PROGRAM
Days: Wednesday, May 10th Thursday, May 11th Friday, May 12th
Wednesday, May 10th
View this program: with abstractssession overviewtalk overview
09:00-10:00 Session K1: CPS-IoT Keynote 1
09:00 | Convergence Between Model - and Data – driven Design for Cyber-Physical Systems (abstract) |
10:30-12:00 Session 1: Temporal Logic
Chair:
10:30 | Conformal Quantitative Predictive Monitoring of STL Requirements for Stochastic Processes (abstract) |
11:00 | An STL-based Approach to Resilient Control for Cyber-Physical Systems (abstract) |
11:30 | Mixed Integer Linear Programming Approach for Control Synthesis with Weighted Signal Temporal Logic (abstract) |
13:30-15:00 Session 2: Verification and Testing
Chair:
13:30 | Quantitative Verification for Neural Networks using ProbStars (abstract) |
14:00 | Fully-Automated Verification of Linear Systems Using Reachability Analysis with Support Functions (abstract) |
14:30 | Verification of Recurrent Neural Networks with Star Reachability (abstract) |
15:30-17:30 Session PD: Poster and Demo Session
Poster Abstract: Stability Analysis of Planar Probabilistic Piecewise Constant Derivative Systems PRESENTER: Spandan Das |
Poster Abstract: Data-Driven Correct-by-Design Control of Parametric Stochastic Systems PRESENTER: Birgit van Huijgevoort |
Poster Abstract: Reachability and Controlled Invariance for Human Stability during Sit-to-Stand PRESENTER: Daphna Raz |
Poster Abstract: Safety Guaranteed Preference Learning Approach for Autonomous Vehicles PRESENTER: Ruya Karagulle |
Poster Abstract: Sampling-based Approach to Robust STL Synthesis for Complex Systems under Uncertainty PRESENTER: Qi Heng Ho |
Poster Abstract: Convex Scenario Optimisation for ReLU Networks PRESENTER: Manuel Mazo Jr. |
Poster Abstract: Towards Seamless Reactivity of Hybrid Control PRESENTER: Lucas Neves Egidio |
Poster Abstract: A Toolchain for Accelerated Symbolic Control PRESENTER: Rupak Majumdar |
Poster Abstract: Permissiveness for Strategy Adaptation PRESENTER: Ashwani Anand |
Demo Abstract: Analysing CPS Security with Falsification on the Microsoft Flight Simulator PRESENTER: Tanmay Bhaskar Khandait |
Thursday, May 11th
View this program: with abstractssession overviewtalk overview
09:00-10:00 Session K2: CPS-IoT Keynote 2
09:00 | Towards Ambient Intelligence for Healthcare: A CPS Perspective (abstract) |
10:30-12:00 Session 3: Safety, Stability and Robustness
Chair:
10:30 | Safe Self Triggered Control Based on Precomputed Reachability Sequences (abstract) |
11:00 | Characterization of the ordering of path-complete stability certificates with addition-closed templates (abstract) |
11:30 | Lazy Synthesis of Symbolic Output-Feedback Controllers for State-Based Safety Specifications (abstract) |
13:30-14:30 Session 4: HSCC Keynote
Chair:
13:30 | Learning Hybrid Systems for Fun and Profit (abstract) |
15:30-17:30 Session 5: Switched and Stochastic Systems
Chair:
15:30 | Continuity of Thresholded Mode-Switched ODEs and Digital Circuit Delay Models (abstract) |
16:00 | Distributionally Robust Strategy Synthesis for Switched Stochastic Systems (abstract) |
16:30 | Interval Markov Decision Processes with Continuous Action-Spaces (abstract) |
17:00 | SySCoRe: Synthesis via Stochastic Coupling Relations (abstract) |
Friday, May 12th
View this program: with abstractssession overviewtalk overview
09:00-10:00 Session K3: CPS-IoT Keynote 3
09:00 | Efficiently Enabling Rich and Trustworthy Inferences at the Extreme Edge (abstract) |
10:30-12:00 Session 6: Quantitative Analysis, Monitoring and Test Generation
Chair:
10:30 | Pattern Matching and Parameter Identification for Parametric Timed Regular Expressions (abstract) |
11:00 | Exploring Signal Temporal Logic and specification robustness for the analysis of CPS security against stealthy attacks (abstract) |
11:30 | Wordgen : a Time Word Generation Tool (abstract) |
13:30-15:30 Session 7: Verification, Robustness and Approximation
Chair:
13:30 | Reachability Analysis for Linear Systems with Uncertain Parameters using Polynomial Zonotopes (abstract) |
14:00 | Automatic Abstraction Refinement in Neural Network Verification using Sensitivity Analysis (abstract) |
14:30 | BERN-NN: Tight Bound Propagation For Neural Networks Using Bernstein Polynomial Interval Arithmetic (abstract) |
15:00 | Quantitative Robustness Analysis of Sensor Attacks on Cyber-Physical Systems (abstract) |