default search action
24th ICFEM 2023: Brisbane, QLD, Australia
- Yi Li, Sofiène Tahar:
Formal Methods and Software Engineering - 24th International Conference on Formal Engineering Methods, ICFEM 2023, Brisbane, QLD, Australia, November 21-24, 2023, Proceedings. Lecture Notes in Computer Science 14308, Springer 2023, ISBN 978-981-99-7583-9
Invited Paper
- Ian J. Hayes, Mark Utting, Brae J. Webb:
Verifying Compiler Optimisations - (Invited Paper). 3-8
Regular Papers
- Tai D. Nguyen, Long H. Pham, Jun Sun, Quang Loc Le:
An Idealist's Approach for Smart Contract Correctness. 11-28 - Michael Foster, Roland Groz, Catherine Oriat, Adenilso da Silva Simão, Germán Vega, Neil Walkinshaw:
Active Inference of EFSMs Without Reset. 29-46 - Paul Kogel, Verena Klös, Sabine Glesner:
Learning Mealy Machines with Local Timers. 47-64 - Toby Murray, Pengbo Yan, Gidon Ernst:
Compositional Vulnerability Detection with Insecurity Separation Logic. 65-82 - Nicolaj Ø. Jensen, Peter Gjøl Jensen, Kim G. Larsen:
Dynamic Extrapolation in Extended Timed Automata. 83-99 - Zhongkui Ma, Xinguo Feng, Zihan Wang, Shuofeng Liu, Mengyao Ma, Hao Guan, Mark Huasong Meng:
Formalizing Robustness Against Character-Level Perturbations for Neural Network Language Models. 100-117 - Nasos Evangelou-Oost, Larissa Meinicke, Callum Bannister, Ian J. Hayes:
Trace Models of Concurrent Valuation Algebras. 118-136 - Xiaoyong Xue, Meng Sun:
Branch and Bound for Sigmoid-Like Neural Network Verification. 137-155 - Huan Wu, Fei Xie, Zhenkun Yang:
Certifying Sequential Consistency of Machine Learning Accelerators. 156-171 - Irfan Sljivo, Ewen Denney, Jonathan Menzies:
Guided Integration of Formal Verification in Assurance Cases. 172-190 - Sebastian Stock, Atif Mashkoor, Alexander Egyed:
Validation-Driven Development. 191-207 - Max Blankestijn, Alfons Laarman:
Incremental Property Directed Reachability. 208-227 - Quelen Cartellier, Marc Frappier, Amel Mammar:
Proving Local Invariants in ASTDs. 228-246
Doctoral Symposium Papers
- Babu Pillai, Zhé Hóu, Kamanashis Biswas, Vallipuram Muthukkumarasamy:
Formal Verification of the Burn-to-Claim Blockchain Interoperable Protocol. 249-254 - Sebastian Stock:
Early and Systematic Validation of Formal Models. 255-260 - Zhongkui Ma:
Verifying Neural Networks by Approximating Convex Hulls. 261-266 - Guanqin Zhang:
Eager to Stop: Efficient Falsification of Deep Neural Networks. 267-272 - Ayodeji James Akande, Zhe Hou, Ernest Foo, Qinyi Li:
A Runtime Verification Framework for Cyber-Physical Systems Based on Data Analytics and LTL Formula Learning. 273-278 - Feng Xu:
Unified Verification of Neural Networks' Robustness and Privacy in Computer Vision. 279-284 - Yilin Yang:
IoT Software Vulnerability Detection Techniques through Large Language Model. 285-290 - Xiao Cheng:
Vulnerability Detection via Typestate-Guided Code Representation Learning. 291-297
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.