default search action
Shih-Kun Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j17]Arthur Ning-Chih Yang, Shih-Kun Huang, Wuu Yang:
Call-site tree and its application in function inlining. Int. J. Embed. Syst. 17(5): 1-12 (2024) - 2023
- [j16]Han-Lin Lu, Ren-Jie Zhuang, Shih-Kun Huang:
Fuzz Testing Process Visualization. J. Inf. Sci. Eng. 39(5): 1037-1059 (2023) - 2020
- [j15]Chao-Chun Yeh, Han-Lin Lu, Jiazheng Zhou, Sheng-An Chang, Xuan-Yi Lin, Yichiao Sun, Shih-Kun Huang:
Big Data Platform Configuration Using Machine Learning. J. Inf. Sci. Eng. 36(3): 469-493 (2020) - 2016
- [j14]Hsia-Hsiang Chen, Shih-Kun Huang:
LDDoS Attack Detection by Using Ant Colony Optimization Algorithms. J. Inf. Sci. Eng. 32(4): 995-1020 (2016) - [j13]Hsia-Hsiang Chen, Chien-Hua Lee, Shih-Kun Huang:
A Unified Ant Agent Framework for Solving DoS and QoS Problems. J. Inf. Sci. Eng. 32(6): 1397-1434 (2016) - 2014
- [j12]Shih-Kun Huang, Min-Hsiang Huang, Po-Yen Huang, Han-Lin Lu, Chung-Wei Lai:
Software Crash Analysis for Automatic Exploit Generation on Binary Programs. IEEE Trans. Reliab. 63(1): 270-289 (2014) - 2012
- [j11]Han-Yu Lin, Tzong-Sun Wu, Shih-Kun Huang:
Certificate-Based Secure Three-Party Signcryption Scheme with Low Costs. J. Inf. Sci. Eng. 28(4): 739-753 (2012) - [j10]Han-Yu Lin, Tzong-Sun Wu, Shih-Kun Huang:
An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce. J. Inf. Sci. Eng. 28(4): 771-785 (2012) - 2011
- [j9]Han-Yu Lin, Chien-Lung Hsu, Shih-Kun Huang:
Improved convertible authenticated encryption scheme with provable security. Inf. Process. Lett. 111(13): 661-666 (2011) - 2010
- [j8]Han-Yu Lin, Tzong-Sun Wu, Shih-Kun Huang, Yi-Shiung Yeh:
Efficient proxy signcryption scheme with provable CCA and CMA security. Comput. Math. Appl. 60(7): 1850-1858 (2010) - 2005
- [j7]Yao-Wen Huang, Chung-Hung Tsai, Tsung-Po Lin, Shih-Kun Huang, D. T. Lee, Sy-Yen Kuo:
A testing framework for Web application security assessment. Comput. Networks 48(5): 739-761 (2005) - [j6]Shih-Kun Huang, Kang-min Liu:
Mining version histories to verify the learning process of Legitimate Peripheral Participants. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-5 (2005) - 2004
- [j5]Deng-Jyi Chen, Chung-Chien Hwang, Shih-Kun Huang, David T. K. Chen:
Mining Control Patterns from Java Program Corpora. J. Inf. Sci. Eng. 20(1): 57-83 (2004) - 2000
- [j4]Deng-Jyi Chen, Chorng-Shiuh Koong, Wu-Chi Chen, Shih-Kun Huang, N. W. P. van Diepen:
Integration of Reusable Software Components and Frameworks Into a Visual Software Construction Approach. J. Inf. Sci. Eng. 16(6): 863-884 (2000) - [j3]Chun-Shien Lu, Shih-Kun Huang, Chwen-Jye Sze, Hong-Yuan Mark Liao:
Cocktail Watermarking for Digital Image Protection. IEEE Trans. Multim. 2(4): 209-224 (2000) - 1995
- [j2]Deng-Jyi Chen, Shih-Kun Huang, Wu-Chi Chen, Pao-Hsu Shih:
A New Method Dispatcher to Improve Execution Speed for Object-Oriented Programming Systems. J. Inf. Sci. Eng. 11(4): 649-661 (1995) - 1994
- [j1]Deng-Jyi Chen, Wu-Chi Chen, Shih-Kun Huang, David T. K. Chen:
A Survey of the Influence of Programming Constructs and Mechanisms on Software Quality1. J. Inf. Sci. Eng. 10(2): 177-201 (1994)
Conference and Workshop Papers
- 2024
- [c31]Han-Lin Lu, Zong-Yuan Wu, Chien-Hsing Wu, Guan-Zhong Wang, Shih-Kun Huang:
Fuzzing Command-line Interface by Edge Coverage Guided Combinatorial Testing and Input Clustering. QRS 2024: 516-525 - 2022
- [c30]Wei-Loon Mow, Shih-Kun Huang, Hsu-Chun Hsiao:
LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR. DSC 2022: 1-8 - [c29]Han-Lin Lu, Guan Ming Lin, Shih-Kun Huang:
Guan-fuzz: Argument Selection With Mean Shift Clustering for Multi-argument Fuzzing. DSA 2022: 421-430 - [c28]Nan-Jung Huang, Chih-Jen Huang, Shih-Kun Huang:
Pain Pickle: Bypassing Python Restricted Unpickler for Automatic Exploit Generation. QRS 2022: 1079-1090 - 2021
- [c27]Chung-Hsuan Tsai, Shi-Chun Tsai, Shih-Kun Huang:
REST API Fuzzing by Coverage Level Guided Blackbox Testing. QRS 2021: 291-300 - 2020
- [c26]Bo-Ching Lin, Hwai-Jung Hsu, Shih-Kun Huang:
Testing Convolutional Neural Network using Adversarial Attacks on Potential Critical Pixels. COMPSAC 2020: 1743-1748 - 2018
