Publications

Publications

Journal Articles

  1. Y. Wang, H. Sibai, M. Yen, S. Mitra, and G. E. Dullerud, “Differentially private algorithms for statistical verification of cyber-physical systems,” IEEE Open Journal of Control Systems, vol. 1, pp. 294-305, 2022.
  2. Y. Wang, N. Roohi, M. West, M. Viswanathan, and G. E. Dullerud, “Verifying stochastic hybrid systems with temporal logic specifications via model reduction,” ACM Transactions on Embedded Computing Systems, vol. 20, no. 6, p. 113:1-113:27, 2021.
  3. Y. Wang, X. Bi, and A. Qu, “A logistic factorization model for recommender systems with multinomial responses,” Journal of Computational and Graphical Statistics, vol. 29, no. 2, pp. 396–404, 2020.
  4. Y. Wang, M. Zarei, B. Bonakdarpour, and M. Pajic, “Statistical verification of hyperproperties for cyber-physical systems,” ACM Transactions on Embedded Computing Systems, vol. 18, no. 5s, pp. 1–23, 2019.
  5. Y. Wang, N. Roohi, M. West, M. Viswanathan, and G. E. Dullerud, “Statistical verification of PCTL using antithetic and stratified samples,” Formal Methods in System Design, vol. 54, pp. 145–163, 2019.
  6. Y. Wang, N. Roohi, G. E. Dullerud, and M. Viswanathan, “Stability analysis of switched linear systems defined by regular languages,” IEEE Transactions on Automatic Control, vol. 62, no. 5, pp. 2568–2575, 2017.
  7. Y. Wang, Z. Huang, S. Mitra, and G. E. Dullerud, “Differential privacy in linear distributed control systems: entropy minimizing mechanisms and performance tradeoffs,” IEEE Transactions on Control of Network Systems, vol. 4, no. 1, pp. 118–130, 2017.
 

