{"id":"https://openalex.org/W4411337511","doi":"https://doi.org/10.1109/cain66642.2025.00044","title":"Model-Based Verification for AI-Enabled Cyber-Physical Systems Through Guided Falsification of Temporal Logic Properties","display_name":"Model-Based Verification for AI-Enabled Cyber-Physical Systems Through Guided Falsification of Temporal Logic Properties","publication_year":2025,"publication_date":"2025-04-27","ids":{"openalex":"https://openalex.org/W4411337511","doi":"https://doi.org/10.1109/cain66642.2025.00044"},"language":"en","primary_location":{"id":"doi:10.1109/cain66642.2025.00044","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cain66642.2025.00044","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACM 4th International Conference on AI Engineering \u2013 Software Engineering for AI (CAIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031420487","display_name":"Hammam R. Yusuf","orcid":null},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hadiza Umar Yusuf","raw_affiliation_strings":["University of Michigan-Dearborn,USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan-Dearborn,USA","institution_ids":["https://openalex.org/I27837315"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5031420487"],"corresponding_institution_ids":["https://openalex.org/I27837315"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17328634,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"267","last_page":"269"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9659000039100647,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11741","display_name":"Flexible and Reconfigurable Manufacturing Systems","score":0.9376000165939331,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.7820247411727905},{"id":"https://openalex.org/keywords/temporal-logic","display_name":"Temporal logic","score":0.755943775177002},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7079910039901733},{"id":"https://openalex.org/keywords/linear-temporal-logic","display_name":"Linear temporal logic","score":0.6573195457458496},{"id":"https://openalex.org/keywords/temporal-logic-of-actions","display_name":"Temporal logic of actions","score":0.46415719389915466},{"id":"https://openalex.org/keywords/computation-tree-logic","display_name":"Computation tree logic","score":0.4439719021320343},{"id":"https://openalex.org/keywords/interval-temporal-logic","display_name":"Interval temporal logic","score":0.4368681311607361},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3631189465522766},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3392822742462158}],"concepts":[{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.7820247411727905},{"id":"https://openalex.org/C25016198","wikidata":"https://www.wikidata.org/wiki/Q781833","display_name":"Temporal logic","level":2,"score":0.755943775177002},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7079910039901733},{"id":"https://openalex.org/C4777664","wikidata":"https://www.wikidata.org/wiki/Q1536492","display_name":"Linear temporal logic","level":2,"score":0.6573195457458496},{"id":"https://openalex.org/C11648818","wikidata":"https://www.wikidata.org/wiki/Q2403081","display_name":"Temporal logic of actions","level":4,"score":0.46415719389915466},{"id":"https://openalex.org/C198008173","wikidata":"https://www.wikidata.org/wiki/Q1040040","display_name":"Computation tree logic","level":3,"score":0.4439719021320343},{"id":"https://openalex.org/C162670838","wikidata":"https://www.wikidata.org/wiki/Q6057295","display_name":"Interval temporal logic","level":3,"score":0.4368681311607361},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3631189465522766},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3392822742462158},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cain66642.2025.00044","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cain66642.2025.00044","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACM 4th International Conference on AI Engineering \u2013 Software Engineering for AI (CAIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6800000071525574}],"awards":[{"id":"https://openalex.org/G8471189513","display_name":null,"funder_award_id":"2347294","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1966224165","https://openalex.org/W2068619069","https://openalex.org/W2076375575","https://openalex.org/W2112656403","https://openalex.org/W2131399618","https://openalex.org/W2153803621","https://openalex.org/W2172184261","https://openalex.org/W2229297286","https://openalex.org/W2336607923","https://openalex.org/W2759834774","https://openalex.org/W2963231286","https://openalex.org/W2967844381","https://openalex.org/W2973944767","https://openalex.org/W2980176926","https://openalex.org/W3002440596","https://openalex.org/W3017305623","https://openalex.org/W3028345072","https://openalex.org/W3092311360","https://openalex.org/W3123477784","https://openalex.org/W3185643228","https://openalex.org/W3197359847","https://openalex.org/W3204851156","https://openalex.org/W3212210003","https://openalex.org/W4200324797","https://openalex.org/W4234211953","https://openalex.org/W4288391571"],"related_works":["https://openalex.org/W946220898","https://openalex.org/W858755136","https://openalex.org/W1526924704","https://openalex.org/W4232446061","https://openalex.org/W2352091395","https://openalex.org/W31328628","https://openalex.org/W1981384792","https://openalex.org/W1532447905","https://openalex.org/W2561906579","https://openalex.org/W3005864166"],"abstract_inverted_index":{"The":[0],"integration":[1],"of":[2,33,103],"AI":[3,62],"into":[4],"Cyber-Physical":[5],"Systems":[6],"(CPS)":[7],"has":[8],"enhanced":[9],"their":[10],"functionality":[11],"but":[12],"introduced":[13],"challenges":[14,59],"for":[15,26],"traditional":[16],"verification":[17,58,95,105],"methods.":[18],"Temporal":[19],"logic":[20],"falsification":[21,69],"techniques,":[22],"which":[23],"are":[24],"designed":[25],"deterministic":[27],"models,":[28,56],"struggle":[29],"with":[30],"the":[31,93,99,104],"complexity":[32],"AI-driven":[34],"systems.":[35],"To":[36],"address":[37],"these":[38],"challenges,":[39],"this":[40],"Ph.D.":[41],"dissertation":[42],"focuses":[43],"on":[44],"two":[45],"primary":[46],"directions:":[47],"(i)":[48],"conduct":[49],"an":[50],"empirical":[51],"analysis":[52],"to":[53,61,78,89,92,113],"categorize":[54],"CPS":[55,94],"identify":[57],"specific":[60],"systems,":[63],"and":[64,75,101,107],"(ii)":[65],"propose":[66],"a":[67,109],"novel":[68],"method":[70],"that":[71],"combines":[72],"stochastic":[73],"optimization":[74],"reinforcement":[76],"learning":[77],"improve":[79],"fault":[80],"detection":[81],"in":[82],"AI-enabled":[83],"CPS.":[84],"This":[85],"research":[86],"is":[87],"expected":[88],"contribute":[90],"significantly":[91],"domain":[96],"by":[97],"improving":[98],"accuracy":[100],"efficiency":[102],"process":[106],"providing":[108],"public":[110],"data":[111],"set":[112],"support":[114],"further":[115],"research.":[116]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