- [c25]Ying-Shen Chen, Wei-Ning Chen, Che-Yu Wu, Hsu-Chun Hsiao, Shih-Kun Huang:
Dynamic Path Pruning in Symbolic Execution. DSC 2018: 1-8 - 2017
- [c24]Chao-Chun Yeh, Han-Lin Lu, Yi-Hsuan Lee, Wei-Sheng Chou, Shih-Kun Huang:
CRAXTriage: A coverage based triage system. DSC 2017: 408-415 - [c23]Chao-Chun Yeh, Han-Lin Lu, Jia-Jun Yeh, Shih-Kun Huang:
Path Exploration Based on Monte Carlo Tree Search for Symbolic Execution. TAAI 2017: 33-37 - 2016
- [c22]Ruizhi Gao, Linghuan Hu, W. Eric Wong, Han-Lin Lu, Shih-Kun Huang:
Effective Test Generation for Combinatorial Decision Coverage. QRS Companion 2016: 47-54 - [c21]Hsia-Hsiang Chen, Da-Qun Zheng, Shih-Kun Huang:
Automatic Defense through Fault Localization and Dynamic Patch Creation. QRS Companion 2016: 408-409 - [c20]Chao-Chun Yeh, Jiazheng Zhou, Sheng-An Chang, Xuan-Yi Lin, Yichiao Sun, Shih-Kun Huang:
BigExplorer: A configuration recommendation system for big data platform. TAAI 2016: 228-234 - 2015
- [c19]Chao-Chun Yeh, Shih-Kun Huang:
CovDroid: A Black-Box Testing Coverage System for Android. COMPSAC Workshops 2015: 447-452 - [c18]Chao-Chun Yeh, Hsiang Chung, Shih-Kun Huang:
CRAXfuzz: Target-Aware Symbolic Fuzz Testing. COMPSAC 2015: 460-471 - [c17]Ying-Dar Lin, Feng-Ze Liao, Shih-Kun Huang, Yuan-Cheng Lai:
Browser fuzzing by scheduled mutation and generation of document object models. ICCST 2015: 1-6 - [c16]Hsia-Hsiang Chen, Han-Lin Lu, Shih-Kun Huang, Ruizhi Gao, W. Eric Wong:
Diagnosing SDN Network Problems by Using Spectrum-Based Fault Localization Techniques. QRS Companion 2015: 121-127 - 2014
- [c15]Hsia-Hsiang Chen, Shih-Kun Huang:
A Multi-Agent Intelligence Hybrid System Technique for Detection and Defense of DDoS Attacks. ICS 2014: 125-139 - [c14]Wei-Jun Chen, Hsiao-Rong Tyan, Shih-Kun Huang:
On the Effectiveness of Scheduling Fuzz Testing. ICS 2014: 841-849 - [c13]Chao-Chun Yeh, Han-Lin Lu, Chun-Yen Chen, Kee Kiat Khor, Shih-Kun Huang:
CRAXDroid: Automatic Android System Testing by Selective Symbolic Execution. SERE (Companion) 2014: 140-148 - 2013
- [c12]Chao-Chun Yeh, Shih-Kun Huang, Sung-Yen Chang:
A black-box based android GUI testing system. MobiSys 2013: 529-530 - [c11]Shih-Kun Huang, Han-Lin Lu, Wai-Meng Leong, Huan Liu:
CRAXweb: Automatic Web Application Testing and Attack Generation. SERE 2013: 208-217 - 2012
- [c10]Shih-Kun Huang, Min-Hsiang Huang, Po-Yen Huang, Chung-Wei Lai, Han-Lin Lu, Wai-Meng Leong:
CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations. SERE 2012: 78-87 - 2007
- [c9]Chang-Hsien Tsai, Shih-Kun Huang:
Detection and Diagnosis of Control Interception. ICICS 2007: 412-426 - 2005
- [c8]Shih-Kun Huang, Kang-min Liu:
Mining version histories to verify the learning process of Legitimate Peripheral Participants. MSR 2005 - 2003
- [c7]Yao-Wen Huang, Shih-Kun Huang, Tsung-Po Lin, Chung-Hung Tsai:
Web application security assessment by fault injection and behavior monitoring. WWW 2003: 148-159 - 2001
- [c6]Chung-Chien Hwang, Shih-Kun Huang, Deng-Jyi Chen, David T. K. Chen:
Object-Oriented Program Behavior Analysis Based on Control Patterns. APAQS 2001: 81-87 - 2000
- [c5]Chwen-Jye Sze, Hong-Yuan Mark Liao, Shih-Kun Huang, Chun-Shien Lu:
Dyadic Wavelet-Based Nonlinear Conduction Equation: Theory and Applications. ICIP 2000: 880-883 - 1999
- [c4]Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, Chwen-Jye Sze:
Cocktail Watermarking on Images. Information Hiding 1999: 333-347 - [c3]Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, Chwen-Jye Sze:
Highly Robust Image Watermarking Using Complementary Modulations. ISW 1999: 136-153 - 1992
- [c2]Shih-Kun Huang, Deng-Jyi Chen:
Two-way coloring approaches for method dispatching in object-oriented programming systems. COMPSAC 1992: 39-44 - [c1]Deng-Jyi Chen, Shih-Kun Huang:
Interface for Reusable Software Components. IFIP Congress (1) 1992: 3-9
Informal and Other Publications
- 2021
- [i1]Chung-Hsuan Tsai, Shi-Chun Tsai, Shih-Kun Huang:
REST API Fuzzing by Coverage Level Guided Blackbox Testing. CoRR abs/2112.15485 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 21:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint