Set propagation techniques for reachability analysis

M Althoff, G Frehse, A Girard - Annual Review of Control …, 2021 - annualreviews.org
Reachability analysis consists in computing the set of states that are reachable by a
dynamical system from all initial states and for all admissible inputs and parameters. It is a …

A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability

X Huang, D Kroening, W Ruan, J Sharp, Y Sun… - Computer Science …, 2020 - Elsevier
In the past few years, significant progress has been made on deep neural networks (DNNs)
in achieving human-level performance on several long-standing tasks. With the broader …

[PDF][PDF] Automating the design process for smart building technologies

R Parekh - World Journal of Advanced Research and Reviews, 2024 - researchgate.net
Smart buildings are emerging as complex cyber-physical systems that aim to provide safe,
comfortable, energy-efficient, and aesthetically pleasing environments. However, traditional …

[책][B] Handbook of model checking

EM Clarke, TA Henzinger, H Veith, R Bloem - 2018 - Springer
This handbook is intended to give an in-depth description of the many research areas that
make up the expanding field of model checking. In 32 chapters, 76 of the world's leading …

Learning from massive noisy labeled data for image classification

T **ao, T **a, Y Yang, C Huang… - Proceedings of the …, 2015 - openaccess.thecvf.com
Large-scale supervised datasets are crucial to train convolutional neural networks (CNNs)
for various computer vision problems. However, obtaining a massive amount of well-labeled …

[책][B] Formal methods for discrete-time dynamical systems

C Belta, B Yordanov, EA Gol - 2017 - Springer
In control theory, complex models of physical processes, such as systems of differential or
difference equations, are usually checked against simple specifications, such as stability …

The past, present and future of cyber-physical systems: A focus on models

EA Lee - Sensors, 2015 - mdpi.com
This paper is about better engineering of cyber-physical systems (CPSs) through better
models. Deterministic models have historically proven extremely useful and arguably form …

The visual object tracking vot2015 challenge results

M Kristan, J Matas, A Leonardis… - Proceedings of the …, 2015 - cv-foundation.org
Abstract The Visual Object Tracking challenge 2015, VOT2015, aims at comparing short-
term single-object visual trackers that do not apply pre-learned models of object …

Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools

E Ruijters, M Stoelinga - Computer science review, 2015 - Elsevier
Fault tree analysis (FTA) is a very prominent method to analyze the risks related to safety
and economically critical assets, like power plants, airplanes, data centers and web shops …

Soteria: Automated {IoT} safety and security analysis

ZB Celik, P McDaniel, G Tan - 2018 USENIX annual technical …, 2018 - usenix.org
Broadly defined as the Internet of Things (IoT), the growth of commodity devices that
integrate physical processes with digital systems have changed the way we live, play and …