Chenyi Zhang
Chenyi Zhang
Oracle Labs Australia
Verified email at
Cited by
Cited by
Characterising testing preorders for finite probabilistic processes
C Morgan, R Van Glabbeek, M Hennessy, Y Deng
Logical Methods in Computer Science 4, 2008
User-input dependence analysis via graph reachability
B Scholz, C Zhang, C Cifuentes
2008 Eighth IEEE International Working Conference on Source Code Analysis …, 2008
Algorithmic verification of noninterference properties
R van der Meyden, C Zhang
Electronic Notes in Theoretical Computer Science 168, 61-75, 2007
Remarks on testing probabilistic processes
Y Deng, R Van Glabbeek, M Hennessy, C Morgan, C Zhang
Electronic Notes in Theoretical Computer Science 172, 359-397, 2007
Combining string abstract domains for JavaScript analysis: an evaluation
R Amadini, A Jordan, G Gange, F Gauthier, P Schachte, H Søndergaard, ...
International Conference on Tools and Algorithms for the Construction and …, 2017
Scalar outcomes suffice for finitary probabilistic testing
Y Deng, R Glabbeek, C Morgan, C Zhang
European Symposium on Programming, 363-378, 2007
Probabilistic alternating-time temporal logic of incomplete information and synchronous perfect recall
X Huang, K Su, C Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 26 (1), 765-771, 2012
A comparison of semantic models for noninterference
R van der Meyden, C Zhang
Theoretical Computer Science 411 (47), 4123-4147, 2010
Information flow in systems with schedulers
R van der Meyden, C Zhang
2008 21st IEEE Computer Security Foundations Symposium, 301-312, 2008
Path-sensitive data flow analysis simplified
K Winter, C Zhang, IJ Hayes, N Keynes, C Cifuentes, L Li
International Conference on Formal Engineering Methods, 415-430, 2013
Intransitive noninterference in nondeterministic systems
K Engelhardt, R Van Der Meyden, C Zhang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
A comparison of semantic models for noninterference
R Van Der Meyden, C Zhang
Formal Aspects in Security and Trust, 235-249, 2006
Reference abstract domains and applications to string analysis
R Amadini, G Gange, F Gauthier, A Jordan, P Schachte, H Søndergaard, ...
Fundamenta Informaticae 158 (4), 297-326, 2018
Method and system for fast static taint analysis
BF Scholz, C Zhang, CN Cifuentes
US Patent 8,327,339, 2012
Imparting cultural values to Chinese children through literature
C Zhang, JW Morrison
International Journal of Early Childhood 42 (1), 7-26, 2010
Game-Based Verification of Multi-Party Contract Signing Protocols
Y Zhang, C Zhang, J Pang, S Mauw
Formal Aspects in Security and Trust: 6th International Workshop, FAST 2009 …, 2010
Introduction of the AeroSUV-a new generic SUV model for aerodynamic research
C Zhang, M Tanneberger, T Kuthada, F Wittmeier, J Wiedemann, J Nies
SAE Technical Paper, 2019
A trust-augmented voting scheme for collaborative privacy management
Y Sun, C Zhang, J Pang, B Alcalde, S Mauw
Journal of Computer Security 20 (4), 437-459, 2012
On probabilistic alternating simulations
C Zhang, J Pang
IFIP International Conference on Theoretical Computer Science, 71-85, 2010
Design and formal verification of a CEM protocol with transparent TTP
Z Liu, J Pang, C Zhang
Frontiers of Computer Science 7 (2), 279-297, 2013
The system can't perform the operation now. Try again later.
Articles 1–20