default search action
Si Liu 0003
Person information
- affiliation: ETH Zürich, Switzerland
- affiliation (former): University of Illinois at Urbana-Champaign, Department of Computer Science, IL, USA
Other persons with the same name
- Si Liu — disambiguation page
- Si Liu 0001 — Beihang University, School of Computer Science and Engineering, Beijing Key Laboratory of Digital Media, China (and 3 more)
- Si Liu 0002 — University of New South Wales, Canberra, Australia
- Si Liu 0004 — Tianjin University of Technology, Key Lab of Intelligent Computing and Novel Software Technology, Ministry of Education, Tianjin, China
- Si Liu 0005 — Michigan Technological University, Department of Mechanical Engineering and Engineering Mechanics, Houghton, MI, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Si Liu, Luca Multazzu, Hengfeng Wei, David A. Basin:
NOC-NOC: Towards Performance-optimal Distributed Transactions. Proc. ACM Manag. Data 2(1): 9:1-9:25 (2024) - [j8]Long Gu, Si Liu, Tiancheng Xing, Hengfeng Wei, Yuxing Chen, David A. Basin:
IsoVista: Black-box Checking Database Isolation Guarantees. Proc. VLDB Endow. 17(12): 4325-4328 (2024) - [c30]Dapeng Zhi, Peixin Wang, Si Liu, C.-H. Luke Ong, Min Zhang:
Unifying Qualitative and Quantitative Safety Verification of DNN-Controlled Systems. CAV (2) 2024: 401-426 - [c29]Huayi Duan, Marco Bearzi, Jodok Vieli, David A. Basin, Adrian Perrig, Si Liu, Bernhard Tellenbach:
CAMP: Compositional Amplification Attacks against DNS. USENIX Security Symposium 2024 - [c28]Jiaxu Tian, Dapeng Zhi, Si Liu, Peixin Wang, Guy Katz, Min Zhang:
Taming Reachability Analysis of DNN-Controlled Systems via Abstraction-Based Training. VMCAI (2) 2024: 73-97 - [i7]Dapeng Zhi, Peixin Wang, Si Liu, Luke Ong, Min Zhang:
Unifying Qualitative and Quantitative Safety Verification of DNN-Controlled Systems. CoRR abs/2404.01769 (2024) - 2023
- [j7]Kaile Huang, Si Liu, Zhenge Chen, Hengfeng Wei, David A. Basin, Haixiang Li, Anqun Pan:
Efficient Black-box Checking of Snapshot Isolation in Databases. Proc. VLDB Endow. 16(6): 1264-1276 (2023) - [c27]Zhaodi Zhang, Zhiyi Xue, Yang Chen, Si Liu, Yueling Zhang, Jing Liu, Min Zhang:
Boosting Verified Training for Robust Image Classifications via Abstraction. CVPR 2023: 16251-16260 - [c26]Zhiyi Xue, Si Liu, Zhaodi Zhang, Yiting Wu, Min Zhang:
A Tale of Two Approximations: Tightening Over-Approximation for DNN Robustness Verification via Under-Approximation. ISSTA 2023: 1182-1194 - [c25]Jiaxu Tian, Dapeng Zhi, Si Liu, Peixin Wang, Cheng Chen, Min Zhang:
Boosting Verification of Deep Reinforcement Learning via Piece-Wise Linear Decision Neural Networks. NeurIPS 2023 - [c24]Huayi Duan, Rubén Fischer, Jie Lou, Si Liu, David A. Basin, Adrian Perrig:
RHINE: Robust and High-performance Internet Naming with E2E Authenticity. NSDI 2023: 531-553 - [c23]Si Liu, Huayi Duan, Lukas Heimes, Marco Bearzi, Jodok Vieli, David A. Basin, Adrian Perrig:
A Formal Framework for End-to-End DNS Resolution. SIGCOMM 2023: 932-949 - [i6]Kaile Huang, Si Liu, Zhenge Chen, Hengfeng Wei, David A. Basin, Haixiang Li, Anqun Pan:
