Author of the publication

Automated Attacker Synthesis for Distributed Protocols.

, , , and . SAFECOMP, volume 12234 of Lecture Notes in Computer Science, page 133-149. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Metrics and methods for robustness evaluation of neural networks with generative models., , and . Mach. Learn., 112 (10): 3977-4012 (October 2023)Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems., , and . CoRR, (2021)Safe Environmental Envelopes of Discrete Systems., , , , and . CAV (1), volume 13964 of Lecture Notes in Computer Science, page 326-350. Springer, (2023)Mapping Synthesis for Hyperproperties., , , and . CSF, page 486-500. IEEE, (2022)On Neural Network Equivalence Checking Using SMT Solvers., , , and . FORMATS, volume 13465 of Lecture Notes in Computer Science, page 237-257. Springer, (2022)When Do We (Not) Need Complex Assume-Guarantee Rules?, , and . ACSD, page 30-39. IEEE Computer Society, (2015)Specification decomposition for synthesis from libraries of LTL Assume/Guarantee contracts., , and . DATE, page 1574-1579. IEEE, (2018)Determinate composition of FMUs for co-simulation., , , , , , and . EMSOFT, page 2:1-2:12. IEEE, (2013)Decentralized Observation of Discrete-Event Systems: At Least One Can Tell., and . IEEE Control. Syst. Lett., (2022)The Refinement Calculus of Reactive Systems Toolset., , and . Int. J. Softw. Tools Technol. Transf., 22 (6): 689-708 (2020)