Samik Basu

Orcid: 0000-0002-2430-6827

Affiliations:
  • Iowa State University, Department of Computer Science, Ames, USA


According to our database1, Samik Basu authored at least 104 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DisQ: A Markov Decision Process Based Language for Quantum Distributed Systems.
CoRR, 2024

Iterative Counter-Example Guided Robustness Verification for Neural Networks.
Proceedings of the AI Verification - First International Symposium, 2024

Improved Evolutionary Algorithms for Submodular Maximization with Cost Constraints.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Regularized Unconstrained Weakly Submodular Maximization.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

2023
Maximizing submodular functions under submodular constraints.
Proceedings of the Uncertainty in Artificial Intelligence, 2023

Size-constrained k-submodular maximization in near-linear time.
Proceedings of the Uncertainty in Artificial Intelligence, 2023

Representing and Reasoning with Multi-Stakeholder Qualitative Preference Queries.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

2021
Measuring the impact of influence on individuals: roadmap to quantifying attitude.
Soc. Netw. Anal. Min., 2021

Control of Non-Deterministic Systems With $\mu$-Calculus Specifications Using Quotienting.
IEEE CAA J. Autom. Sinica, 2021

Multi-Objective Submodular Optimization with Approximate Oracles and Influence Maximization.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Disrupting Diffusion: Critical Nodes in Network.
Proceedings of the IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2020

2018
Influence Maximization in Social Networks With Non-Target Constraints.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Selecting the minimal set of preferred responses to counter detected intrusions.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

2016
Representing and Reasoning with Qualitative Preferences: Tools and Applications
Synthesis Lectures on Artificial Intelligence and Machine Learning, Morgan & Claypool Publishers, ISBN: 978-3-031-01573-1, 2016

On deciding synchronizability for asynchronously communicating systems.
Theor. Comput. Sci., 2016

Automated Choreography Repair.
Proceedings of the Fundamental Approaches to Software Engineering, 2016

A Cross-Domain Comparable Measurement Framework to Quantify Intrusion Detection Effectiveness.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
CRISNER: A Practically Efficient Reasoner for Qualitative Preferences.
CoRR, 2015

Scalable modeling and analysis of requirements preferences: A qualitative approach using CI-Nets.
Proceedings of the 23rd IEEE International Requirements Engineering Conference, 2015

A Knowledge Based Framework for Case-specific Diagnosis.
Proceedings of the ICAART 2015, 2015

2014
Automatic verification of interactions in asynchronous systems with unbounded buffers.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014

iConSMutate: Concolic Testing of Database Applications Using Existing Database States Guided by SQL Mutants.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

2013
Preference Based Service Adaptation Using Service Substitution.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

SynConSMutate: Concolic Testing of Database Applications via Synthetic Data Guided by SQL Mutants.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

Detecting Cross-Site Scripting Vulnerability Using Concolic Testing.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

Identifying a preferred countermeasure strategy for attack graphs.
Proceedings of the Cyber Security and Information Intelligence, 2013

S-MAIDS: A Semantic Model for Automated Tuning, Correlation, and Response Selection in Intrusion Detection Systems.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Verifying Preferential Equivalence and Subsumption via Model Checking.
Proceedings of the Algorithmic Decision Theory - Third International Conference, 2013

2012
A two-phase approximation for model checking probabilistic unbounded until properties of probabilistic systems.
ACM Trans. Softw. Eng. Methodol., 2012

Towards cost-sensitive assessment of intrusion response selection.
J. Comput. Secur., 2012

Synchronizability for Verification of Asynchronously Communicating Systems.
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2012

Deciding choreography realizability.
Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2012

A Service Composition Framework Based on Goal-Oriented Requirements Engineering, Model Checking, and Qualitative Preference Analysis.
Proceedings of the Service-Oriented Computing - 10th International Conference, 2012

