Publications
Journal Articles
- Y. Wang, H. Sibai, M. Yen, S. Mitra, and G. E. Dullerud, “Differentially private algorithms for statistical verification of cyber-physical systems,” IEEE Open Journal of Control Systems, vol. 1, pp. 294-305, 2022.
- Y. Wang, N. Roohi, M. West, M. Viswanathan, and G. E. Dullerud, “Verifying stochastic hybrid systems with temporal logic specifications via model reduction,” ACM Transactions on Embedded Computing Systems, vol. 20, no. 6, p. 113:1-113:27, 2021.
- Y. Wang, X. Bi, and A. Qu, “A logistic factorization model for recommender systems with multinomial responses,” Journal of Computational and Graphical Statistics, vol. 29, no. 2, pp. 396–404, 2020.
- Y. Wang, M. Zarei, B. Bonakdarpour, and M. Pajic, “Statistical verification of hyperproperties for cyber-physical systems,” ACM Transactions on Embedded Computing Systems, vol. 18, no. 5s, pp. 1–23, 2019.
- Y. Wang, N. Roohi, M. West, M. Viswanathan, and G. E. Dullerud, “Statistical verification of PCTL using antithetic and stratified samples,” Formal Methods in System Design, vol. 54, pp. 145–163, 2019.
- Y. Wang, N. Roohi, G. E. Dullerud, and M. Viswanathan, “Stability analysis of switched linear systems defined by regular languages,” IEEE Transactions on Automatic Control, vol. 62, no. 5, pp. 2568–2575, 2017.
- Y. Wang, Z. Huang, S. Mitra, and G. E. Dullerud, “Differential privacy in linear distributed control systems: entropy minimizing mechanisms and performance tradeoffs,” IEEE Transactions on Control of Network Systems, vol. 4, no. 1, pp. 118–130, 2017.
Conference Proceedings
- Z. Xuan, A. K. Bozkurt, M. Pajic, Y. Wang, “On the Uniqueness of Solution for the Bellman Equation of LTL Objectives,” in Proceedings of Machine Learning Research, 2024.
- M. Yen, G. E. Dullerud, Y. Wang, “Statistical Verification of Traffic Systems with Expected Differential Privacy,” in American Control Conference, 2023, pp. 3496-3501.
- Y. Wang, Q. Gao, and M. Pajic, “Learning monotone dynamics by neural networks,” in American Control Conference, 2022, p. to appear.
- A. Khazraei, S. Hallyburton, Q. Gao, Y. Wang, and M. Pajic, “Learning-based vulnerability analysis of cyber-physical systems,” in ACM/IEEE International Conference on Cyber-Physical Systems, Milan, Italy, 2022, pp. 259–269.
- Y. Wang, M. Zarei, B. Bonakdarpoor, and M. Pajic, “Probabilistic conformance for cyber-physical systems,” in ACM/IEEE 12th International Conference on Cyber-Physical Systems, 2021, pp. 55–66.
- Y. Wang, S. Nalluri, B. Bonakdarpour, and M. Pajic, “Statistical model checking for hyperproperties,” in IEEE Computer Security Foundations Symposium, Dubrovnik, Croatia, 2021, pp. 1–16.
- A. K. Bozkurt, Y. Wang, M. Zavlanos, and M. Pajic, “Model-free reinforcement learning for stochastic games with linear temporal logic objectives,” in IEEE International Conference on Robotics and Automation, 2021, pp. 10649–10655.
- A. K. Bozkurt, Y. Wang, and M. Pajic, “Secure planning against stealthy attacks via model-free reinforcement learning,” in IEEE International Conference on Robotics and Automation, 2021, pp. 10656–10662.
- A. K. Bozkurt, Y. Wang, and M. Pajic, “Model-free learning of safe yet effective controllers,” in IEEE Conference on Decision and Control, 2021, pp. 6560–6565.
- M. Zarei, Y. Wang, and M. Pajic, “Statistical verification of learning-based cyber-physical systems,” in ACM International Conference on Hybrid Systems: Computation and Control, Sydney, Australia, 2020, pp. 1–7.
- Y. Wang, N. Roohi, M. West, M. Viswanathan, and G. E. Dullerud, “Statistically model checking PCTL specifications on Markov decision processes via reinforcement learning,” in IEEE Conference on Decision and Control, 2020, pp. 1392–1397.
- Y. Wang and M. Pajic, “Hyperproperties for robotics: motion planning via HyperLTL,” in IEEE International Conference on Robotics and Automation, Paris, France, 2020, pp. 8462–8468.
- N. Roohi, Y. Wang, M. West, G. E. Dullerud, and M. Viswanathan, “STMC: statistical model checker with stratified and antithetic sampling,” in Computer aided verification, Cham, 2020, pp. 448–460.
