


default search action
24th ICFEM 2023: Brisbane, QLD, Australia
- Yi Li
, Sofiène Tahar
:
Formal Methods and Software Engineering - 24th International Conference on Formal Engineering Methods, ICFEM 2023, Brisbane, QLD, Australia, November 21-24, 2023, Proceedings. Lecture Notes in Computer Science 14308, Springer 2023, ISBN 978-981-99-7583-9
Invited Paper
- Ian J. Hayes, Mark Utting
, Brae J. Webb
:
Verifying Compiler Optimisations - (Invited Paper). 3-8
Regular Papers
- Tai D. Nguyen, Long H. Pham, Jun Sun, Quang Loc Le:
An Idealist's Approach for Smart Contract Correctness. 11-28 - Michael Foster
, Roland Groz
, Catherine Oriat
, Adenilso da Silva Simão
, Germán Vega
, Neil Walkinshaw
:
Active Inference of EFSMs Without Reset. 29-46 - Paul Kogel
, Verena Klös, Sabine Glesner:
Learning Mealy Machines with Local Timers. 47-64 - Toby Murray, Pengbo Yan, Gidon Ernst
:
Compositional Vulnerability Detection with Insecurity Separation Logic. 65-82 - Nicolaj Ø. Jensen, Peter Gjøl Jensen
, Kim G. Larsen
:
Dynamic Extrapolation in Extended Timed Automata. 83-99 - Zhongkui Ma
, Xinguo Feng
, Zihan Wang
, Shuofeng Liu
, Mengyao Ma
, Hao Guan
, Mark Huasong Meng
:
Formalizing Robustness Against Character-Level Perturbations for Neural Network Language Models. 100-117 - Nasos Evangelou-Oost
, Larissa Meinicke
, Callum Bannister
, Ian J. Hayes
:
Trace Models of Concurrent Valuation Algebras. 118-136 - Xiaoyong Xue, Meng Sun:
Branch and Bound for Sigmoid-Like Neural Network Verification. 137-155 - Huan Wu, Fei Xie, Zhenkun Yang:
Certifying Sequential Consistency of Machine Learning Accelerators. 156-171 - Irfan Sljivo
, Ewen Denney, Jonathan Menzies:
Guided Integration of Formal Verification in Assurance Cases. 172-190 - Sebastian Stock
, Atif Mashkoor
, Alexander Egyed
:
Validation-Driven Development. 191-207 - Max Blankestijn, Alfons Laarman:
Incremental Property Directed Reachability. 208-227 - Quelen Cartellier, Marc Frappier
, Amel Mammar
:
Proving Local Invariants in ASTDs. 228-246
Doctoral Symposium Papers
- Babu Pillai, Zhé Hóu
, Kamanashis Biswas, Vallipuram Muthukkumarasamy:
Formal Verification of the Burn-to-Claim Blockchain Interoperable Protocol. 249-254 - Sebastian Stock
:
Early and Systematic Validation of Formal Models. 255-260 - Zhongkui Ma
:
Verifying Neural Networks by Approximating Convex Hulls. 261-266 - Guanqin Zhang:
Eager to Stop: Efficient Falsification of Deep Neural Networks. 267-272 - Ayodeji James Akande
, Zhe Hou
, Ernest Foo, Qinyi Li:
A Runtime Verification Framework for Cyber-Physical Systems Based on Data Analytics and LTL Formula Learning. 273-278 - Feng Xu
:
Unified Verification of Neural Networks' Robustness and Privacy in Computer Vision. 279-284 - Yilin Yang:
IoT Software Vulnerability Detection Techniques through Large Language Model. 285-290 - Xiao Cheng
:
Vulnerability Detection via Typestate-Guided Code Representation Learning. 291-297

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.