ConSMutate: SQL Mutants for Guiding Concolic Testing of Database Applications.
Proceedings of the Formal Methods and Software Engineering, 2012

Model Checking of Qualitative Sensitivity Preferences to Minimize Credential Disclosure.
Proceedings of the Formal Aspects of Component Software, 9th International Symposium, 2012

Correct-by-construction multi-component SoC design.
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012

2011
Representing and Reasoning with Qualitative Preferences for Compositional Systems.
J. Artif. Intell. Res., 2011

Compositional model checking of software product lines using variation point obligations.
Autom. Softw. Eng., 2011

Choreography conformance via synchronizability.
Proceedings of the 20th International Conference on World Wide Web, 2011

Automating analysis of qualitative preferences in goal-oriented requirements engineering.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

Identifying Optimal Composite Services by Decomposing the Service Composition Problem.
Proceedings of the IEEE International Conference on Web Services, 2011

Identifying Sustainable Designs Using Preferences over Sustainability Attributes.
Proceedings of the Artificial Intelligence and Sustainable Design, 2011

Verifying Intervention Policies to Counter Infection Propagation over Networks: A Model Checking Approach.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

2010
On the symbiosis of specification-based and anomaly-based detection.
Comput. Secur., 2010

Failure Analysis for Composition of Web Services Represented as Labeled Transition Systems.
Proceedings of the Web Services and Formal Methods - 7th International Workshop, 2010

Masquerade Detection in Network Environments.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Analysis & Detection of SQL Injection Vulnerabilities via Automatic Test Case Generation of Programs.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Efficient Dominance Testing for Unconditional Preferences.
Proceedings of the Principles of Knowledge Representation and Reasoning: Proceedings of the Twelfth International Conference, 2010

A bounded statistical approach for model checking of unbounded until properties.
Proceedings of the ASE 2010, 2010

Automata-Based Verification of Security Requirements of Composite Web Services.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

Automating Cut-off for Multi-parameterized Systems.
Proceedings of the Formal Methods and Software Engineering, 2010

Decomposing the Service Composition Problem.
Proceedings of the 8th IEEE European Conference on Web Services (ECOWS 2010), 2010

XIDR: A Dynamic Framework Utilizing Cross-Layer Intrusion Detection for Effective Response Deployment.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Dominance Testing via Model Checking.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

2009
Product-line-based requirements customization for web service compositions.
Proceedings of the Software Product Lines, 13th International Conference, 2009

Behavioral automata composition for automatic topology independent verification of parameterized systems.
Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2009

Cross-Layer Based Anomaly Detection in Wireless Mesh Networks.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

A Framework for Optimal Decentralized Service-Choreography.
Proceedings of the IEEE International Conference on Web Services, 2009

Extending Substitutability in Composite Services by Allowing Asynchronous Communication with Message Buffers.
Proceedings of the ICTAI 2009, 2009

Approximate Model Checking of PCTL Involving Unbounded Path Properties.
Proceedings of the Formal Methods and Software Engineering, 2009

Multi-clock Soc design using protocol conversion.
Proceedings of the Design, Automation and Test in Europe, 2009

A Framework for Cost Sensitive Assessment of Intrusion Response Selection.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Intrusion response cost assessment methodology.
Proceedings of the 2009 ACM Symposium on Information, 2009

Web Service Substitution Based on Preferences Over Non-functional Attributes.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009

2008
MOSCOE: an Approach for Composing Web Services through Iterative Reformulation of Functional Specifications.
Int. J. Artif. Intell. Tools, 2008

SoC Design Approach Using Convertibility Verification.
EURASIP J. Embed. Syst., 2008

A Module Checking Based Converter Synthesis Approach for SoCs.
Proceedings of the 21st International Conference on VLSI Design (VLSI Design 2008), 2008

On Utilizing Qualitative Preferences in Web Service Composition: A CP-net Based Approach.
Proceedings of the 2008 IEEE Congress on Services, Part I, 2008