- K. H. Kim et al., “Security analysis against spoofing attacks for distributed UAVs,” in Workshop on Decentralized IoT Systems and Security, San Diego, 2020, pp. 1–6.
- M. Elfar, Y. Wang, and M. Pajic, “Context-aware temporal logic for probabilistic systems,” in International Symposium on Automated Technology for Verification and Analysis, Hanoi, Vietnam, 2020, pp. 215–232.
- A. K. Bozkurt, Y. Wang, M. Zavlanos, and M. Pajic, “Control synthesis from linear temporal logic specifications using model-free reinforcement learning,” in IEEE International Conference on Robotics and Automation, Paris, France, 2020, pp. 10349–10355.
- Y. Wang, M. Zarei, B. Bonakdarpour, and M. Pajic, “Statistical verification of hyperproperties for cyber-physical systems,” ACM Transactions on Embedded Computing Systems, vol. 18, no. 5s, pp. 1–23, 2019.
- Y. Wang and M. Pajic, “Supervisory control of discrete event systems in the presence of sensor and actuator attacks,” in IEEE Conference on Decision and Control, Nice, France, 2019, pp. 5350–5355.
- Y. Wang and M. Pajic, “Attack-resilient supervisory control with intermittently secure communication,” in IEEE Conference on Decision and Control, Nice, France, 2019, pp. 2015–2020.
- M. Elfar, Y. Wang, and M. Pajic, “Security-aware synthesis using delayed-action games,” in International Conference on Computer-Aided Verification (CAV), New York, NY, 2019, pp. 180–199.
- Y. Wang, N. Roohi, M. West, M. Viswanathan, and G. E. Dullerud, “Statistical verification of PCTL using stratified samples,” in IFAC Conference on Analysis and Design of Hybrid Systems, IFAC-PapersOnLine, Oxford, UK, 2018, vol. 51, pp. 85–90.
- Y. Wang, S. Mitra, and G. E. Dullerud, “Differential privacy and minimum-variance unbiased estimation in multi-agent control systems,” in IFAC World Congress, IFAC-PapersOnLine, 2017, vol. 50, pp. 9521–9526.
- N. Roohi, Y. Wang, M. West, G. E. Dullerud, and M. Viswanathan, “Statistical verification of the toyota powertrain control verification benchmark,” in ACM International Conference on Hybrid Systems: Computation and Control (HSCC), New York, NY, USA, 2017, pp. 65–70.
- Y. Wang, N. Roohi, M. West, M. Viswanathan, and G. E. Dullerud, “Verifying continuous-time stochastic hybrid systems via Mori-Zwanzig model reduction,” in IEEE Conference on Decision and Control, 2016, pp. 3012–3017.
- Y. Wang, H. Hale Matthew, M. Egerstedt, and G. E. Dullerud, “Differentially private objective functions in distributed cloud-based optimization,” in IEEE Conference on Decision and Control, 2016, pp. 3688–3694.
- Z. Huang, Y. Wang, S. Mitra, and G. E. Dullerud, “Controller synthesis for linear dynamical systems with adversaries,” in ACM Symposium and Bootcamp on the Science of Security, Pittsburgh, PA, 2016, pp. 53–62.
- Y. Wang, N. Roohi, M. West, M. Viswanathan, and G. E. Dullerud, “Statistical verification of dynamical systems using set oriented methods,” in ACM International Conference on Hybrid Systems: Computation and Control, New York, NY, USA, 2015, pp. 169–178.
- Y. Wang, N. Roohi, M. West, M. Viswanathan, and G. E. Dullerud, “A Mori-Zwanzig and MITL based approach to statistical verification of continuous-time dynamical systems,” in IFAC Conference on Analysis and Design of Hybrid Systems, Atlanta, GA, 2015, vol. 48, pp. 267–273.
- Z. Huang, Y. Wang, S. Mitra, G. E. Dullerud, and S. Chaudhuri, “Controller synthesis with inductive proofs for piecewise linear systems: an SMT-based algorithm,” in IEEE Conference on Decision and Control, 2015, pp. 7434–7439.
- Y. Wang, N. Roohi, G. E. Dullerud, and M. Viswanathan, “Stability of linear autonomous systems under regular switching sequences,” in IEEE Conference on Decision and Control, 2014, pp. 5445–5450.
- Y. Wang, Z. Huang, S. Mitra, and G. E. Dullerud, “Entropy-minimizing mechanism for differential privacy of discrete-time linear feedback systems,” in IEEE Conference on Decision and Control, 2014, pp. 2130–2135.
- Z. Huang, Y. Wang, S. Mitra, and G. E. Dullerud, “On the cost of differential privacy in distributed control systems,” in International Conference on High Confidence Networked Systems, 2014, pp. 105–114.