Efficient Black-box Checking of Snapshot Isolation in Databases. CoRR abs/2301.07313 (2023) - [i5]Zhaodi Zhang, Zhiyi Xue, Yang Chen, Si Liu, Yueling Zhang, Jing Liu, Min Zhang:
Boosting Verified Training for Robust Image Classifications via Abstraction. CoRR abs/2303.11552 (2023) - [i4]Zhiyi Xue, Si Liu, Zhaodi Zhang, Yiting Wu, Min Zhang:
A Tale of Two Approximations: Tightening Over-Approximation for DNN Robustness Verification via Under-Approximation. CoRR abs/2305.16998 (2023) - 2022
- [j6]Si Liu, José Meseguer, Peter Csaba Ölveczky, Min Zhang, David A. Basin:
Bridging the semantic gap between qualitative and quantitative models of distributed systems. Proc. ACM Program. Lang. 6(OOPSLA2): 315-344 (2022) - [j5]Si Liu:
All in One: Design, Verification, and Implementation of SNOW-optimal Read Atomic Transactions. ACM Trans. Softw. Eng. Methodol. 31(3): 43:1-43:44 (2022) - [c22]Thilo Weghorn, Si Liu, Christoph Sprenger, Adrian Perrig, David A. Basin:
N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures. CSF 2022: 147-162 - [c21]Zhaodi Zhang, Yiting Wu, Si Liu, Jing Liu, Min Zhang:
Provably Tightest Linear Approximation for Robustness Verification of Sigmoid-like Neural Networks. ASE 2022: 80:1-80:13 - [i3]Zhaodi Zhang, Yiting Wu, Si Liu, Jing Liu, Min Zhang:
Provably Tightest Linear Approximation for Robustness Verification of Sigmoid-like Neural Networks. CoRR abs/2208.09872 (2022) - [i2]Jiaxu Tian, Dapeng Zhi, Si Liu, Peixin Wang, Guy Katz, Min Zhang:
BBReach: Tight and Scalable Black-Box Reachability Analysis of Deep Reinforcement Learning Systems. CoRR abs/2211.11127 (2022) - [i1]Yiting Wu, Zhaodi Zhang, Zhiyi Xue, Si Liu, Min Zhang:
DualApp: Tight Over-Approximation for Neural Network Robustness Verification via Under-Approximation. CoRR abs/2211.11186 (2022) - 2021
- [c20]Lei Liang, Si Liu:
Exploring Design Alternatives for Replicated RAMP Transactions Using Maude. TASE 2021: 111-118 - 2020
- [c19]Si Liu, Atul Sandur, José Meseguer, Peter Csaba Ölveczky, Qi Wang:
Generating Correct-by-Construction Distributed Implementations from Formal Maude Designs. NFM 2020: 22-40
2010 – 2019
- 2019
- [b1]Si Liu:
Design, verification and automatic implementation of correct-by-construction distributed transaction systems in Maude. University of Illinois Urbana-Champaign, USA, 2019 - [j4]Si Liu, Peter Csaba Ölveczky, Qi Wang, Indranil Gupta, José Meseguer:
Read atomic transactions with prevention of lost updates: ROLA and its formal analysis. Formal Aspects Comput. 31(5): 503-540 (2019) - [c18]Qi Wang, Pubali Datta, Wei Yang, Si Liu, Adam Bates, Carl A. Gunter:
Charting the Attack Surface of Trigger-Action IoT Platforms. CCS 2019: 1439-1453 - [c17]Si Liu, Peter Csaba Ölveczky, Min Zhang, Qi Wang, José Meseguer:
Automatic Analysis of Consistency Properties of Distributed Transaction Systems in Maude. TACAS (2) 2019: 40-57 - 2018
- [c16]Si Liu, Peter Csaba Ölveczky, Keshav Santhanam, Qi Wang, Indranil Gupta, José Meseguer:
