Year |
Citation |
Score |
2020 |
Alexandru AB, Gatsis K, Shoukry Y, Seshia SA, Tabuada P, Pappas GJ. Cloud-based Quadratic Optimization with Partially Homomorphic Encryption Ieee Transactions On Automatic Control. 1-1. DOI: 10.1109/Tac.2020.3005920 |
0.334 |
|
2020 |
Seshia SA, Jha S, Dreossi T. Semantic Adversarial Deep Learning Ieee Design & Test. 37: 8-18. DOI: 10.1109/Mdat.2020.2968274 |
0.308 |
|
2019 |
Cheang K, Rasmussen C, Seshia S, Subramanyan P. A Formal Approach to Secure Speculation Cell Structure and Function. 288-28815. DOI: 10.1109/Csf.2019.00027 |
0.307 |
|
2019 |
Sadigh D, Sastry SS, Seshia SA. Verifying Robustness of Human-Aware Autonomous Cars Ifac-Papersonline. 51: 131-138. DOI: 10.1016/J.Ifacol.2019.01.055 |
0.522 |
|
2019 |
Dreossi T, Donzé A, Seshia SA. Compositional Falsification of Cyber-Physical Systems with Machine Learning Components Journal of Automated Reasoning. 63: 1031-1053. DOI: 10.1007/S10817-018-09509-5 |
0.362 |
|
2018 |
Kim ES, Arcak M, Seshia SA, Kim B, Shiraishi S. Automatic Generation of Communication Requirements for Enforcing Multi-Agent Safety Electronic Proceedings in Theoretical Computer Science. 269: 3-16. DOI: 10.4204/Eptcs.269.2 |
0.305 |
|
2018 |
Shoukry Y, Chong M, Wakaiki M, Nuzzo P, Sangiovanni-Vincentelli A, Seshia SA, Hespanha JP, Tabuada P. SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks Acm Transactions On Cyber-Physical Systems. 2: 1-27. DOI: 10.1145/3078621 |
0.333 |
|
2018 |
Abdelzaher T, Ayanian N, Basar T, Diggavi S, Diesner J, Ganesan D, Govindan R, Jha S, Lepoint T, Marlin B, Nahrstedt K, Nicol D, Rajkumar R, Russell S, Seshia S, et al. Toward an Internet of Battlefield Things: A Resilience Perspective Computer. 51: 24-36. DOI: 10.1109/Mc.2018.2876048 |
0.498 |
|
2018 |
Vazquez-Chanlatte MJ, Ghosh S, Raman V, Sangiovanni-Vincentelli A, Seshia SA. Generating Dominant Strategies for Continuous Two-Player Zero-Sum Games Ifac-Papersonline. 51: 7-12. DOI: 10.1016/J.Ifacol.2018.08.002 |
0.342 |
|
2018 |
Sadigh D, Landolfi N, Sastry SS, Seshia SA, Dragan AD. Planning for cars that coordinate with people: leveraging effects on human actions for planning and active information gathering over human internal state Autonomous Robots. 42: 1405-1426. DOI: 10.1007/S10514-018-9746-1 |
0.463 |
|
2017 |
Seshia SA, Hu S, Li W, Zhu Q. Design Automation of Cyber-Physical Systems: Challenges, Advances, and Opportunities Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 36: 1421-1434. DOI: 10.1109/Tcad.2016.2633961 |
0.541 |
|
2017 |
Shoukry Y, Nuzzo P, Puggelli A, Sangiovanni-Vincentelli AL, Seshia SA, Tabuada P. Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach Ieee Transactions On Automatic Control. 62: 4917-4932. DOI: 10.1109/Tac.2017.2676679 |
0.335 |
|
2017 |
Kim ES, Arcak M, Seshia SA. Symbolic control design for monotone systems with directed specifications Automatica. 83: 10-19. DOI: 10.1016/J.Automatica.2017.04.060 |
0.373 |
|
2017 |
Wu Y, Raman V, Rawlings BC, Lafortune S, Seshia SA. Synthesis of Obfuscation Policies to Ensure Privacy and Utility Journal of Automated Reasoning. 60: 107-131. DOI: 10.1007/S10817-017-9420-X |
0.379 |
|
2017 |
Jha S, Raman V, Sadigh D, Seshia SA. Safe Autonomy Under Perception Uncertainty Using Chance-Constrained Temporal Logic Journal of Automated Reasoning. 60: 43-62. DOI: 10.1007/S10817-017-9413-9 |
0.587 |
|
2017 |
Jha S, Seshia SA. A theory of formal synthesis via inductive learning Acta Informatica. 54: 693-726. DOI: 10.1007/S00236-017-0294-5 |
0.54 |
|
2015 |
Seshia SA, Sadigh D, Sastry SS. Formal methods for semi-autonomous driving Proceedings - Design Automation Conference. 2015. DOI: 10.1145/2744769.2747927 |
0.496 |
|
2015 |
Jin X, Donzé A, Deshmukh JV, Seshia SA. Mining Requirements From Closed-Loop Control Models Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 34: 1704-1717. DOI: 10.1109/Tcad.2015.2421907 |
0.368 |
|
2014 |
Sadigh D, Ohlsson H, Sastry SS, Seshia SA. Robust subspace system identification via weighted nuclear norm optimization Ifac Proceedings Volumes (Ifac-Papersonline). 19: 9510-9515. DOI: 10.3182/20140824-6-Za-1003.02698 |
0.455 |
|
2014 |
Sadigh D, Driggs-Campbell K, Bajcsy R, Sastry SS, Seshia SA. User interface design and verification for semi-autonomous driving Hicons 2014 - Proceedings of the 3rd International Conference On High Confidence Networked Systems (Part of Cps Week). 63-64. DOI: 10.1145/2566468.2576851 |
0.382 |
|
2014 |
