Log. Methods Comput. Sci. 8(3) (2012) - [c30]Yu-Fang Chen, Bow-Yaw Wang:
Learning Boolean Functions Incrementally. CAV 2012: 55-70 - [c29]Wonchan Lee, Bow-Yaw Wang, Kwangkeun Yi:
Termination Analysis with Algorithmic Learning. CAV 2012: 88-104 - [c28]Wenrui Meng, Fei He, Bow-Yaw Wang, Qiang Liu:
Thread-Modular Model Checking with Iterative Refinement. NASA Formal Methods 2012: 237-251 - 2011
- [c27]Yungbum Jung, Wonchan Lee, Bow-Yaw Wang, Kwangkeun Yi:
Predicate Generation for Learning-Based Quantifier-Free Loop Invariant Inference. TACAS 2011: 205-219 - 2010
- [j6]Geng-Dian Huang, Bow-Yaw Wang:
Complete SAT-Based Model Checking for Context-Free Processes. Int. J. Found. Comput. Sci. 21(2): 115-134 (2010) - [c26]Soonho Kong, Yungbum Jung, Cristina David, Bow-Yaw Wang, Kwangkeun Yi:
Automatically Inferring Quantified Loop Invariants by Algorithmic Learning from Simple Templates. APLAS 2010: 328-343 - [c25]Yu-Fang Chen, Edmund M. Clarke, Azadeh Farzan, Ming-Hsien Tsai, Yih-Kuen Tsay, Bow-Yaw Wang:
Automated Assume-Guarantee Reasoning through Implicit Learning. CAV 2010: 511-526 - [c24]Min Zhou, Fei He, Bow-Yaw Wang, Ming Gu:
On Array Theory of Bounded Elements. CAV 2010: 570-584 - [c23]Yu-Fang Chen, Edmund M. Clarke, Azadeh Farzan, Fei He, Ming-Hsien Tsai, Yih-Kuen Tsay, Bow-Yaw Wang, Lei Zhu:
Comparing Learning Algorithms in Automated Assume-Guarantee Reasoning. ISoLA (1) 2010: 643-657 - [c22]Yungbum Jung, Soonho Kong, Bow-Yaw Wang, Kwangkeun Yi:
Deriving Invariants by Algorithmic Learning, Decision Procedures, and Predicate Abstraction. VMCAI 2010: 180-196 - [e1]Jing Liu, Doron A. Peled, Bow-Yaw Wang, Farn Wang:
4th IEEE International Symposium on Theoretical Aspects of Software Engineering, TASE 2010, Taipei, Taiwan, 25-27 August 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4148-8 [contents]
2000 – 2009
- 2009
- [j5]Yih-Kuen Tsay, Bow-Yaw Wang:
Automated Compositional Reasoning of Intuitionistically Closed Regular Properties. Int. J. Found. Comput. Sci. 20(4): 747-762 (2009) - [c21]Yu-Fang Chen, Azadeh Farzan, Edmund M. Clarke, Yih-Kuen Tsay, Bow-Yaw Wang:
Learning Minimal Separating DFA's for Compositional Verification. TACAS 2009: 31-45 - 2008
- [c20]Azadeh Farzan, Yu-Fang Chen, Edmund M. Clarke, Yih-Kuen Tsay, Bow-Yaw Wang:
Extending Automated Compositional Verification to the Full Class of Omega-Regular Languages. TACAS 2008: 2-17 - [c19]Yih-Kuen Tsay, Bow-Yaw Wang:
Automated Compositional Reasoning of Intuitionistically Closed Regular Properties. CIAA 2008: 36-45 - 2007
- [c18]Geng-Dian Huang, Bow-Yaw Wang:
Complete SAT-Based Model Checking for Context-Free Processes. ATVA 2007: 51-65 - [c17]Bow-Yaw Wang:
Automatic Derivation of Compositional Rules in Automated Compositional Reasoning. CONCUR 2007: 303-316 - 2006
- [j4]Fang Yu, Bow-Yaw Wang:
