Raymond Devillers and Ronny Tredup |
Complexity of Distributed Petri Net Synthesis |
Guoliang Dong, Jingyi Wang, Jun Sun, Sudipta Chattopadhyay, Xinyu Wang, Ting Dai, Jie Shi and Jin Song Dong |
Repairing Adversarial Texts through Perturbation |
Jaap Boender and Goran Badevic |
Formal Verification of a Keystore |
Nicholas Moore and Mark Lawford |
Towards the Formal Verification of RapidIO via Static Analysis and Theorem Proving |
Francesco Parolini and Antoine Miné |
Sound Static Analysis of Regular Expressions for Vulnerabilities to Denial of Service Attacks |
Yulong Bao, Xue-Yang Zhu, Wenhui Zhang, Wuwei Shen, Pengfei Sun and Yingqi Zhao |
On Verification of Smart Contracts via Model Checking |
Erwan Mahé, Christophe Gaston and Pascale Le Gall |
Equivalence of Denotational and Operational Semantics for Interaction Languages |
Shaohong Zhu and Zhangrong Qin |
LC4EA: A Low-Code Tool for Automated Generation of Enterprise Application |
Fanqi Meng, Xuesong Wang, Jingdong Wang and Peifang Wang |
Automatic Classification of Bug Reports Based on Multiple Text Information and Reports’ Intention |
Yide Du, Weijiang Hong, Zhenbang Chen and Ji Wang |
Collaborative Trace Abstraction-Based Verification of Uninterpreted Programs |
Bai Jun Cheng, Yan Hui Guo, Yan Ren, Gang Yang and Guo Sheng Xu |
MSDetector: A Static PHP Webshell Detection System based on Deep-Learning |
S. Arun-Kumar |
Extending process algebra with an undefined action |
Conor Reynolds and Rosemary Monahan |
Machine-Assisted Proofs for Institutions in Coq |
Hannes Kallwies, Martin Leucker, Meiko Prilop and Malte Schmitz |
Optimizing Trans-Compilers in Runtime Verification makes Sense – Sometimes |
Haitao Zhang and Bowen Pu |
Testing Vehicle-Mounted Systems: A Stepwise Symbolic Execution Approach for OSEK/VDX Programs |
Ying Gao, Meng Wang and Bin Yu |
Dynamic Specification Mining based on Transformer |
Chunxi Zhang |
Dynamic Environment Simulation for Database Performance Evaluation |
Racem Bougacha, Régine Laleau, Simon Collart-Dutilleul and Rahma Ben Ayed |
Extending SYSML with refinement and decomposition mechanisms to generate EVENT-B specifications |
Chaymae El Jabri, marc frappier, thibaud Ecarot and Pierre-Martin Tardif |
Development of monitoring systems for anomaly detection using ASTD specifications |
Marcello Bonsangue, Georgiana Caltais, Hui Feng and Hünkar Can Tunç |
A Language-based Causal Model for Safety |
Harald König and Uwe Wolter |
Consistency of Heterogeneously Typed Behavioural Models: A Coalgebraic Approach |
Xiaochao Tang, Zhengfeng Yang, Xuanming Fu, Jianlin Wang and Zhenbing Zeng |
Improving Adversarial Robustness of Deep Neural Networks via Linear Programming |
Kim Guldstrand Larsen, Anders Mariegaard, Stefan Schmid and Jiri Srba |
AllSynth: Transiently Correct Network Update Synthesis Accounting for Operator Preferences |
Imran Riaz Hasrat, Peter Gjøl Jensen, Kim Guldstrand Larsen and Jiri Srba |
End-to-End Heat-Pump Control Using Continuous Time Stochastic Modelling and Uppaal Stratego |
Salim Yahia Kissi, Ameur-Boulifa Rabéa and Yassamine Seladji |
Security vulnerabilities detection through assertion-based approach |
Sean Kauffman and Martin Zimmermann |
The Complexity of Evaluating nfer |
Alexandru-Ioan Lungu and Dorel Lucanu |
Supporting Algorithm Analysis with Symbolic Execution |