1. Shedding light on distributed system executions;Abrahamson,2014
2. Mining API patterns as partial orders from source code: from usage scenarios to specifications;Acharya,2007
3. Detecting deceptive reviews using generative adversarial networks;Aghakhani,2018
4. Targeted attacks on teleoperated surgical robots: Dynamic model-based detection and mitigation;Alemzadeh,2016
5. ARTINALI: dynamic invariant detection for cyber-physical system security;Aliabadi,2017