ROLA: A New Distributed Transaction Protocol and Its Formal Analysis. FASE 2018: 77-93 - [c15]Si Liu, Peter Csaba Ölveczky, Qi Wang, José Meseguer:
Formal Modeling and Analysis of the Walter Transactional Data Store. WRLA@ETAPS 2018: 136-152 - 2017
- [j3]Si Liu, Jatin Ganhotra, Muntasir Raihan Rahman, Son Nguyen, Indranil Gupta, José Meseguer:
Quantitative Analysis of Consistency in NoSQL Key-Value Stores. Leibniz Trans. Embed. Syst. 4(1): 03:1-03:26 (2017) - [c14]Si Liu, Peter Csaba Ölveczky, Jatin Ganhotra, Indranil Gupta, José Meseguer:
Exploring Design Alternatives for RAMP Transactions Through Statistical Model Checking. ICFEM 2017: 298-314 - 2016
- [j2]Si Liu, Peter Csaba Ölveczky, José Meseguer:
Modeling and analyzing mobile ad hoc networks in Real-Time Maude. J. Log. Algebraic Methods Program. 85(1): 34-66 (2016) - [c13]Si Liu, Peter Csaba Ölveczky, Muntasir Raihan Rahman, Jatin Ganhotra, Indranil Gupta, José Meseguer:
Formal modeling and analysis of RAMP transaction systems. SAC 2016: 1700-1707 - 2015
- [c12]Si Liu, Peter Csaba Ölveczky, José Meseguer:
Formal Analysis of Leader Election in MANETs Using Real-Time Maude. Software, Services, and Systems 2015: 231-252 - [c11]Si Liu, Son Nguyen, Jatin Ganhotra, Muntasir Raihan Rahman, Indranil Gupta, José Meseguer:
Quantitative Analysis of Consistency in NoSQL Key-Value Stores. QEST 2015: 228-243 - 2014
- [c10]Si Liu, Muntasir Raihan Rahman, Stephen Skeirik, Indranil Gupta, José Meseguer:
Formal Modeling and Analysis of Cassandra in Maude. ICFEM 2014: 332-347 - [c9]Xi Wu, Si Liu, Huibiao Zhu, Yongxin Zhao:
Reasoning about Group-Based Mobility in MANETs. PRDC 2014: 244-253 - [c8]Si Liu, Peter Csaba Ölveczky, José Meseguer:
A Framework for Mobile Ad hoc Networks in Real-Time Maude. WRLA 2014: 162-177 - 2013
- [j1]Xi Wu, Huibiao Zhu, Yongxin Zhao, Zheng Wang, Si Liu:
Modeling and verifying the Ariadne protocol using process algebra. Comput. Sci. Inf. Syst. 10(1): 393-421 (2013) - 2012
- [c7]Xi Wu, Si Liu, Huibiao Zhu, Yongxin Zhao, Lei Chen:
Modeling and Verifying the Ariadne Protocol Using CSP. ECBS 2012: 24-32 - 2011
- [c6]Si Liu, Yongxin Zhao, Huibiao Zhu, Qin Li:
A Calculus for Mobile Ad Hoc Networks from a Group Probabilistic Perspective. HASE 2011: 157-162 - [c5]Yongxin Zhao, Yanhong Huang, Jifeng He, Si Liu:
Formal Model of Interrupt Program from a Probabilistic Perspective. ICECCS 2011: 87-94 - [c4]Han Zhu, Huibiao Zhu, Si Liu, Jian Guo:
Towards Denotational Semantics for Verilog in PVS. SSIRI (Companion) 2011: 1-2 - [c3]Si Liu, Xiaofeng Wu, Qin Li, Huibiao Zhu, Qian Wang:
Formal Approaches to Wireless Sensor Networks. SSIRI (Companion) 2011: 11-18 - [c2]Si Liu, Yongxin Zhao, Huibiao Zhu, Qin Li:
Towards a Probabilistic Calculus for Mobile Ad Hoc Networks. TASE 2011: 195-198 - [c1]Mengying Wang, Huibiao Zhu, Yongxin Zhao, Si Liu:
Modeling and Analyzing the (mu)TESLA Protocol Using CSP. TASE 2011: 247-250
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint