Wenchao Li

Affiliations:
  • Boston University, Department of Electrical and Computer Engineering, MA, USA
  • SRI International, Menlo Park, CA, USA (former)
  • University of California at Berkeley, CA, USA (former, PhD 2013)


According to our database1, Wenchao Li authored at least 71 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
POLAR-Express: Efficient and Precise Formal Reachability Analysis of Neural-Network Controlled Systems.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., March, 2024

Reinforcement Learning-based Receding Horizon Control using Adaptive Control Barrier Functions for Safety-Critical Systems.
CoRR, 2024

Temporal Logic Specification-Conditioned Decision Transformer for Offline Safe Reinforcement Learning.
CoRR, 2024

Secure Control of Connected and Automated Vehicles Using Trust-Aware Robust Event-Triggered Control Barrier Functions.
CoRR, 2024

REGLO: Provable Neural Network Repair for Global Robustness Properties.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
OVLA: Neural Network Ownership Verification using Latent Watermarks.
CoRR, 2023

PAGAR: Imitation Learning with Protagonist Antagonist Guided Adversarial Reward.
CoRR, 2023

POLAR-Express: Efficient and Precise Formal Reachability Analysis of Neural-Network Controlled Systems.
CoRR, 2023

Merging Control in Mixed Traffic with Safety Guarantees: A Safe Sequencing Policy with Optimal Motion Control.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

Trust-Aware Resilient Control and Coordination of Connected and Automated Vehicles.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

Dormant Neural Trojans.
Proceedings of the International Conference on Machine Learning and Applications, 2023

Optimal Control of Connected Automated Vehicles with Event-Triggered Control Barrier Functions: a Test Bed for Safe Optimal Merging.
Proceedings of the IEEE Conference on Control Technology and Applications, 2023

HoLA Robots: Mitigating Plan-Deviation Attacks in Multi-Robot Systems with Co-Observations and Horizon-Limiting Announcements.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

Byzantine Resilience at Swarm Scale: A Decentralized Blocklist Protocol from Inter-robot Accusations.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

Verification and Design of Robust and Safe Neural Network-enabled Autonomous Systems.
Proceedings of the 59th Annual Allerton Conference on Communication, 2023

2022
A Tool for Neural Network Global Robustness Certification and Training.
CoRR, 2022

A Hierarchical Bayesian Approach to Inverse Reinforcement Learning with Symbolic Reward Machines.
Proceedings of the International Conference on Machine Learning, 2022

DRIBO: Robust Deep Reinforcement Learning via Multi-View Information Bottleneck.
Proceedings of the International Conference on Machine Learning, 2022

Sound and Complete Neural Network Repair with Minimality and Locality Guarantees.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Opportunistic Communication with Latency Guarantees for Intermittently-Powered Devices.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022

POLAR: A Polynomial Arithmetic Framework for Verifying Neural-Network Controlled Systems.
Proceedings of the Automated Technology for Verification and Analysis, 2022

Programmatic Reward Design by Example.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Cross-Layer Adaptation with Safety-Assured Proactive Task Job Skipping.
ACM Trans. Embed. Comput. Syst., 2021

Online Defense of Trojaned Models using Misattributions.
CoRR, 2021

Robust Deep Reinforcement Learning via Multi-View Information Bottleneck.
CoRR, 2021

MISA: Online Defense of Trojaned Models using Misattributions.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

Adversarial Training and Provable Robustness: A Tale of Two Objectives.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Divide and Slide: Layer-Wise Refinement for Output Range Analysis of Deep Neural Networks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

Runtime-Safety-Guided Policy Repair.
Proceedings of the Runtime Verification - 20th International Conference, 2020

Know the Unknowns: Addressing Disturbances and Uncertainties in Autonomous Systems : Invited Paper.
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2020

Application-Aware Scheduling of Networked Applications over the Low-Power Wireless Bus.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

TrojDRL: Evaluation of Backdoor Attacks on Deep Reinforcement Learning.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

Opportunistic Intermittent Control with Safety Guarantees for Autonomous Systems.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

ReachNN*: A Tool for Reachability Analysis of Neural-Network Controlled Systems.
Proceedings of the Automated Technology for Verification and Analysis, 2020

2019
ReachNN: Reachability Analysis of Neural-Network Controlled Systems.
ACM Trans. Embed. Comput. Syst., 2019

TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents.
CoRR, 2019

Safety-Guided Deep Reinforcement Learning via Online Gaussian Process Estimation.
CoRR, 2019