On Evaluation of Response Cost for Intrusion Response Systems.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

TCP-Compose* - A TCP-Net Based Algorithm for Efficient Composition of Web Services Using Qualitative Preferences.
Proceedings of the Service-Oriented Computing, 2008

Composing Web Services through Automatic Reformulation of Service Specifications.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

Optimum Decentralized Choreography for Web Services Composition.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

2007
Assembling Composite Web Services from Autonomous Components.
Proceedings of the Emerging Artificial Intelligence Applications in Computer Engineering, 2007

Model checking the Java metalocking algorithm.
ACM Trans. Softw. Eng. Methodol., 2007

A taxonomy of intrusion response systems.
Int. J. Inf. Comput. Secur., 2007

A Model Checking Approach to Protocol Conversion.
Proceedings of the International Workshop on Model-driven High-level Programming of Embedded Systems, 2007

Local and On-the-fly Choreography-based Web Service Composition.
Proceedings of the 2007 IEEE / WIC / ACM International Conference on Web Intelligence, 2007

Cost-based Analysis of Multiple Counter-Examples.
Proceedings of the Nineteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2007), 2007

On Context-Specific Substitutability of Web Services.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Automated Choreographer Synthesis for Web Services Composition Using I/O Automata.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Quotient-based control synthesis for partially observed non-deterministic plants with mu-calculus specifications.
Proceedings of the 46th IEEE Conference on Decision and Control, 2007

Specification Synthesis for Monitoring and Analysis of MANET Protocols.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

A Cost-Sensitive Model for Preemptive Intrusion Response Systems.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Compositional analysis for verification of parameterized systems.
Theor. Comput. Sci., 2006

Local Module Checking for CTL Specifications.
Proceedings of the Workshop on Formal Foundations of Embedded Software and Component-Based Software Architectures, 2006

Parameterized Verification of pi-Calculus Systems.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2006

Verification of software via integration of design and implementation.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Selecting and Composing Web Services through Iterative Reformulation of Functional Specifications.
Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), 2006

Modeling Web Services by Iterative Reformulation of Functional and Non-functional Requirements.
Proceedings of the Service-Oriented Computing, 2006

MoSCoE: A Framework for Modeling Web Service Composition and Execution.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

Parallel Web Service Composition in MoSCoE: A Choreography-Based Approach.
Proceedings of the Fourth IEEE European Conference on Web Services (ECOWS 2006), 2006

Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

Quotient-based Control Synthesis for Non-Deterministic Plants with Mu-Calculus Specifications.
Proceedings of the 45th IEEE Conference on Decision and Control, 2006

Finite bisimulation of reactive untimed infinite state systems modeled as automata with variables.
Proceedings of the American Control Conference, 2006

2005
FocusCheck: A Tool for Model Checking and Debugging Sequential C Programs.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2005

Trust Framework for P2P Networks Using Peer-Profile Based Anomaly Technique.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

2004
LASE: Layered Approach for Sensor Security and Efficiency.
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004

Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection.
Proceedings of the Distributed Computing and Internet Technology, 2004

Localizing Program Errors for Cimple Debugging.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2004

2003
Model-carrying code: a practical approach for safe execution of untrusted applications.
Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, 2003

Generation of All Counter-Examples for Push-Down Systems.
Proceedings of the Formal Techniques for Networked and Distributed Systems - FORTE 2003, 23rd IFIP WG 6.1 International Conference, Berlin, Germany, September 29, 2003

2002
Resource-Constrained Model Checking of Recursive Programs.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2002

2001
Local and Symbolic Bisimulation Using Tabled Constraint Logic Programming.
Proceedings of the Logic Programming, 17th International Conference, 2001

2000
Model Checking the Java Meta-Locking Algorithm.
Proceedings of the 7th IEEE International Symposium on Engineering of Computer-Based Systems (ECBS 2000), 2000


  Loading...