Anomaly detection for a water treatment system using unsupervised machine learning J Inoue, Y Yamagata, Y Chen, CM Poskitt, J Sun 2017 IEEE international conference on data mining workshops (ICDMW), 1058-1065, 2017 | 203 | 2017 |
Falsification of cyber-physical systems using deep reinforcement learning T Akazaki, S Liu, Y Yamagata, Y Duan, J Hao International Symposium on Formal Methods, 456-465, 2018 | 56 | 2018 |
Log-based anomaly detection of CPS using a statistical method Y Harada, Y Yamagata, O Mizuno, EH Choi 2017 8th International Workshop on Empirical Software Engineering in …, 2017 | 37 | 2017 |
ARCH-COMP 2019 Category Report: Falsification. G Ernst, P Arcaini, A Donze, G Fainekos, L Mathesen, G Pedrielli, ... ARCH@ CPSIoTWeek, 129-140, 2019 | 34 | 2019 |
Arch-comp 2020 category report: Falsification G Ernst, P Arcaini, I Bennani, A Donze, G Fainekos, G Frehse, L Mathesen, ... EPiC Series in Computing, 2020 | 30 | 2020 |
Falsification of cyber-physical systems using deep reinforcement learning Y Yamagata, S Liu, T Akazaki, Y Duan, J Hao IEEE Transactions on Software Engineering 47 (12), 2823-2840, 2020 | 21 | 2020 |
Model-based testing of stateful apis with modbat C Artho, M Seidl, Q Gros, EH Choi, T Kitamura, A Mori, R Ramler, ... 2015 30th IEEE/ACM International Conference on Automated Software …, 2015 | 14 | 2015 |
Runtime monitoring for concurrent systems Y Yamagata, C Artho, M Hagiya, J Inoue, L Ma, Y Tanabe, M Yamamoto International Conference on Runtime Verification, 386-403, 2016 | 12 | 2016 |
Domain-specific languages with scala C Artho, K Havelund, R Kumar, Y Yamagata International Conference on Formal Engineering Methods, 1-16, 2015 | 12 | 2015 |
Strong normalization of second order symmetric lambda-mu calculus Y Yamagata International Symposium on Theoretical Aspects of Computer Software, 459-467, 2001 | 10 | 2001 |
A formal semantics of extended hierarchical state transition matrices using CSP Y Yamagata, W Kong, A Fukuda, N Van Tang, H Ohsaki, K Taguchi Formal Aspects of Computing 26 (5), 943-962, 2014 | 8 | 2014 |
On accelerating smt-based bounded model checking of hstm designs W Kong, L Liu, Y Yamagata, K Taguchi, H Ohsaki, A Fukuda 2012 19th Asia-Pacific Software Engineering Conference 1, 614-623, 2012 | 8 | 2012 |
Java Pathfinder on Android Devices A Kohan, M Yamamoto, C Artho, Y Yamagata, L Ma, M Hagiya, Y Tanabe ACM SIGSOFT Software Engineering Notes 41 (6), 1-5, 2017 | 6 | 2017 |
Evaluation of a resilience embedded system using probabilistic model-checking L Fang, Y Yamagata, Y Oiwa arXiv preprint arXiv:1405.1703, 2014 | 6 | 2014 |
A sequent calculus for Limit Computable Mathematics S Berardi, Y Yamagata Annals of Pure and Applied Logic 153 (1-3), 111-126, 2008 | 6 | 2008 |
Strong normalization of the second-order symmetric λμ-calculus Y Yamagata Information and Computation 193 (1), 1-20, 2004 | 6 | 2004 |
ARCH-COMP 2021 Category Report: Falsification with Validation of Results. G Ernst, P Arcaini, I Bennani, A Chandratre, A Donzé, G Fainekos, ... ARCH@ ADHS, 133-152, 2021 | 5 | 2021 |
A sequent calculus for 1-backtracking S Berardi, Y Yamagata Technical Report, Turin University, December 2005. http://www. di. unito. it …, 2006 | 5 | 2006 |
With an open mind: How to write good models C Artho, K Hayamizu, R Ramler, Y Yamagata International Workshop on Formal Techniques for Safety-Critical Systems, 3-18, 2013 | 4 | 2013 |
Consistency proof of a fragment of pv with substitution in bounded arithmetic Y Yamagata The Journal of Symbolic Logic 83 (3), 1063-1090, 2018 | 2 | 2018 |