Alexei Lisitsa

Orcid: 0000-0002-3820-643X

Affiliations:
  • University of Liverpool, Department of Computer Science, UK
  • Russian Academy of Science, Program Systems Institute, Pereslavl-Zalessky, Russia (PhD 1997)


According to our database1, Alexei Lisitsa authored at least 119 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Handling of Past and Future with Phenesthe+.
Proceedings of the Fourteenth International Symposium on Games, 2023

Machine learning discovers invariants of braids and flat braids.
CoRR, 2023

Deep Reinforcement Learning for Continuous Control of Material Thickness.
Proceedings of the Artificial Intelligence XL, 2023

Interpreting NMR Spectra by Constraint Solving.
Proceedings of the Artificial Intelligence XL, 2023

On Strong Anti-learning of Parity.
Proceedings of the Optimization, Learning Algorithms and Applications, 2023

Online Transition-Based Feature Generation for Anomaly Detection in Concurrent Data Streams.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Secure Joint Querying Over Federated Graph Databases Utilising SMPC Protocols.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Detecting 2D NMR Signals Using Mask RCNN.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Supervised Learning for Untangling Braids.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

2022
Correction: Parameterized verification of leader/follower systems via first-order temporal logic.
Formal Methods Syst. Des., April, 2022

Data Querying with Ciphertext Policy Attribute Based Encryption.
CoRR, 2022

Can process mining help in anomaly-based intrusion detection?
CoRR, 2022

An application of neural networks to a problem in knot theory and group theory (untangling braids).
CoRR, 2022

Process Mining Algorithm for Online Intrusion Detection System.
CoRR, 2022

Making Sense of Heterogeneous Maritime Data.
Proceedings of the 23rd IEEE International Conference on Mobile Data Management, 2022

Logic Rules Meet Deep Learning: A Novel Approach for Ship Type Classification (Extended Abstract).
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Efficient and Secure Encryption Adjustment for JSON Data.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Zero Update Encryption Adjustment on Encrypted Database Queries.
Proceedings of the Information Systems Security and Privacy, 2022

SMPG: Secure Multi Party Computation on Graph Databases.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Training AI to Recognize Realizable Gauss Diagrams: The Same Instances Confound AI and Human Mathematicians.
Proceedings of the 14th International Conference on Agents and Artificial Intelligence, 2022

Molecular Fragments from Incomplete, Real-life NMR Data: Framework for Spectra Analysis with Constraint Solvers.
Proceedings of the 14th International Conference on Agents and Artificial Intelligence, 2022

Reinforcement learning algorithms for the Untangling of Braids.
Proceedings of the Thirty-Fifth International Florida Artificial Intelligence Research Society Conference, 2022

2021
An Overview of Verification and Validation Challenges for Inspection Robots.
Robotics, 2021

Parameterized verification of leader/follower systems via first-order temporal logic.
Formal Methods Syst. Des., 2021

Circle graphs (chord interlacement graphs) of Gauss diagrams: Descriptions of realizable Gauss diagrams, algorithms, enumeration.
CoRR, 2021

Experimental Mathematics Approach to Gauss Diagrams Realizability.
CoRR, 2021

Untangling Braids with Multi-Agent Q-Learning.
Proceedings of the 23rd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2021

Logic Rules Meet Deep Learning: A Novel Approach for Ship Type Classification.
Proceedings of the Rules and Reasoning - 5th International Joint Conference, 2021

Gauss-Lintel, an Algorithm Suite for Exploring Chord Diagrams.
Proceedings of the Intelligent Computer Mathematics - 14th International Conference, 2021

Representation and Processing of Instantaneous and Durative Temporal Phenomena.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2021

Release-aware In-out Encryption Adjustment in MongoDB Query Processing.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Matrix profile for DDoS attacks detection.
Proceedings of the 16th Conference on Computer Science and Intelligence Systems, 2021

2020
Ontology-based Automation of Penetration Testing.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Release-Aware Encryption Adjustment Query processing for Document Database.
Proceedings of the ICCBDC '20: 2020 4th International Conference on Cloud and Big Data Computing, 2020

2019
Modular Verification of Autonomous Space Robotics.
CoRR, 2019

Agent-based (BDI) modeling for automation of penetration testing.
CoRR, 2019

Analysing Security Protocols Using Scenario Based Simulation.
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2019

Fine-Grained Access Control for Querying Over Encrypted Document-Oriented Database.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Flexible Access Control and Confidentiality over Encrypted Data for Document-based Database.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Investigating the Capability of Agile Processes to Support Medical Devices Regulations: The Case of XP, Scrum, and FDD with EU MDR Regulations.
Proceedings of the Intelligent Computing Methodologies - 15th International Conference, 2019