Resilience of Multi-robot Systems to Physical Masquerade Attacks.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Towards Verification-Aware Knowledge Distillation for Neural-Network Controlled Systems: Invited Paper.
Proceedings of the International Conference on Computer-Aided Design, 2019

Formal verification of weakly-hard systems.
Proceedings of the 22nd ACM International Conference on Hybrid Systems: Computation and Control, 2019

Exploring weakly-hard paradigm for networked systems.
Proceedings of the Workshop on Design Automation for CPS and IoT, 2019

Masquerade Attack Detection Through Observation Planning for Multi-Robot Systems.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

2018
Guest Editorial: Special Issue on (Industrial) Internet-of-Things for Smart and Sensing Systems: Issues, Trends, and Applications.
IEEE Internet Things J., 2018

Safety-Aware Apprenticeship Learning.
Proceedings of the Computer Aided Verification - 30th International Conference, 2018

2017
Design Automation of Cyber-Physical Systems: Challenges, Advances, and Opportunities.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2017

Delay-Aware Design, Analysis and Verification of Intelligent Intersection Management.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Extensibility-Driven Automotive In-Vehicle Architecture Design: Invited.
Proceedings of the 54th Annual Design Automation Conference, 2017

2016
ARSENAL: Automatic Requirements Specification Extraction from Natural Language.
Proceedings of the NASA Formal Methods - 8th International Symposium, 2016

Contract-Based Verification of Complex Time-Dependent Behaviors in Avionic Systems.
Proceedings of the NASA Formal Methods - 8th International Symposium, 2016

Detecting Similar Programs via The Weisfeiler-Leman Graph Kernel.
Proceedings of the Software Reuse: Bridging with Social-Awareness, 2016

Analysis of production data manipulation attacks in petroleum cyber-physical systems.
Proceedings of the 35th International Conference on Computer-Aided Design, 2016

2015
Design and verification of multi-rate distributed systems.
Proceedings of the 13. ACM/IEEE International Conference on Formal Methods and Models for Codesign, 2015

Design and verification for transportation system security.
Proceedings of the 52nd Annual Design Automation Conference, 2015

2014
Reverse Engineering Digital Circuits Using Structural and Functional Analyses.
IEEE Trans. Emerg. Top. Comput., 2014

Automatically Extracting Requirements Specifications from Natural Language.
CoRR, 2014

Synthesis for Human-in-the-Loop Control Systems.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2014

Data-Driven Probabilistic Modeling and Verification of Human Driver Behavior.
Proceedings of the 2014 AAAI Spring Symposia, 2014

2013
Specification Mining: New Formalisms, Algorithms and Applications.
PhD thesis, 2013

WordRev: Finding word-level structures in a sea of bit-level gates.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013

Polynomial-Time Verification of PCTL Properties of MDPs with Convex Uncertainties.
Proceedings of the Computer Aided Verification - 25th International Conference, 2013

2012
Sparse Coding for Specification Mining and Error Localization.
Proceedings of the Runtime Verification, Third International Conference, 2012

Reverse engineering circuits using behavioral pattern mining.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012

CrowdMine: towards crowdsourced human-assisted verification.
Proceedings of the 49th Annual Design Automation Conference 2012, 2012

2011
Mining assumptions for synthesis.
Proceedings of the 9th IEEE/ACM International Conference on Formal Methods and Models for Codesign, 2011

2010
Scalable specification mining for verification and diagnosis.
Proceedings of the 47th Design Automation Conference, 2010

2009
Localizing transient faults using dynamic bayesian networks.
Proceedings of the IEEE International High Level Design Validation and Test Workshop, 2009

Optimizations of an application-level protocol for enhanced dependability in FlexRay.
Proceedings of the Design, Automation and Test in Europe, 2009

Design as you see FIT: System-level soft error analysis of sequential circuits.
Proceedings of the Design, Automation and Test in Europe, 2009

2008
A Theory of Mutations with Applications to Vacuity, Coverage, and Fault Tolerance.
Proceedings of the Formal Methods in Computer-Aided Design, 2008

2007
Verification-guided soft error resilience.
Proceedings of the 2007 Design, Automation and Test in Europe Conference and Exposition, 2007

Physical Activity Monitoring for Assisted Living at Home.
Proceedings of the 4th International Workshop on Wearable and Implantable Body Sensor Networks, 2007


  Loading...