


default search action
24th ICFEM 2023: Brisbane, QLD, Australia
- Yi Li

, Sofiène Tahar
:
Formal Methods and Software Engineering - 24th International Conference on Formal Engineering Methods, ICFEM 2023, Brisbane, QLD, Australia, November 21-24, 2023, Proceedings. Lecture Notes in Computer Science 14308, Springer 2023, ISBN 978-981-99-7583-9
Invited Paper
- Ian J. Hayes, Mark Utting

, Brae J. Webb
:
Verifying Compiler Optimisations - (Invited Paper). 3-8
Regular Papers
- Tai D. Nguyen, Long H. Pham, Jun Sun, Quang Loc Le:

An Idealist's Approach for Smart Contract Correctness. 11-28 - Michael Foster

, Roland Groz
, Catherine Oriat
, Adenilso da Silva Simão
, Germán Vega
, Neil Walkinshaw
:
Active Inference of EFSMs Without Reset. 29-46 - Paul Kogel

, Verena Klös, Sabine Glesner:
Learning Mealy Machines with Local Timers. 47-64 - Toby Murray, Pengbo Yan, Gidon Ernst

:
Compositional Vulnerability Detection with Insecurity Separation Logic. 65-82 - Nicolaj Ø. Jensen

, Peter Gjøl Jensen
, Kim G. Larsen
:
Dynamic Extrapolation in Extended Timed Automata. 83-99 - Zhongkui Ma

, Xinguo Feng
, Zihan Wang
, Shuofeng Liu
, Mengyao Ma
, Hao Guan
, Mark Huasong Meng
:
Formalizing Robustness Against Character-Level Perturbations for Neural Network Language Models. 100-117 - Nasos Evangelou-Oost

, Larissa Meinicke
, Callum Bannister
, Ian J. Hayes
:
Trace Models of Concurrent Valuation Algebras. 118-136 - Xiaoyong Xue, Meng Sun:

Branch and Bound for Sigmoid-Like Neural Network Verification. 137-155 - Huan Wu, Fei Xie, Zhenkun Yang:

Certifying Sequential Consistency of Machine Learning Accelerators. 156-171 - Irfan Sljivo

, Ewen Denney, Jonathan Menzies:
Guided Integration of Formal Verification in Assurance Cases. 172-190 - Sebastian Stock

, Atif Mashkoor
, Alexander Egyed
:
Validation-Driven Development. 191-207 - Max Blankestijn, Alfons Laarman:

Incremental Property Directed Reachability. 208-227 - Quelen Cartellier, Marc Frappier

, Amel Mammar
:
Proving Local Invariants in ASTDs. 228-246
Doctoral Symposium Papers
- Babu Pillai, Zhé Hóu

, Kamanashis Biswas
, Vallipuram Muthukkumarasamy:
Formal Verification of the Burn-to-Claim Blockchain Interoperable Protocol. 249-254 - Sebastian Stock

:
Early and Systematic Validation of Formal Models. 255-260 - Zhongkui Ma

:
Verifying Neural Networks by Approximating Convex Hulls. 261-266 - Guanqin Zhang:

Eager to Stop: Efficient Falsification of Deep Neural Networks. 267-272 - Ayodeji James Akande

, Zhe Hou
, Ernest Foo
, Qinyi Li:
A Runtime Verification Framework for Cyber-Physical Systems Based on Data Analytics and LTL Formula Learning. 273-278 - Feng Xu

:
Unified Verification of Neural Networks' Robustness and Privacy in Computer Vision. 279-284 - Yilin Yang:

IoT Software Vulnerability Detection Techniques through Large Language Model. 285-290 - Xiao Cheng

:
Vulnerability Detection via Typestate-Guided Code Representation Learning. 291-297

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