Minimizing the ambiguities in medical devices regulations based on software requirement engineering techniques.
Proceedings of the Second International Conference on Data Science, 2019

Querying Encrypted Data in Graph Databases.
Proceedings of the Applied Computing to Support Industry: Innovation and Technology, 2019

2018
Revisiting MU-Puzzle. A Case Study in Finite Countermodels Verification.
Proceedings of the Reachability Problems - 12th International Conference, 2018

Poster: Agent-based (BDI) modeling for automation of penetration testing.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Towards Human Readability of Automated Unknottedness Proofs.
Proceedings of the fourth Workshop on Bridging the Gap between Human and Automated Reasoningco-located with the 27th International Joint Conference on Artificial Intelligence and the 23rd European Conference on Artificial Intelligence (IJCAI-ECAI 2018), 2018

The Andrews-Curtis Conjecture, Term Rewriting and First-Order Proofs.
Proceedings of the Mathematical Software - ICMS 2018, 2018

Querying Encrypted Graph Databases.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Penetration Testing for Internet of Things and Its Automation.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Visual Algebraic Proofs for Unknot Detection.
Proceedings of the Diagrammatic Representation and Inference, 2018

Traversal-aware Encryption Adjustment for Graph Databases.
Proceedings of the 7th International Conference on Data Science, 2018

A Re-evaluation of Intrusion Detection Accuracy: Alternative Evaluation Strategy.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Clarification of Ambiguity for the Simple Authentication and Security Layer.
Proceedings of the Abstract State Machines, Alloy, B, TLA, VDM, and Z, 2018

2017
Verification of Programs via Intermediate Interpretation.
Proceedings of the Proceedings Fifth International Workshop on Verification and Program Transformation, 2017

Verifying Programs via Intermediate Interpretation.
CoRR, 2017

Abstract State Machines and System Theoretic Process Analysis for Safety-Critical Systems.
Proceedings of the Formal Methods: Foundations and Applications - 20th Brazilian Symposium, 2017

Automated Reasoning for Knot Semigroups and \pi π -orbifold Groups of Knots.
Proceedings of the Mathematical Aspects of Computer and Information Sciences, 2017

A Prediction Model Based Approach to Open Space Steganography Detection in HTML Webpages.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Attribute Permutation Steganography Detection using Attribute Position Changes Count.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

User-to-User Recommendation using the Concept of Movement Patterns: A Study using a Dating Social Network.
Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2017

On the mining and usage of Movement Patterns in large traffic networks.
Proceedings of the 2017 IEEE International Conference on Big Data and Smart Computing, 2017

2016
Automated verification of programs and Web systems.
J. Log. Algebraic Methods Program., 2016

Practical verification of decision-making in agent-based autonomous systems.
Autom. Softw. Eng., 2016

Mining Frequent Movement Patterns in Large Networks: A Parallel Approach Using Shapes.
Proceedings of the Research and Development in Intelligent Systems XXXIII, 2016

Efficient Knot Discrimination via Quandle Coloring with SAT and #-SAT.
Proceedings of the Mathematical Software - ICMS 2016, 2016

A Statistical Approach to the Detection of HTML Attribute Permutation Steganography.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
First-order logic for safety verification of hedge rewriting systems.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2015

Finite Countermodel Based Verification for Program Transformation (A Case Study).
Proceedings of the Third International Workshop on Verification and Program Transformation, 2015

Computer-aided proof of Erdős discrepancy properties.
Artif. Intell., 2015

A Combinatorial Approach to Knot Recognition.
Proceedings of the Embracing Global Computing in Emerging Economies - First Workshop, 2015

2014
Optimized Neural Incremental Attribute Learning for Classification Based on Statistical discriminability.
Int. J. Comput. Intell. Appl., 2014

A SAT Attack on the Erdős Discrepancy Conjecture.
Proceedings of the Theory and Applications of Satisfiability Testing - SAT 2014, 2014

Detecting Unknots via Equational Reasoning, I: Exploration.
Proceedings of the Intelligent Computer Mathematics - International Conference, 2014

The 'representative' metaheuristic design pattern.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

A Note on Program Specialization. What Syntactical Properties of Residual Programs Can Reveal?
Proceedings of the VPT 2014. Second International Workshop on Verification and Program Transformation, 2014

2013
First-order theorem proving in the exploration of Andrews-Curtis conjecture.
Tiny Trans. Comput. Sci., 2013

Finite Reasons for Safety - Parameterized Verification by Finite Model Finding.
J. Autom. Reason., 2013

Autonomous Asteroid Exploration by Rational Agents.
IEEE Comput. Intell. Mag., 2013

Cryptographic Protocol Verification via Supercompilation (A Case Study).
Proceedings of the First International Workshop on Verification and Program Transformation, 2013

