Lei Bu
Cited by
Cited by
Toward online hybrid systems model checking of cyber-physical systems' time-bounded short-run behavior
L Bu, Q Wang, X Chen, L Wang, T Zhang, J Zhao, X Li
ACM SIGBED Review 8 (2), 7-10, 2011
Systematically debugging IoT control system correctness for building automation
CJM Liang, L Bu, Z Li, J Zhang, S Han, BF Karlsson, D Zhang, F Zhao
Proceedings of the 3rd ACM international conference on systems for energy …, 2016
BACH: Bounded reachability checker for linear hybrid automata
L Bu, Y Li, L Wang, X Li
2008 Formal Methods in Computer-Aided Design, 1-4, 2008
Systematically ensuring the confidence of real-time home automation IoT systems
L Bu, W Xiong, CJM Liang, S Han, D Zhang, S Lin, X Li
ACM Transactions on Cyber-Physical Systems 2 (3), 1-23, 2018
From offline toward real time: A hybrid systems model checking and CPS codesign approach for medical device plug-and-play collaborations
T Li, F Tan, Q Wang, L Bu, JN Cao, X Liu
IEEE Transactions on Parallel and Distributed Systems 25 (3), 642-652, 2013
From offline toward real-time: A hybrid systems model checking and CPS co-design approach for medical device plug-and-play (MDPnP)
T Li, F Tan, Q Wang, L Bu, JN Cao, X Liu
2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 13-22, 2012
Symbolic execution of complex program driven by machine learning based constraint solving
X Li, Y Liang, H Qian, YQ Hu, L Bu, Y Yu, X Chen, X Li
Proceedings of the 31st IEEE/ACM International Conference on Automated …, 2016
BACH 2: Bounded ReachAbility CHecker for compositional linear hybrid systems
L Bu, Y Li, L Wang, X Chen, X Li
2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010 …, 2010
Towards an efficient path-oriented tool for bounded reachability analysis of linear hybrid systems using linear programming
X Li, SJ Aanand, L Bu
Electronic Notes in Theoretical Computer Science 174 (3), 57-70, 2007
Taking care of the discretization problem: A comprehensive study of the discretization problem and a black-box adversarial attack in discrete integer domain
L Bu, Z Zhao, Y Duan, F Song
IEEE Transactions on Dependable and Secure Computing, 2021
Model checking of hybrid systems using shallow synchronization
L Bu, A Cimatti, X Li, S Mover, S Tonetta
International Conference on Formal Methods for Open Object-Based Distributed …, 2010
Scrutinizing privacy policy compliance of virtual personal assistant apps
F Xie, Y Zhang, C Yan, S Li, L Bu, K Chen, Z Huang, G Bai
Proceedings of the 37th IEEE/ACM international conference on automated …, 2022
SAT–LP–IIS joint-directed path-oriented bounded reachability analysis of linear hybrid automata
D Xie, L Bu, J Zhao, X Li
Formal Methods in System Design 45, 42-62, 2014
Path-oriented bounded reachability analysis of composed linear hybrid systems
L Bu, X Li
International Journal on Software Tools for Technology Transfer (STTT) 13 (4 …, 2011
Guaranteeing proper-temporal-embedding safety rules in wireless cps: A hybrid formal modeling approach
F Tan, Y Wang, Q Wang, L Bu, R Zheng, N Suri
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
Identifying privacy weaknesses from multi-party trigger-action integration platforms
K Mahadewa, Y Zhang, G Bai, L Bu, Z Zuo, D Fernando, Z Liang, JS Dong
Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021
Modeling and evaluation of wireless sensor network protocols by stochastic timed automata
F Zhang, L Bu, L Wang, J Zhao, X Chen, T Zhang, X Li
Electronic Notes in Theoretical Computer Science 296, 261-277, 2013
Consistency checking of concurrent models for scenario-based specifications
X Li, J Hu, L Bu, J Zhao, G Zheng
International SDL Forum, 298-312, 2005
Automated generation of ltl specifications for smart home iot using natural language
S Zhang, J Zhai, L Bu, M Chen, L Wang, X Li
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 622-625, 2020
Deriving unbounded reachability proof of linear hybrid automata during bounded checking procedure
D Xie, W Xiong, L Bu, X Li
IEEE Transactions on Computers 66 (3), 416-430, 2016
The system can't perform the operation now. Try again later.
Articles 1–20