Author of the publication

Learning a Behavior Model of Hybrid Systems Through Combining Model-Based Testing and Machine Learning.

, , , , , , , , and . ICTSS, volume 11812 of Lecture Notes in Computer Science, page 3-21. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterization of Rate Region in Interference Channels with Constrained Power., , and . ISIT, page 2441-2445. IEEE, (2007)Safety Synthesis Sans Specification., , , , and . CoRR, (2020)Learning a Behavior Model of Hybrid Systems Through Combining Model-Based Testing and Machine Learning., , , , , , , , and . ICTSS, volume 11812 of Lecture Notes in Computer Science, page 3-21. Springer, (2019)A Systematic Approach to Automotive Security., , , , , , , , , and 1 other author(s). FM, volume 14000 of Lecture Notes in Computer Science, page 598-609. Springer, (2023)Synthesizing Non-Vacuous Systems., , , and . VMCAI, volume 10145 of Lecture Notes in Computer Science, page 55-72. Springer, (2017)Transmit Diversity for LTE PUCCH with Channel Selection., , and . VTC Fall, page 1-5. IEEE, (2011)Iterative interference cancellation for a coded multicarrier frequency-hopping CDMA (MC-FH-CDMA) system., and . WCNC, page 573-578. IEEE, (2003)Rate-Constrained Wireless Networks With Fading Channels: Interference-Limited and Noise-Limited Regimes., and . IEEE Trans. Inf. Theory, 57 (12): 7714-7732 (2011)Star identification based on euclidean distance transform, voronoi tessellation, and k-nearest neighbor classification., , and . IEEE Trans. Aerosp. Electron. Syst., 52 (6): 2940-2949 (2016)Attribute Repair for Threat Prevention., , , , , and . SAFECOMP, volume 14181 of Lecture Notes in Computer Science, page 135-148. Springer, (2023)