Conference Proceedings

  1. Z. Xuan, A. K. Bozkurt, M. Pajic, Y. Wang, “On the Uniqueness of Solution for the Bellman Equation of LTL Objectives,” in Proceedings of Machine Learning Research, 2024.
  2. M. Yen, G. E. Dullerud, Y. Wang, “Statistical Verification of Traffic Systems with Expected Differential Privacy,” in American Control Conference, 2023, pp. 3496-3501.
  3. Y. Wang, Q. Gao, and M. Pajic, “Learning monotone dynamics by neural networks,” in American Control Conference, 2022, p. to appear.
  4. A. Khazraei, S. Hallyburton, Q. Gao, Y. Wang, and M. Pajic, “Learning-based vulnerability analysis of cyber-physical systems,” in ACM/IEEE International Conference on Cyber-Physical Systems, Milan, Italy, 2022, pp. 259–269.
  5. Y. Wang, M. Zarei, B. Bonakdarpoor, and M. Pajic, “Probabilistic conformance for cyber-physical systems,” in ACM/IEEE 12th International Conference on Cyber-Physical Systems, 2021, pp. 55–66.
  6. Y. Wang, S. Nalluri, B. Bonakdarpour, and M. Pajic, “Statistical model checking for hyperproperties,” in IEEE Computer Security Foundations Symposium, Dubrovnik, Croatia, 2021, pp. 1–16.
  7. A. K. Bozkurt, Y. Wang, M. Zavlanos, and M. Pajic, “Model-free reinforcement learning for stochastic games with linear temporal logic objectives,” in IEEE International Conference on Robotics and Automation, 2021, pp. 10649–10655.
  8. A. K. Bozkurt, Y. Wang, and M. Pajic, “Secure planning against stealthy attacks via model-free reinforcement learning,” in IEEE International Conference on Robotics and Automation, 2021, pp. 10656–10662.
  9. A. K. Bozkurt, Y. Wang, and M. Pajic, “Model-free learning of safe yet effective controllers,” in IEEE Conference on Decision and Control, 2021, pp. 6560–6565.
  10. M. Zarei, Y. Wang, and M. Pajic, “Statistical verification of learning-based cyber-physical systems,” in ACM International Conference on Hybrid Systems: Computation and Control, Sydney, Australia, 2020, pp. 1–7.
  11. Y. Wang, N. Roohi, M. West, M. Viswanathan, and G. E. Dullerud, “Statistically model checking PCTL specifications on Markov decision processes via reinforcement learning,” in IEEE Conference on Decision and Control, 2020, pp. 1392–1397.
  12. Y. Wang and M. Pajic, “Hyperproperties for robotics: motion planning via HyperLTL,” in IEEE International Conference on Robotics and Automation, Paris, France, 2020, pp. 8462–8468.
  13. N. Roohi, Y. Wang, M. West, G. E. Dullerud, and M. Viswanathan, “STMC: statistical model checker with stratified and antithetic sampling,” in Computer aided verification, Cham, 2020, pp. 448–460.
  14. K. H. Kim et al., “Security analysis against spoofing attacks for distributed UAVs,” in Workshop on Decentralized IoT Systems and Security, San Diego, 2020, pp. 1–6.
  15. M. Elfar, Y. Wang, and M. Pajic, “Context-aware temporal logic for probabilistic systems,” in International Symposium on Automated Technology for Verification and Analysis, Hanoi, Vietnam, 2020, pp. 215–232.
  16. A. K. Bozkurt, Y. Wang, M. Zavlanos, and M. Pajic, “Control synthesis from linear temporal logic specifications using model-free reinforcement learning,” in IEEE International Conference on Robotics and Automation, Paris, France, 2020, pp. 10349–10355.
  17. Y. Wang, M. Zarei, B. Bonakdarpour, and M. Pajic, “Statistical verification of hyperproperties for cyber-physical systems,” ACM Transactions on Embedded Computing Systems, vol. 18, no. 5s, pp. 1–23, 2019.
  18. Y. Wang and M. Pajic, “Supervisory control of discrete event systems in the presence of sensor and actuator attacks,” in IEEE Conference on Decision and Control, Nice, France, 2019, pp. 5350–5355.
  19. Y. Wang and M. Pajic, “Attack-resilient supervisory control with intermittently secure communication,” in IEEE Conference on Decision and Control, Nice, France, 2019, pp. 2015–2020.
  20. M. Elfar, Y. Wang, and M. Pajic, “Security-aware synthesis using delayed-action games,” in International Conference on Computer-Aided Verification (CAV), New York, NY, 2019, pp. 180–199.
  21. Y. Wang, N. Roohi, M. West, M. Viswanathan, and G. E. Dullerud, “Statistical verification of PCTL using stratified samples,” in IFAC Conference on Analysis and Design of Hybrid Systems, IFAC-PapersOnLine, Oxford, UK, 2018, vol. 51, pp. 85–90.
  22. Y. Wang, S. Mitra, and G. E. Dullerud, “Differential privacy and minimum-variance unbiased estimation in multi-agent control systems,” in IFAC World Congress, IFAC-PapersOnLine, 2017, vol. 50, pp. 9521–9526.
  23. N. Roohi, Y. Wang, M. West, G. E. Dullerud, and M. Viswanathan, “Statistical verification of the toyota powertrain control verification benchmark,” in ACM International Conference on Hybrid Systems: Computation and Control (HSCC), New York, NY, USA, 2017, pp. 65–70.
  24. Y. Wang, N. Roohi, M. West, M. Viswanathan, and G. E. Dullerud, “Verifying continuous-time stochastic hybrid systems via Mori-Zwanzig model reduction,” in IEEE Conference on Decision and Control, 2016, pp. 3012–3017.
  25. Y. Wang, H. Hale Matthew, M. Egerstedt, and G. E. Dullerud, “Differentially private objective functions in distributed cloud-based optimization,” in IEEE Conference on Decision and Control, 2016, pp. 3688–3694.
  26. Z. Huang, Y. Wang, S. Mitra, and G. E. Dullerud, “Controller synthesis for linear dynamical systems with adversaries,” in ACM Symposium and Bootcamp on the Science of Security, Pittsburgh, PA, 2016, pp. 53–62.
  27. Y. Wang, N. Roohi, M. West, M. Viswanathan, and G. E. Dullerud, “Statistical verification of dynamical systems using set oriented methods,” in ACM International Conference on Hybrid Systems: Computation and Control, New York, NY, USA, 2015, pp. 169–178.
  28. Y. Wang, N. Roohi, M. West, M. Viswanathan, and G. E. Dullerud, “A Mori-Zwanzig and MITL based approach to statistical verification of continuous-time dynamical systems,” in IFAC Conference on Analysis and Design of Hybrid Systems, Atlanta, GA, 2015, vol. 48, pp. 267–273.
  29. Z. Huang, Y. Wang, S. Mitra, G. E. Dullerud, and S. Chaudhuri, “Controller synthesis with inductive proofs for piecewise linear systems: an SMT-based algorithm,” in IEEE Conference on Decision and Control, 2015, pp. 7434–7439.
  30. Y. Wang, N. Roohi, G. E. Dullerud, and M. Viswanathan, “Stability of linear autonomous systems under regular switching sequences,” in IEEE Conference on Decision and Control, 2014, pp. 5445–5450.
  31. Y. Wang, Z. Huang, S. Mitra, and G. E. Dullerud, “Entropy-minimizing mechanism for differential privacy of discrete-time linear feedback systems,” in IEEE Conference on Decision and Control, 2014, pp. 2130–2135.
  32. Z. Huang, Y. Wang, S. Mitra, and G. E. Dullerud, “On the cost of differential privacy in distributed control systems,” in International Conference on High Confidence Networked Systems, 2014, pp. 105–114.