49 results on '"Yasser Shoukry"'
Search Results
2. DeepBern-Nets: Taming the Complexity of Certifying Neural Networks Using Bernstein Polynomial Activations and Precise Bound Propagation.
3. EnergyShield: Provably-Safe Offloading of Neural Network Controllers for Energy Efficiency.
4. BERN-NN: Tight Bound Propagation For Neural Networks Using Bernstein Polynomial Interval Arithmetic.
5. CertiFair: A Framework for Certified Global Fairness of Neural Networks.
6. Certified Vision-Based State Estimation for Autonomous Landing Systems Using Reachability Analysis.
7. Model Extraction Attacks Against Reinforcement Learning Based Controllers.
8. SEO: Safety-Aware Energy Optimization Framework for Multi-Sensor Neural Controllers at the Edge.
9. NNLander-VeriF: A Neural Network Formal Verification Framework for Vision-Based Autonomous Aircraft Landing.
10. Fast BATLLNN: Fast Box Analysis of Two-Level Lattice Neural Networks.
11. Safe-by-Repair: A Convex Optimization Approach for Repairing Unsafe Two-Level Lattice Neural Network Controllers.
12. NNSynth: Neural Network Guided Abstraction-Based Controller Synthesis for Stochastic Systems.
13. PEREGRiNN: Penalized-Relaxation Greedy Neural Network Verifier.
14. Bounding the Complexity of Formally Verifying Neural Networks: A Geometric Approach.
15. Provably Safe Model-Based Meta Reinforcement Learning: An Abstraction-Based Approach.
16. PolyAR: A Highly Parallelizable Solver For Polynomial Inequality Constraints Using Convex Abstraction Refinement.
17. AReN: assured ReLU NN architecture for model predictive control of LTI systems.
18. Controller Synthesis subject to Logical and Structural Constraints: A Satisfiability Modulo Theories (SMT) Approach.
19. Two-Level Lattice Neural Network Architectures for Control of Nonlinear Systems.
20. Formal verification of neural network controlled autonomous systems.
21. SpyCon: Adaptation Based Spyware in Human-in-the-Loop IoT.
22. DoS-Resilient Multi-Robot Temporal Logic Motion Planning.
23. Internet of Personalized and Autonomous Things (IoPAT): Smart Homes Case Study.
24. Sybil attack resilient traffic networks: a physics-based trust propagation approach.
25. A Delay based Plug-in-Monitor for Intrusion Detection in Controller Area Network.
26. Towards a socially responsible smart city: dynamic resource allocation for smarter community service.
27. SMC: Satisfiability Modulo Convex Optimization.
28. Closed-form controlled invariant sets for pedestrian avoidance.
29. PrOLoc: resilient localization with private observers using partial homomorphic encryption.
30. An SMT-based approach to secure state estimation under sensor and actuator attacks.
31. Linear temporal logic motion planning for teams of underactuated robots using satisfiability modulo convex programming.
32. SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks.
33. Scalable lazy SMT-based motion planning.
34. Privacy-aware quadratic optimization using partially homomorphic encryption.
35. Bio-inspired underwater electrolocation through adaptive system identification.
36. Sound and complete state estimation for linear dynamical systems under sensor attacks using Satisfiability Modulo Theory solving.
37. Secure state estimation: Optimal guarantees against sensor attacks in the presence of noise.
38. PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks.
39. Secure state reconstruction in differentially flat systems under sensor attacks using satisfiability modulo theory solving.
40. Social spring: encounter-based path refinement for indoor tracking systems.
41. ipShield: A Framework For Enforcing Context-Aware Privacy.
42. Event-triggered projected Luenberger observer for linear systems under sparse sensor attacks.
43. Minimax control for cyber-physical systems under network packet scheduling attacks.
44. Graph-based approach for software allocation in automotive networked embedded systems: A partition-and-map algorithm.
45. Non-invasive Spoofing Attacks for Anti-lock Braking Systems.
46. Input-output robustness for discrete systems.
47. Networked embedded generalized predictive controller for an active suspension system.
48. PrOLoc: resilient localization with private observers using partial homomorphic encryption: demo abstract.
49. Embedded software for robotics: challenges and future directions: special session.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.