Yasser Shoukry

Orcid: 0000-0002-8224-8477

According to our database1, Yasser Shoukry authored at least 72 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BERN-NN-IBF: Enhancing Neural Network Bound Propagation Through Implicit Bernstein Form and Optimized Tensor Operations.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., November, 2024

PolyARBerNN: A Neural Network Guided Solver and Optimizer for Bounded Polynomial Inequalities.
ACM Trans. Embed. Comput. Syst., March, 2024

Neurosymbolic Motion and Task Planning for Linear Temporal Logic Tasks.
IEEE Trans. Robotics, 2024

Passivity Tools for Hybrid Learning Rules in Large Populations.
CoRR, 2024

Rampo: A CEGAR-based Integration of Binary Code Analysis and System Falsification for Cyber-Kinetic Vulnerability Detection.
Proceedings of the 15th ACM/IEEE International Conference on Cyber-Physical Systems, 2024

DeepBern-Nets: Taming the Complexity of Certifying Neural Networks Using Bernstein Polynomial Activations and Precise Bound Propagation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Polynomial-Time Reachability for LTI Systems With Two-Level Lattice Neural Network Controllers.
IEEE Control. Syst. Lett., 2023

EnergyShield: Provably-Safe Offloading of Neural Network Controllers for Energy Efficiency.
Proceedings of the ACM/IEEE 14th International Conference on Cyber-Physical Systems, 2023

BERN-NN: Tight Bound Propagation For Neural Networks Using Bernstein Polynomial Interval Arithmetic.
Proceedings of the 26th ACM International Conference on Hybrid Systems: Computation and Control, 2023

SEO: Safety-Aware Energy Optimization Framework for Multi-Sensor Neural Controllers at the Edge.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

Model Extraction Attacks Against Reinforcement Learning Based Controllers.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

Certified Vision-Based State Estimation for Autonomous Landing Systems Using Reachability Analysis.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

CertiFair: A Framework for Certified Global Fairness of Neural Networks.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
VindiCo: Privacy Safeguard Against Adaptation Based Spyware in Human-in-the-Loop IoT.
CoRR, 2022

NNLander-VeriF: A Neural Network Formal Verification Framework for Vision-Based Autonomous Aircraft Landing.
Proceedings of the NASA Formal Methods - 14th International Symposium, 2022

Fast BATLLNN: Fast Box Analysis of Two-Level Lattice Neural Networks.
Proceedings of the HSCC '22: 25th ACM International Conference on Hybrid Systems: Computation and Control, Milan, Italy, May 4, 2022

NNSynth: Neural Network Guided Abstraction-Based Controller Synthesis for Stochastic Systems.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

Safe-by-Repair: A Convex Optimization Approach for Repairing Unsafe Two-Level Lattice Neural Network Controllers.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

2021
Cloud-Based Quadratic Optimization With Partially Homomorphic Encryption.
IEEE Trans. Autom. Control., 2021

Assured Neural Network Architectures for Control and Identification of Nonlinear Systems.
CoRR, 2021

Provably Correct Training of Neural Network Controllers Using Reachability Analysis.
CoRR, 2021

Provably Safe Model-Based Meta Reinforcement Learning: An Abstraction-Based Approach.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

Bounding the Complexity of Formally Verifying Neural Networks: A Geometric Approach.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

PEREGRiNN: Penalized-Relaxation Greedy Neural Network Verifier.
Proceedings of the Computer Aided Verification - 33rd International Conference, 2021

PolyAR: A Highly Parallelizable Solver For Polynomial Inequality Constraints Using Convex Abstraction Refinement.
Proceedings of the 7th IFAC Conference on Analysis and Design of Hybrid Systems, 2021

2020
Gordian: Formal Reasoning-based Outlier Detection for Secure Localization.
ACM Trans. Cyber Phys. Syst., 2020

Effective Formal Verification of Neural Networks using the Geometry of Linear Regions.
CoRR, 2020

ShieldNN: A Provably Safe NN Filter for Unsafe NN Controllers.
CoRR, 2020

Securing state reconstruction under sensor and actuator attacks: Theory and design.
Autom., 2020

AReN: assured ReLU NN architecture for model predictive control of LTI systems.
Proceedings of the HSCC '20: 23rd ACM International Conference on Hybrid Systems: Computation and Control, 2020

Two-Level Lattice Neural Network Architectures for Control of Nonlinear Systems.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

Controller Synthesis subject to Logical and Structural Constraints: A Satisfiability Modulo Theories (SMT) Approach.
Proceedings of the 2020 American Control Conference, 2020

