共 50 条
- [1] Retrofitting Legacy Code for Security (Invited Talk) [J]. COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2010, 6174 : 19 - 19
- [2] Interactive Data Science at Scale Invited Talk [J]. PROCEEDINGS OF THE 18TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2021 (CF 2021), 2021, : 210 - 210
- [3] Security with Noisy Data (Extended Abstract of Invited Talk) [J]. INFORMATION HIDING, 2010, 6387 : 48 - 50
- [4] Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk [J]. 2020 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED-DESIGN (ICCAD), 2020,
- [5] Invited Talk: Software Engineering, AI and autonomous vehicles: Security assurance [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2020,
- [6] Security of Pseudo-Random Number Generators with Input (Invited Talk) [J]. INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 43 - 51
- [7] Does physical security of cryptographic devices need a formal study? (Invited talk) [J]. INFORMATION THEORETIC SECURITY, PROCEEDINGS, 2008, 5155 : 70 - 70
- [8] Large-Scale Test Automation in the Cloud (Invited Industrial Talk) [J]. 2012 34TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2012, : 1122 - 1122
- [9] Kernelization (Invited Talk) [J]. COMPUTER SCIENCE - THEORY AND APPLICATIONS, 2010, 6072 : 107 - 108
- [10] The Rising Tide Lifts All Boats: The Advancement of Science in Cyber Security (Invited Talk) [J]. ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING, 2017, : 1 - 1