2008 |
9 | EE | Syrine Tlili,
Zhenrong Yang,
Hai Zhou Ling,
Mourad Debbabi:
A Hybrid Approach for Safe Memory Management in C.
AMAST 2008: 377-391 |
8 | EE | Aiman Hanna,
Hai Zhou Ling,
Jason Furlong,
Zhenrong Yang,
Mourad Debbabi:
Targeting Security Vulnerabilities: From Specification to Detection (Short Paper).
QSIC 2008: 97-102 |
2007 |
7 | EE | Zhenrong Yang,
Aiman Hanna,
Mourad Debbabi:
Team Edit Automata for Testing Security Property.
IAS 2007: 235-240 |
2006 |
6 | EE | Nadia Belblidia,
Mourad Debbabi,
Aiman Hanna,
Zhenrong Yang:
AOP Extension for Security Testing of Programs.
CCECE 2006: 647-650 |
2003 |
5 | | Yuxi Fu,
Zhenrong Yang:
Understanding the mismatch combinator in chi calculus.
Theor. Comput. Sci. 290(1): 779-830 (2003) |
4 | EE | Yuxi Fu,
Zhenrong Yang:
Tau laws for pi calculus.
Theor. Comput. Sci. 308(1-3): 55-130 (2003) |
2002 |
3 | EE | Chunxi Chen,
Zhenrong Yang:
MPEG4 Compatible Video Browsing and Retrieval over Low Bitrate Channel.
IEEE Pacific Rim Conference on Multimedia 2002: 1221-1226 |
2000 |
2 | EE | Yuxi Fu,
Zhenrong Yang:
Chi Calculus with Mismatch.
CONCUR 2000: 596-610 |
1 | EE | Yuxi Fu,
Zhenrong Yang:
The Ground Congruence for Chi Calculus.
FSTTCS 2000: 385-396 |