Sun Jun
Sun Jun
Professor of SCIS, SMU
Verified email at - Homepage
Cited by
Cited by
PAT: Towards flexible verification under fairness
J Sun, Y Liu, J Dong, J Pang
Computer Aided Verification, 709-714, 2009
Anomaly detection for a water treatment system using unsupervised machine learning
J Inoue, Y Yamagata, Y Chen, CM Poskitt, J Sun
2017 IEEE international conference on data mining workshops (ICDMW), 1058-1065, 2017
Fault analysis and debugging of microservice systems: Industrial survey, benchmark system, and empirical study
X Zhou, X Peng, T Xie, J Sun, C Ji, W Li, D Ding
IEEE Transactions on Software Engineering 47 (2), 243-260, 2018
sfuzz: An efficient adaptive fuzzer for solidity smart contracts
TD Nguyen, LH Pham, J Sun, Y Lin, QT Minh
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
Model checking CSP revisited: Introducing a process analysis toolkit
J Sun, Y Liu, JS Dong
Leveraging Applications of Formal Methods, Verification and Validation, 307-322, 2009
Latent error prediction and fault localization for microservice applications by learning from system trace logs
X Zhou, X Peng, T Xie, J Sun, C Ji, D Liu, Q Xiang, C He
Proceedings of the 2019 27th ACM joint meeting on European software …, 2019
Adversarial sample detection for deep neural network through model mutation testing
J Wang, G Dong, J Sun, X Wang, P Zhang
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
Benchmarking microservice systems for software engineering research
X Zhou, X Peng, T Xie, J Sun, C Xu, C Ji, W Zhao
Proceedings of the 40th International Conference on Software Engineering …, 2018
Integrating specification and programs for system modeling and verification
J Sun, Y Liu, JS Dong, C Chen
Theoretical Aspects of Software Engineering, 2009. TASE 2009. Third IEEE …, 2009
Learning from mutants: Using code mutation to learn and monitor invariants of a cyber-physical system
Y Chen, CM Poskitt, J Sun
2018 IEEE Symposium on Security and Privacy (SP), 648-660, 2018
AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations
G Bai, J Lei, G Meng, SS Venkatraman, P Saxena, J Sun, Y Liu, J Dong
Proceeding of the Network and Distributed System Security Symposium (NDSS), 2013
White-box fairness testing through adversarial sampling
P Zhang, J Wang, J Sun, G Dong, X Wang, X Wang, JS Dong, T Dai
Proceedings of the ACM/IEEE 42nd international conference on software …, 2020
Social-Loc: Improving indoor localization with social sensing
J Jun, Y Gu, L Cheng, B Lu, J Sun, T Zhu, J Niu
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems …, 2013
Pat 3: An extensible architecture for building multi-domain model checkers
Y Liu, J Sun, JS Dong
The 22nd annual International Symposium on Software Reliability Engineering …, 2011
sCompile: Critical path identification and analysis for smart contracts
J Chang, B Gao, H Xiao, J Sun, Y Cai, Z Yang
Formal Methods and Software Engineering: 21st International Conference on …, 2019
Timed automata patterns
JS Dong, P Hao, S Qin, J Sun, W Yi
Software Engineering, IEEE Transactions on 34 (6), 844-859, 2008
Modeling and verifying hierarchical real-time systems using stateful timed CSP
J Sun, Y Liu, JS Dong, Y Liu, L Shi, É André
ACM Transactions on Software Engineering and Methodology (TOSEM) 22 (1), 1-29, 2013
Semantic understanding of smart contracts: Executable operational semantics of solidity
J Jiao, S Kan, SW Lin, D Sanan, Y Liu, J Sun
2020 IEEE Symposium on Security and Privacy (SP), 1695-1712, 2020
Auditing anti-malware tools by evolving android malware and dynamic loading technique
Y Xue, G Meng, Y Liu, TH Tan, H Chen, J Sun, J Zhang
IEEE Transactions on Information Forensics and Security 12 (7), 1529-1544, 2017
Verification of computation orchestration via timed automata
J Dong, Y Liu, J Sun, X Zhang
Formal Methods and Software Engineering, 226-245, 2006
The system can't perform the operation now. Try again later.
Articles 1–20