default search action
Navid Hashemi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Vidisha Kudalkar, Navid Hashemi, Shilpa Mukhopadhyay, Swapnil Mallick, Christof Budnik, Parinitha Nagaraja, Jyotirmoy V. Deshmukh:
Sampling-Based and Gradient-Based Efficient Scenario Generation. RV 2024: 70-88 - [i18]Navid Hashemi, Bardh Hoxha, Danil V. Prokhorov, Georgios Fainekos, Jyotirmoy Deshmukh:
Scaling Learning based Policy Optimization for Temporal Tasks via Dropout. CoRR abs/2403.15826 (2024) - [i17]Navid Hashemi, Lars Lindemann, Jyotirmoy V. Deshmukh:
Statistical Reachability Analysis of Stochastic Cyber-Physical Systems under Distribution Shift. CoRR abs/2407.11609 (2024) - 2023
- [j2]Navid Hashemi, Justin Ruths:
Codesign for Resilience and Performance. IEEE Trans. Control. Netw. Syst. 10(3): 1387-1399 (2023) - [c14]Navid Hashemi, Xin Qin, Jyotirmoy V. Deshmukh, Georgios Fainekos, Bardh Hoxha, Danil V. Prokhorov, Tomoya Yamaguchi:
Risk-Awareness in Learning Neural Controllers for Temporal Logic Objectives. ACC 2023: 4096-4103 - [c13]Navid Hashemi, Xin Qin, Lars Lindemann, Jyotirmoy V. Deshmukh:
Data-Driven Reachability Analysis of Stochastic Dynamical Systems with Conformal Inference. CDC 2023: 3102-3109 - [c12]Navid Hashemi, Justin Ruths, Jyotirmoy V. Deshmukh:
Convex Optimization-Based Policy Adaptation to Compensate for Distributional Shifts. CDC 2023: 5376-5383 - [c11]Xin Qin, Navid Hashemi, Lars Lindemann, Jyotirmoy V. Deshmukh:
Conformance Testing for Stochastic Cyber-Physical Systems. FMCAD 2023: 294-305 - [c10]Navid Hashemi, Bardh Hoxha, Tomoya Yamaguchi, Danil V. Prokhorov, Georgios Fainekos, Jyotirmoy Deshmukh:
A Neurosymbolic Approach to the Verification of Temporal Logic Properties of Learning-enabled Control Systems. ICCPS 2023: 98-109 - [i16]Navid Hashemi, Bardh Hoxha, Tomoya Yamaguchi, Danil V. Prokhorov, Georgios Fainekos, Jyotirmoy Deshmukh:
A Neurosymbolic Approach to the Verification of Temporal Logic Properties of Learning enabled Control Systems. CoRR abs/2303.05394 (2023) - [i15]Navid Hashemi, Justin Ruths, Jyotirmoy V. Deshmukh:
Convex Optimization-based Policy Adaptation to Compensate for Distributional Shifts. CoRR abs/2304.02324 (2023) - [i14]Xin Qin, Navid Hashemi, Lars Lindemann, Jyotirmoy V. Deshmukh:
Conformance Testing for Stochastic Cyber-Physical Systems. CoRR abs/2308.06474 (2023) - [i13]Navid Hashemi, Xin Qin, Lars Lindemann, Jyotirmoy V. Deshmukh:
Data-Driven Reachability Analysis of Stochastic Dynamical Systems with Conformal Inference. CoRR abs/2309.09187 (2023) - 2022
- [j1]Venkatraman Renganathan, Navid Hashemi, Justin Ruths, Tyler H. Summers:
Higher-Order Moment-Based Anomaly Detection. IEEE Control. Syst. Lett. 6: 211-216 (2022) - [c9]David Umsonst, Navid Hashemi, Henrik Sandberg, Justin Ruths:
Practical Detectors to Identify Worst-Case Attacks. CCTA 2022: 197-204 - [i12]Navid Hashemi, Xin Qin, Jyotirmoy V. Deshmukh, Georgios Fainekos, Bardh Hoxha, Danil V. Prokhorov, Tomoya Yamaguchi:
Risk-Awareness in Learning Neural Controllers for Temporal Logic Objectives. CoRR abs/2210.07439 (2022) - 2021
- [c8]Navid Hashemi, Mahyar Fazlyab, Justin Ruths:
Performance Bounds for Neural Network Estimators: Applications in Fault Detection. ACC 2021: 3260-3266 - [c7]Navid Hashemi, Justin Ruths, Mahyar Fazlyab:
Certifying Incremental Quadratic Constraints for Neural Networks via Convex Optimization. L4DC 2021: 842-853 - [i11]Navid Hashemi, Mahyar Fazlyab, Justin Ruths:
Performance Bounds for Neural Network Estimators: Applications in Fault Detection. CoRR abs/2103.12141 (2021) - [i10]Navid Hashemi, Justin Ruths:
Generalized Outer Bounds on the Finite Geometric Sum of Ellipsoids. CoRR abs/2107.08912 (2021) - 2020
- [c6]Venkatraman Renganathan, Navid Hashemi, Justin Ruths, Tyler H. Summers:
Distributionally Robust Tuning of Anomaly Detectors in Cyber-Physical Systems with Stealthy Attacks. ACC 2020: 1247-1252 - [c5]Navid Hashemi, Justin Ruths:
Gain Design via LMIs to Minimize the Impact of Stealthy Attacks. ACC 2020: 1274-1279 - [i9]Navid Hashemi, Justin Ruths:
Co-design for Security and Performance: Geometric Tools. CoRR abs/2006.08739 (2020) - [i8]Babak Sakhaei, Mohammad Durali, Navid Hashemi:
Vibration transfer path analysis and path ranking for NVH optimization of a vehicle interior. CoRR abs/2006.12368 (2020) - [i7]Venkatraman Renganathan, Navid Hashemi, Justin Ruths, Tyler H. Summers:
Higher-Order Moment-Based Anomaly Detection. CoRR abs/2011.01522 (2020) - [i6]Navid Hashemi, Justin Ruths, Mahyar Fazlyab:
Certifying Incremental Quadratic Constraints for Neural Networks via Convex Optimization. CoRR abs/2012.05981 (2020)
2010 – 2019
- 2019
- [c4]Navid Hashemi, Justin Ruths:
Generalized chi-squared detector for LTI systems with non-Gaussian noise. ACC 2019: 404-410 - [c3]Navid Hashemi, Eduardo Verdugo German, Jonatan Pena Ramirez, Justin Ruths:
Filtering Approaches for Dealing with Noise in Anomaly Detection. CDC 2019: 5356-5361 - [i5]Navid Hashemi, Justin Ruths:
Generalized chi-squared detector for LTI systems with non-Gaussian noise. CoRR abs/1909.01469 (2019) - [i4]Navid Hashemi, Eduardo Verdugo German, Jonatan Pena Ramirez, Justin Ruths:
Filtering Approaches for Dealing with Noise in Anomaly Detection. CoRR abs/1909.01477 (2019) - [i3]Navid Hashemi, Justin Ruths:
Gain Design via LMIs to Minimize the Impact of Stealthy Attacks. CoRR abs/1909.12452 (2019) - [i2]Venkatraman Renganathan, Navid Hashemi, Justin Ruths, Tyler H. Summers:
Distributionally Robust Tuning of Anomaly Detectors in Cyber-Physical Systems with Stealthy Attacks. CoRR abs/1909.12506 (2019) - 2018
- [c2]Navid Hashemi, Carlos Murguia, Justin Ruths:
A Comparison of Stealthy Sensor Attacks on Control Systems. ACC 2018: 973-979 - [c1]Sahand Hadizadeh Kafash, Navid Hashemi, Carlos Murguia, Justin Ruths:
Constraining Attackers and Enabling Operators via Actuation Limits. CDC 2018: 4535-4540 - 2017
- [i1]Navid Hashemi, Carlos Murguia, Justin Ruths:
A Comparison of Stealthy Sensor Attacks on Control Systems. CoRR abs/1710.02597 (2017)
Coauthor Index
aka: Jyotirmoy Deshmukh
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint