Rui Wang

ORCID: 0000-0002-9848-7042
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Testing and Debugging Techniques
  • Formal Methods in Verification
  • Software Reliability and Analysis Research
  • Model-Driven Software Engineering Techniques
  • Real-time simulation and control systems
  • Embedded Systems Design Techniques
  • Smart Grid Security and Resilience
  • Real-Time Systems Scheduling
  • Parallel Computing and Optimization Techniques
  • Advanced Software Engineering Methodologies
  • Fault Detection and Control Systems
  • Network Security and Intrusion Detection
  • Simulation Techniques and Applications
  • Business Process Modeling and Analysis
  • Safety Systems Engineering in Autonomy
  • Neural Networks and Applications
  • Gait Recognition and Analysis
  • Reliability and Maintenance Optimization
  • Advanced Control Systems Design
  • Software Engineering Research
  • Algebraic structures and combinatorial models
  • Electronic Health Records Systems
  • Human Pose and Action Recognition
  • Advanced Topics in Algebra
  • Adversarial Robustness in Machine Learning

Capital Normal University
2015-2024

Tsinghua University
2019

Beijing Advanced Sciences and Innovation Center
2018

Wireless medical cyber-physical systems are widely adopted in the daily practices of medicine, where huge amounts data sampled by wireless devices and sensors, is passed to decision support (DSSs). Many text-based guidelines have been encoded for work-flow simulation DSS automate health care based on those collected data. But some complex life-critical diseases, it highly desirable automatically rigorously verify temporal properties data, which brings new challenges current simulation-based...

10.1109/tii.2016.2573762 article EN publisher-specific-oa IEEE Transactions on Industrial Informatics 2016-05-27

Action Recognition is a fundamental task in computer vision field, with wide range of applications autonomous driving, security monitoring, etc. However, previous action recognition approaches usually suffer from the inappropriate spatio-temporal modeling or high computational consumption (e.g., 3D CNN). In this paper, we propose novel Spatio-Temporal Adaptive Network (STANet) bidirectional temporal difference, consisting Temporal module (TA) and Spatial (SA) module, to sufficiently extract...

10.1109/tcsvt.2023.3250646 article EN IEEE Transactions on Circuits and Systems for Video Technology 2023-03-01

The model-based approach has been widely applied to the design of software. However, most these approaches depend on simulation and manual code implementation, which reduces efficiency quality In this paper, we present a new approach, automatically generates executable C++ running popular Robot Operation System (ROS). Our consists three phases: modeling, verification, automatic generation. modeling phase, internal interaction behaviors robot systems are modeled as network timed automata....

10.1109/jsyst.2018.2867285 article EN IEEE Systems Journal 2018-09-13

Robot systems have been widely used in industry and also play an important role human social life. Safety critical applications usually demand rigorously formal verification to ensure correctness. But for the increasing complexity of dynamic environments applications, it is not easy build a comprehensive model traditional offline verification. In this paper, we propose RobotRV, first data-centered real-time approach robot system. Within approach, domain-specific language named RoboticSpec...

10.1109/tii.2017.2788901 article EN IEEE Transactions on Industrial Informatics 2018-01-09

In this paper, we present a formal model-driven design approach to establish safety-assured implementation of multifunction vehicle bus controller (MVBC), which controls the data transmission among devices vehicle. First, generic models and safety requirements described in International Electrotechnical Commission Standard 61375 are formalized as time automata timed computation tree logic formulas, respectively. With model checking tool Uppaal, verify whether or not constructed satisfy...

10.1109/tits.2017.2778077 article EN IEEE Transactions on Intelligent Transportation Systems 2018-01-17

Clinical guidelines and decision support systems (DSS) play an important role in daily practices of medicine. Many text-based have been encoded for work-flow simulation DSS to automate health care. During the collaboration with Carle hospital develop a DSS, we identify that, some complex life-critical diseases, it is highly desirable automatically rigorously verify temporal properties guidelines, which brings new challenges current based limited automatical formal verification real-time data...

10.1145/2889160.2889233 article EN 2016-05-14

Cyber-physical systems (CPSs) are built from, and depend upon, the seamless integration of software hardware components. The most important challenge in CPS design verification is to be reliable a variety uncertainties, i.e., unanticipated rapidly evolving environments disturbances. costs, delays reliability designed highly dependent on software-hardware partitioning design. key challenges CPSs that it difficult formalize characterization same way as uncertain cost time delay. In this paper,...

10.1109/ithings/greencom/cpscom/smartdata.2019.00055 article EN 2019-07-01

Simulink is widely used for the model-driven design of embedded systems. It able to generate optimized control software code through expression folding, variable reuse, etc. However, some commonly computing-sensitive models, such as models signal processing applications, efficiency generated still limited. In this article, we propose PHCG, an generator model with single-instruction–multiple-data (SIMD) instruction synthesis. will select optimal implementations intensive computing actors...

10.1109/tcad.2022.3197504 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2022-08-09

Simulink is a widely used model-driven design environment for supporting the simulation and code generation of embedded applications. To improve quality generated from models, state-of-the-art generators employ various high-level optimizations, like eliminating local variables. However, they overlook compatibility between low-level processor architecture, especially instruction pipeline. Consequently, pipeline stalls occur frequently, leading to additional delays in execution, as well...

10.1109/tcad.2022.3199967 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2022-08-22

Simulink is widely used for the model-driven design of embedded systems. It able to generate optimized control software code through expression folding, variable reuse, etc. However, some commonly computing-sensitive models, such as models signal processing applications, efficiency generated still limited.

10.1145/3489517.3530582 article EN Proceedings of the 59th ACM/IEEE Design Automation Conference 2022-07-10

Robot control systems are complex cyber-physical which difficult to develop. In this paper, we present a formal model-based automatic code synthesis method can generate executable C++ running on the world-wide used Operating System (ROS). The internal interaction behaviors of robot modeled as network timed automata. safety requirements and specifications related model formalized CTL formulas verified by Uppaal. We design from model. Compared existing generators based automata, our supports...

10.1109/iceccs.2017.17 article EN 2017-11-01

We construct the multi-variable realizations of W1+∞ algebra such that they lead to n-algebra. Based on our algebra, we derive constraints for hermitian one-matrix model. The constraint operators yield not only but also closed

10.1016/j.physletb.2019.04.001 article EN cc-by Physics Letters B 2019-04-04

Cyber physical system (CPS) is a multi-dimensional complicated integrating computing, communication and environment. CPS widely used in safety-critical areas such as aerospace, intelligent transportation medical equipment. So ensuring the security reliability of great significance. Formal verification one useful ways. This paper builds timed automata models for process CAN bus CPS. Our research especially analyses gateway process, simulates transmission with different rates between external...

10.1109/qrs-c51114.2020.00050 article EN 2020-12-01

With the rapid development of intelligent vehicles, more and researchers are paying attention to their security issues. This paper considers a vehicle system with multiple sensors measuring same physical variable. Some these may be maliciously attacked, resulting in being unable work properly. mainly addresses detection identification malicious attacks on presence transient faults. Although there some solutions at present, existing methods can hardly capture when professional attacker...

10.1109/icii.2019.00047 article EN 2019-11-01

In designing robot control systems, simulation is still the primary approach to verifying functions of circuit descriptions written in hardware design language. The validity verification depends on coverage metric. But not all state spaces can be specified a simulation. Model checking overcome shortcomings simulation, because traversed. Robot system an important part robot, used manipulator perform specific tasks. Therefore, this paper framework presented for correctness robotic manipulator,...

10.1109/icra.2014.6907479 article EN 2014-05-01

10.1109/tcad.2024.3438691 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2024-01-01

Fractance element reflects the fractional order behavior of circuits, which can show characteristics actual circuits. Higher-order logic theorem proving is based on rigorous and correct mathematical theories. It becomes more important in verifications high-reliability systems. formalized using proof higher-order this paper. Firstly, model calculus Caputo definition established tool. Then some properties are proved, including zero property, differential a constant consistency integer...

10.1109/jas.2016.7510208 article EN IEEE/CAA Journal of Automatica Sinica 2016-12-17

For the Cyber-Physical Systems which are equipped with multiple sensors that measure same physical variables, some of may be subject to malicious attacks and provide wrong measurements controller, resulting in an unsafe state system. Although there several methods for detecting sensor attacks, they not work well when attacker manipulates output very slightly or infrequently over a period time, e.g., stealth attacks. To address this problem, we take system dynamics model into account, propose...

10.5555/3283568.3283587 article EN International Conference on Hardware/Software Codesign and System Synthesis 2018-09-30

Intelligent robots are a current application in Industrial Internet of Things (IIoT), with their trustworthiness being topic considerable research interest. Vulnerabilities robot software may affect the robotics. To detect these vulnerabilities software, this study proposes differential fuzz testing method. The main idea is to continuously execute test cases for different versions packages inconsistencies among outputs and eventually discover vulnerabilities. First, generated, combining seed...

10.1109/tii.2022.3211888 article EN IEEE Transactions on Industrial Informatics 2022-10-13

For many power terminal devices, firmware binary code can be extracted directly from the device by different methods. And program security test, so as to find Internet of Things vulnerabilities. In this paper, intelligent fuzz testing technology for is studied. Firstly, basic framework dynamic piling studied, and bottleneck existing analyzed. order improve performance in pile driving environment, a simulation combining user level system are proposed. Based on framework, method oriented...

10.1109/iceiec58029.2023.10199463 article EN 2023-07-14
Coming Soon ...