Sat-based Model Checking for Region Automata. Int. J. Found. Comput. Sci. 17(4): 775-796 (2006) - [c16]Ming-Hsien Tsai, Bow-Yaw Wang:
Modular Formalization of Reactive Modules in COQ. ASIAN 2006: 105-119 - [c15]Ming-Hsien Tsai, Bow-Yaw Wang:
Formalization of CTL* in Calculus of Inductive Constructions. ASIAN 2006: 316-330 - [c14]Bow-Yaw Wang:
On the Satisfiability of Modular Arithmetic Formulae. ATVA 2006: 186-199 - [c13]Bow-Yaw Wang:
Automatic Verification of a Model Checker by Reflection. PADL 2006: 45-59 - [c12]Bow-Yaw Wang:
Modeling and analyzing applications with domain-specific languages by reflective rewriting: a case study. SAC 2006: 1773-1778 - 2005
- [c11]Bow-Yaw Wang:
Proving forall-µ-Calculus Properties with SAT-Based Model Checking. FORTE 2005: 113-127 - [c10]Bow-Yaw Wang:
Specification of an Infinite-State Local Model Checker in Rewriting Logic. SEKE 2005: 442-447 - 2004
- [j3]Farn Wang, Karsten Schmidt, Fang Yu, Geng-Dian Huang, Bow-Yaw Wang:
BDD-Based Safety-Analysis of Concurrent Software with Pointer Data Structures Using Graph Automorphism Symmetry Reduction. IEEE Trans. Software Eng. 30(6): 403-417 (2004) - [c9]Fang Yu, Bow-Yaw Wang:
Toward Unbounded Model Checking for Region Automata. ATVA 2004: 20-33 - [c8]Fang Yu, Bow-Yaw Wang, Yao-Wen Huang:
Bounded Model Checking for Region Automata. FORMATS/FTRTFT 2004: 246-262 - [c7]Bow-Yaw Wang:
mu-Calculus Model Checking in Maude. WRLA 2004: 135-152 - 2001
- [c6]Rajeev Alur, Bow-Yaw Wang:
Verifying Network Protocol Implementations by Symbolic Refinement Checking. CAV 2001: 169-181 - [c5]Rajeev Alur, Luca de Alfaro, Radu Grosu, Thomas A. Henzinger, M. Kang, Christoph M. Kirsch, Rupak Majumdar, Freddy Y. C. Mang, Bow-Yaw Wang:
JMOCHA: A Model Checking Tool that Exploits Design Structure. ICSE 2001: 835-836 - 2000
- [c4]Rajeev Alur, Radu Grosu, Bow-Yaw Wang:
Automated Refinement Checking for Asynchronous Processes. FMCAD 2000: 55-72 - [c3]Bow-Yaw Wang, José Meseguer, Carl A. Gunter:
Specification and Formal Analysis of a PLAN Algorithm in Maude. ICDCS Workshop on Distributed System Validation and Verification 2000: E49-E56
1990 – 1999
- 1999
- [c2]Rajeev Alur, Bow-Yaw Wang:
"Next" Heuristic for On-the-Fly Model Checking. CONCUR 1999: 98-113 - 1997
- [j2]Hsu-Chun Yen, Bow-Yaw Wang, Ming-Sheng Yang:
Deciding a Class of Path Formulas for Conflict-Free Petri Nets. Theory Comput. Syst. 30(5): 475-494 (1997) - 1994
- [j1]Hsu-Chun Yen, Bow-Yaw Wang, Ming-Sheng Yang:
Some Complexity Results for Rings of Petri Nets. Int. J. Found. Comput. Sci. 5(3/4): 282-292 (1994) - 1993
- [c1]Hsu-Chun Yen, Bow-Yaw Wang, Ming-Sheng Yang:
A Unified Approach for Reasoning about Conflict-Free Petri Nets. Application and Theory of Petri Nets 1993: 513-531
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-14 23:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint