Edinburgh Research Explorer

Dr Wei Chen

(Former employee or visitor)

  1. 2018
  2. Formal Analysis of Sneak-Peek: A Data-Centre Attack and its Mitigations

    Chen, W., Lin, Y., Galpin, V., Nigam, V., Lee, M. & Aspinall, D., 2018, 33rd International Conference on Information Security and Privacy Protection (IFIP SEC 2018). Poznan, Poland: Springer, Cham, p. 307-322 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 2016
  4. More Semantics More Robust: Improving Android Malware Classifiers

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 18 Jul 2016, 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Darmstadt, Germany: ACM, p. 147-158 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. On Robust Malware Classifiers by Verifying Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., Jun 2016, Integrated Formal Methods: 12th International Conference, IFM 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings. Springer International Publishing, p. 326-341 15 p. (Lecture Notes in Computer Science; vol. 9681).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. A Text-Mining Approach to Explain Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 18 Apr 2016, EuroSec '16 Proceedings of the 9th European Workshop on System Security . ACM, 6 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Explaining Unwanted Behaviours in Context

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 6 Apr 2016, Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016). CEUR-WS.org, p. 38-45 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Learning and Verifying Unwanted Behaviours

    Chen, W., Aspinall, D., Gordon, A., Sutton, C. & Muttik, I., 2016, 4th Workshop on Hot Issues in Security Principles and Trust (HotSpot 2016). p. 17-32 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. 2015
  10. Verifying Anti-Security Policies Learnt from Android Malware Families

    Chen, W., Sutton, C., Aspinall, D., Gordon, A., Shen, Q. & Muttik, I., 21 Oct 2015, Fourth International Seminar on Program Verification, Automated Debugging and Symbolic Computation. 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Compact Explanations of Why Malware is Bad

    Chen, W., Sutton, C., Gordon, A., Aspinall, D., Muttik, I. & Shen, Q., 10 Aug 2015, (Accepted/In press) AI4FM 2015. 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. 2014
  13. Abstract Interpretation from Buchi Automata

    Hofmann, M. & Chen, W., 2014, Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS). New York, NY, USA: ACM, 10 p. (CSL-LICS '14).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. 2013
  15. Büchi Types for Infinite Traces and Liveness

    Hofmann, M. & Chen, W., Oct 2013, ArXiv, 24 p.

    Research output: Working paper

Previous 1 2 Next