2012
A Note on Program Specialization. What Can Syntactical Properties of Residual Programs Reveal?
CoRR, 2012

Finite Models vs Tree Automata in Safety Verification.
Proceedings of the 23rd International Conference on Rewriting Techniques and Applications (RTA'12) , 2012

2011
Finite countermodels for safety verification of parameterized tree systems
CoRR, 2011

First-order finite satisfiability vs tree automata in safety verification
CoRR, 2011

Temporal Access to the Iteration Sequences: A Unifying Approach to Fixed Point Logics.
Proceedings of the Eighteenth International Symposium on Temporal Representation and Reasoning, 2011

A misuse-based network Intrusion Detection System using Temporal Logic and stream processing.
Proceedings of the 5th International Conference on Network and System Security, 2011

Planarity of Knots, Register Automata and LogSpace Computability.
Proceedings of the Language and Automata Theory and Applications, 2011

2010
On one application of computations with oracle.
Program. Comput. Softw., 2010

Satellite Control Using Rational Agent Programming.
IEEE Intell. Syst., 2010

Finite Model Finding for Parameterized Verification
CoRR, 2010

Declarative Abstractions for Agent Based Hybrid Control Systems.
Proceedings of the Declarative Agent Languages and Technologies VIII, 2010

Finite countermodels as invariants. A case study in verification of parameterized mutual exclusion protocol.
Proceedings of the Second International Workshop on Invariant Generation, 2010

Reachability as Derivability, Finite Countermodels and Verification.
Proceedings of the Automated Technology for Verification and Analysis, 2010

An agent based framework for adaptive control and decision making of autonomous vehicles.
Proceedings of the 10th IFAC International Workshop on the Adaptation and Learning in Control and Signal Processing, 2010

2009
Temporal Verification of Fault-Tolerant Protocols.
Proceedings of the Methods, 2009

On the Computational Power of Querying the History.
Fundam. Informaticae, 2009

Agent Based Approaches to Engineering Autonomous Space Software
Proceedings of the Proceedings FM-09 Workshop on Formal Methods for Aerospace, 2009

On Descriptional Complexity of the Planarity Problem for Gauss Words
CoRR, 2009

Automata on Gauss Words.
Proceedings of the Language and Automata Theory and Applications, 2009

2008
Reachability Analysis in Verification via Supercompilation.
Int. J. Found. Comput. Sci., 2008

A logic with temporally accessible iteration
CoRR, 2008

Practical First-Order Temporal Reasoning.
Proceedings of the 15th International Symposium on Temporal Representation and Reasoning, 2008

2007
Verification as a parameterized testing (experiments with the SCP4 supercompiler).
Program. Comput. Softw., 2007

Efficient First-Order Temporal Logic for Infinite-State Systems
CoRR, 2007

A Note on Specialization of Interpreters.
Proceedings of the Computer Science, 2007

2006
In time alone: on the computational power of querying the history.
Proceedings of the 13th International Symposium on Temporal Representation and Reasoning (TIME 2006), 2006

2005
Practical Infinite-State Verification with Temporal Reasoning.
Proceedings of the Verification of Infinite-State Systems with Applications to Security, 2005

Temporal Logic with Predicate lambda-Abstraction.
Proceedings of the 12th International Symposium on Temporal Representation and Reasoning (TIME 2005), 2005

Towards Verification via Supercompilation.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
Temporal logic with predicate abstraction
CoRR, 2004

Membership and Reachability Problems for Row-Monomial Transformations.
Proceedings of the Mathematical Foundations of Computer Science 2004, 2004

Monodic ASMs and Temporal Verification.
Proceedings of the Abstract State Machines 2004. Advances in Theory and Practice, 2004

2002
Equality and Monodic First-Order Temporal Logic.
Stud Logica, 2002

Searching for Invariants Using Temporal Resolution.
Proceedings of the Logic for Programming, 2002

2000
Generalized vs formula circumscription over finite models.
Proceedings of the International Symposium on Artificial Intelligence and Mathematics, 2000

1999
Linear Ordering on Graphs, Anti-Founded Sets and Polynomial Time Computability.
Theor. Comput. Sci., 1999

1997
Delta-Languages for Sets and LOGSPACE Computable Graph Transformers.
Theor. Comput. Sci., 1997

On Linear Ordering of Strongly Extensional Finitely-Branching Graphs and Non-well-founded Sets.
Proceedings of the Logical Foundations of Computer Science, 4th International Symposium, 1997

Bounded Hyperset Theory and Web-like Data Bases.
Proceedings of the Computational Logic and Proof Theory, 5th Kurt Gödel Colloquium, 1997

1995
Delta-Languages for Sets and sub-PTIME Graphs Transformers.
Proceedings of the Database Theory, 1995

1993
Complexity of Universal Circumscription.
Int. J. Found. Comput. Sci., 1993


  Loading...