References of "Li, Yongjian"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailL-CMP: an automatic learning-based parameterized verification tool
Cao, Jialun; Li, Yongjian; Pang, Jun UL

in Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering (2018)

Detailed reference viewed: 43 (1 UL)
Full Text
Peer Reviewed
See detailAn Automatic Proving Approach to Parameterized Verification
Li, Yongjian; Duan, Kaiqiang; Jansen, David et al

in ACM Transactions on Computational Logic (2018), 19(4), 1-27

Detailed reference viewed: 59 (1 UL)
Full Text
Peer Reviewed
See detailA novel approach to parameterized verification of cache coherence protocols
Li, Yongjian; Duan, Kaiqiang; Lv, Li et al

in Proceedings of the 34th IEEE International Conference on Computer Design (2016)

Detailed reference viewed: 214 (2 UL)
Full Text
Peer Reviewed
See detailparaVerifier: An automatic framework for proving parameterized cache coherence protocols
Li, Yongjian; Pang, Jun UL; Lv, Yi et al

in Proceedings of the 13th International Symposium on Automated Technology for Verification and Analysis (ATVA'15) (2015)

Detailed reference viewed: 81 (3 UL)
Full Text
Peer Reviewed
See detailFormalizing provable anonymity in Isabelle/HOL
Li, Yongjian; Pang, Jun UL

in Formal Aspects of Computing (2015), 27(2), 255-282

Detailed reference viewed: 63 (1 UL)
Full Text
Peer Reviewed
See detailA strand space approach to provable anonymity
Li, Yongjian; Pang, Jun UL

in Proc. 2nd Workshop on Formal Techniques for Safety-Critical Systems (FTSCS'13) (2014)

Detailed reference viewed: 66 (1 UL)
Full Text
Peer Reviewed
See detailAn inductive approach to strand spaces
Li, Yongjian; Pang, Jun UL

in Formal Aspects of Computing (2013), 25(4), 465-501

Detailed reference viewed: 70 (0 UL)
Full Text
Peer Reviewed
See detailAn inductive approach to provable anonymity
Li, Yongjian; Pang, Jun UL

in Proc. 6th International Conference on Availability, Reliability and Security (2011)

Detailed reference viewed: 62 (1 UL)
Full Text
Peer Reviewed
See detailExtending the Strand Space Method with Timestamps: Part I the Theor
Li, Yongjian; Pang, Jun UL

in Journal of Information Security (2010), 1(2), 45-55

Detailed reference viewed: 31 (0 UL)