2019
Securing State Estimation Under Sensor and Actuator Attacks: Theory and Design.
CoRR, 2019

SpyCon: Adaptation Based Spyware in Human-in-the-Loop IoT.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

DoS-Resilient Multi-Robot Temporal Logic Motion Planning.
Proceedings of the International Conference on Robotics and Automation, 2019

Formal verification of neural network controlled autonomous systems.
Proceedings of the 22nd ACM International Conference on Hybrid Systems: Computation and Control, 2019

2018
SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks.
ACM Trans. Cyber Phys. Syst., 2018

SMC: Satisfiability Modulo Convex Programming.
Proc. IEEE, 2018

Internet of Personalized and Autonomous Things (IoPAT): Smart Homes Case Study.
Proceedings of the 1st ACM International Workshop on Smart Cities and Fog Computing, 2018

Sybil attack resilient traffic networks: a physics-based trust propagation approach.
Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems, 2018

Embedded software for robotics: challenges and future directions: special session.
Proceedings of the International Conference on Embedded Software, 2018

A Delay based Plug-in-Monitor for Intrusion Detection in Controller Area Network.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2018

2017
Secure State Estimation Against Sensor Attacks in the Presence of Noise.
IEEE Trans. Control. Netw. Syst., 2017

Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach.
IEEE Trans. Autom. Control., 2017

Towards a socially responsible smart city: dynamic resource allocation for smarter community service.
Proceedings of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments, 2017

PrOLoc: resilient localization with private observers using partial homomorphic encryption.
Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2017

PrOLoc: resilient localization with private observers using partial homomorphic encryption: demo abstract.
Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2017

SMC: Satisfiability Modulo Convex Optimization.
Proceedings of the 20th International Conference on Hybrid Systems: Computation and Control, 2017

An SMT-based approach to secure state estimation under sensor and actuator attacks.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

Linear temporal logic motion planning for teams of underactuated robots using satisfiability modulo convex programming.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

Closed-form controlled invariant sets for pedestrian avoidance.
Proceedings of the 2017 American Control Conference, 2017

2016
Event-Triggered State Observers for Sparse Sensor Noise/Attacks.
IEEE Trans. Autom. Control., 2016

Attack Resilience and Recovery using Physical Challenge Response Authentication for Active Sensors Under Integrity Attacks.
CoRR, 2016

Scalable lazy SMT-based motion planning.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

Privacy-aware quadratic optimization using partially homomorphic encryption.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

2015
Non-invasive Spoofing Attacks for Anti-lock Braking Systems.
IACR Cryptol. ePrint Arch., 2015

A Satisfiability Modulo Theory Approach to Secure State Reconstruction in Differentially Flat Systems Under Sensor Attacks.
CoRR, 2015

Secure state estimation: Optimal guarantees against sensor attacks in the presence of noise.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Secure state reconstruction in differentially flat systems under sensor attacks using satisfiability modulo theory solving.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Bio-inspired underwater electrolocation through adaptive system identification.
Proceedings of the American Control Conference, 2015

Sound and complete state estimation for linear dynamical systems under sensor attacks using Satisfiability Modulo Theory solving.
Proceedings of the American Control Conference, 2015

2014
Secure State Estimation Under Sensor Attacks: A Satisfiability Modulo Theory Approach.
CoRR, 2014

Social spring: encounter-based path refinement for indoor tracking systems.
Proceedings of the 1st ACM Conference on Embedded Systems for Energy-Efficient Buildings, 2014

ipShield: A Framework For Enforcing Context-Aware Privacy.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

Event-triggered projected Luenberger observer for linear systems under sparse sensor attacks.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

2013
An embedded implementation of the Generalized Predictive Control algorithm applied to automotive active suspension systems.
Comput. Electr. Eng., 2013

Minimax control for cyber-physical systems under network packet scheduling attacks.
Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems (part of CPS Week), 2013

Graph-based approach for software allocation in automotive networked embedded systems: A partition-and-map algorithm.
Proceedings of the 2013 Forum on specification and Design Languages, 2013

2012
Input-output robustness for discrete systems.
Proceedings of the 12th International Conference on Embedded Software, 2012

2010
MPC-On-Chip: An Embedded GPC Coprocessor for Automotive Active Suspension Systems.
IEEE Embed. Syst. Lett., 2010

Networked embedded generalized predictive controller for an active suspension system.
Proceedings of the American Control Conference, 2010


  Loading...