Abstract is missing.
- Verifying Compiler Optimisations - (Invited Paper)Ian J. Hayes, Mark Utting, Brae J. Webb. 3-8 [doi]
- An Idealist's Approach for Smart Contract CorrectnessTai D. Nguyen, Long H. Pham, Jun Sun 0001, Quang Loc Le. 11-28 [doi]
- Active Inference of EFSMs Without ResetMichael Foster 0001, Roland Groz, Catherine Oriat, Adenilso da Silva Simão, Germán Vega, Neil Walkinshaw. 29-46 [doi]
- Learning Mealy Machines with Local TimersPaul Kogel, Verena Klös, Sabine Glesner. 47-64 [doi]
- Compositional Vulnerability Detection with Insecurity Separation LogicToby Murray, Pengbo Yan, Gidon Ernst. 65-82 [doi]
- Dynamic Extrapolation in Extended Timed AutomataNicolaj Ø. Jensen, Peter Gjøl Jensen, Kim G. Larsen. 83-99 [doi]
- Formalizing Robustness Against Character-Level Perturbations for Neural Network Language ModelsZhongkui Ma, Xinguo Feng, Zihan Wang, Shuofeng Liu, Mengyao Ma, Hao Guan, Mark Huasong Meng. 100-117 [doi]
- Trace Models of Concurrent Valuation AlgebrasNasos Evangelou-Oost, Larissa Meinicke, Callum Bannister, Ian J. Hayes. 118-136 [doi]
- Branch and Bound for Sigmoid-Like Neural Network VerificationXiaoyong Xue, Meng Sun 0002. 137-155 [doi]
- Certifying Sequential Consistency of Machine Learning AcceleratorsHuan Wu, Fei Xie, Zhenkun Yang. 156-171 [doi]
- Guided Integration of Formal Verification in Assurance CasesIrfan Sljivo, Ewen Denney, Jonathan Menzies. 172-190 [doi]
- Validation-Driven DevelopmentSebastian Stock 0002, Atif Mashkoor, Alexander Egyed. 191-207 [doi]
- Incremental Property Directed ReachabilityMax Blankestijn, Alfons Laarman. 208-227 [doi]
- Proving Local Invariants in ASTDsQuelen Cartellier, Marc Frappier, Amel Mammar. 228-246 [doi]
- Formal Verification of the Burn-to-Claim Blockchain Interoperable ProtocolBabu Pillai, Zhé Hóu, Kamanashis Biswas, Vallipuram Muthukkumarasamy. 249-254 [doi]
- Early and Systematic Validation of Formal ModelsSebastian Stock 0002. 255-260 [doi]
- Verifying Neural Networks by Approximating Convex HullsZhongkui Ma. 261-266 [doi]
- Eager to Stop: Efficient Falsification of Deep Neural NetworksGuanqin Zhang. 267-272 [doi]
- A Runtime Verification Framework for Cyber-Physical Systems Based on Data Analytics and LTL Formula LearningAyodeji James Akande, Zhe Hou, Ernest Foo, Qinyi Li. 273-278 [doi]
- Unified Verification of Neural Networks' Robustness and Privacy in Computer VisionFeng Xu. 279-284 [doi]
- IoT Software Vulnerability Detection Techniques through Large Language ModelYilin Yang. 285-290 [doi]
- Vulnerability Detection via Typestate-Guided Code Representation LearningXiao Cheng 0002. 291-297 [doi]