Follow
Xinwen Hu
Title
Cited by
Cited by
Year
A security modeling and verification method of embedded software based on Z and MARTE
X Hu, Y Zhuang, F Zhang
Computers & Security 88, 101615, 2020
152020
A security type verifier for smart contracts
X Hu, Y Zhuang, SW Lin, F Zhang, S Kan, Z Cao
Computers & Security 108, 102343, 2021
82021
Fine-grained Binary Analysis Method for Privacy Leakage Detection on the Cloud Platform
Jiaye Pan, Yi Zhuang, Xinwen Hu, Wenbing Zhao
Computers, Materials & Continua 64 (1), 607--622, 2020
52020
Modeling and validation for embedded software confidentiality and integrity
X Hu, Y Zhuang, Z Cao, T Ye, M Li
2017 12th International Conference on Intelligent Systems and Knowledge …, 2017
42017
PHRiMA: A permission-based hybrid risk management framework for android apps
X Hu, Y Zhuang
Computers & Security 94, 101791, 2020
32020
一种结合 AADL 与 Z 的嵌入式软件可靠性建模与评估方法
李蜜, 庄毅, 胡镡文
计算机科学 46 (8), 217-223, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–6