Subramanyan P, Tsiskaridze N, Li W, Gascón A, Tan WY, Tiwari A, Shankar N, Seshia SA, Malik S. Reverse engineering digital circuits using structural and functional analyses Ieee Transactions On Emerging Topics in Computing. 2: 63-80. DOI: 10.1109/Tetc.2013.2294918 |
0.508 |
|
2014 |
Holcomb DE, Seshia SA. Compositional performance verification of network-on-chip designs Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 33: 1370-1383. DOI: 10.1109/Tcad.2014.2331342 |
0.653 |
|
2014 |
Sadigh D, Kim ES, Coogan S, Sastry SS, Seshia SA. A learning based approach to control synthesis of Markov decision processes for linear temporal logic specifications Proceedings of the Ieee Conference On Decision and Control. 2015: 1091-1096. DOI: 10.1109/CDC.2014.7039527 |
0.454 |
|
2014 |
Nuzzo P, Xu H, Ozay N, Finn JB, Sangiovanni-Vincentelli AL, Murray RM, Donzé A, Seshia SA. A contract-based methodology for aircraft electric power system design Ieee Access. 2: 1-25. DOI: 10.1109/Access.2013.2295764 |
0.431 |
|
2014 |
Li W, Sadigh D, Sastry SS, Seshia SA. Synthesis for human-in-the-loop control systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8413: 470-484. DOI: 10.1007/978-3-642-54862-8_40 |
0.428 |
|
2014 |
Sadigh D, Driggs-Campbell K, Puggelli A, Li W, Shia V, Bajcsy R, Sangiovanni-Vincentelli AL, Sastry SS, Seshia SA. Data-driven probabilistic modeling and verification of human driver behavior Aaai Spring Symposium - Technical Report. 56-61. |
0.393 |
|
2012 |
Seshia SA, Rakhlin A. Quantitative analysis of systems using game-theoretic learning Transactions On Embedded Computing Systems. 11. DOI: 10.1145/2331147.2331165 |
0.387 |
|
2012 |
Holcomb DE, Gotmanov A, Kishinevsky M, Seshia SA. Compositional performance verification of NoC designs 10th Acm/Ieee International Conference On Formal Methods and Models For Codesign, Memocode 2012. 1-10. DOI: 10.1109/MEMCOD.2012.6292294 |
0.586 |
|
2011 |
Brady BA, Holcomb D, Seshia SA. Counterexample-guided SMT-driven optimal buffer sizing Proceedings -Design, Automation and Test in Europe, Date. 329-334. |
0.705 |
|
2011 |
Brady BA, Bryant RE, Seshia SA. Learning conditional abstractions 2011 Formal Methods in Computer-Aided Design, Fmcad 2011. 116-124. |
0.597 |
|
2011 |
Holcomb D, Brady B, Seshia S. Abstraction-based performance verification of NoCs Proceedings - Design Automation Conference. 492-497. |
0.703 |
|
2010 |
Brady BA, Bryant RE, Seshia SA, O'Leary JW. ATLAS: Automatic term-level abstraction of RTL designs 8th Acm/Ieee International Conference On Formal Methods and Models For Codesign, Memocode 2010. 31-40. DOI: 10.1109/MEMCOD.2010.5558624 |
0.624 |
|
2010 |
Di Natale M, Ghosal A, Giusto P, Sangiovanni-Vincentelli A, Zeng H, Seshia S. Guest editorial special issue on automotive embedded systems Ieee Embedded Systems Letters. 2: 21-22. DOI: 10.1109/Les.2010.2051138 |
0.337 |
|
2009 |
Bryant RE, Kroening D, Ouaknine J, Seshia SA, Strichman O, Brady B. An abstraction-based decision procedure for bit-vector arithmetic International Journal On Software Tools For Technology Transfer. 11: 95-104. DOI: 10.1007/S10009-009-0101-X |
0.616 |
|
2009 |
Holcomb D, Wenchao L, Seshia SA. Design as you see FIT: System-level soft error analysis of sequential circuits Proceedings -Design, Automation and Test in Europe, Date. 785-790. |
0.598 |
|
2007 |
Seshia SA, Subramani K, Bryant RE. On Solving Boolean Combinations of UTVPI Constraints Journal On Satisfiability, Boolean Modeling and Computation. 3: 67-90. DOI: 10.3233/Sat190030 |
0.315 |
|
2007 |
Bryant RE, Kroening D, Ouaknine J, Seshia SA, Strichman O, Brady B. Deciding bit-vector arithmetic with abstraction Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4424: 358-372. |
0.573 |
|
2007 |
Jha S, Brady BA, Seshia SA. Symbolic reachability analysis of lazy linear hybrid automata Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4763: 241-256. |
0.59 |
|
2005 |
Flanagan C, Freund SN, Qadeer S, Seshia SA. Modular verification of multithreaded programs Theoretical Computer Science. 338: 153-183. DOI: 10.1016/J.Tcs.2004.12.006 |
0.313 |
|
2004 |
Seshia SA, Bryant RE. Deciding quantifier-free Presburger formulas using parameterized solution bounds Proceedings - Symposium On Logic in Computer Science. 19: 100-109. DOI: 10.2168/Lmcs-1(2:6)2005 |
0.332 |
|
2003 |
Bryant RE, Lahiri SK, Seshia SA. Convergence testing in term-level bounded model checking Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2860: 348-362. DOI: 10.1007/978-3-540-39724-3_31 |
0.384 |
|
Show low-probability matches. |