default search action
Samik Basu 0001
Person information
- affiliation: Iowa State University, Department of Computer Science, Ames, USA
Other persons with the same name
- Samik Basu 0002 — Vivekananda University, Belur, India
- Samik Basu 0003 — CoreEL Technologies, Bangalore, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c89]Yanhui Zhu, Samik Basu, A. Pavan:
Regularized Unconstrained Weakly Submodular Maximization. CIKM 2024: 3537-3548 - [c88]Yanhui Zhu, Samik Basu, A. Pavan:
Improved Evolutionary Algorithms for Submodular Maximization with Cost Constraints. IJCAI 2024: 7082-7090 - [c87]Karthik Hanumanthaiah, Samik Basu:
Iterative Counter-Example Guided Robustness Verification for Neural Networks. SAIV 2024: 179-187 - [i8]Yanhui Zhu, Samik Basu, A. Pavan:
Improved Evolutionary Algorithms for Submodular Maximization with Cost Constraints. CoRR abs/2405.05942 (2024) - [i7]Le Chang, Saitej Yavvari, Rance Cleaveland, Samik Basu, Liyi Li:
DisQ: A Markov Decision Process Based Language for Quantum Distributed Systems. CoRR abs/2407.09710 (2024) - [i6]Yanhui Zhu, Samik Basu, A. Pavan:
Regularized Unconstrained Weakly Submodular Maximization. CoRR abs/2408.04620 (2024) - [i5]Yanhui Zhu, Samik Basu, A. Pavan:
Fairness in Monotone k-submodular Maximization: Algorithms and Applications. CoRR abs/2411.05318 (2024) - 2023
- [c86]Samik Basu, Vasant G. Honavar, Ganesh Ram Santhanam, Jia Tao:
Representing and Reasoning with Multi-Stakeholder Qualitative Preference Queries. ECAI 2023: 206-213 - [c85]Guanyu Nie, Yanhui Zhu, Yididiya Y. Nadew, Samik Basu, A. Pavan, Christopher John Quinn:
Size-constrained k-submodular maximization in near-linear time. UAI 2023: 1545-1554 - [c84]Madhavan R. Padmanabhan, Yanhui Zhu, Samik Basu, Aduri Pavan:
Maximizing submodular functions under submodular constraints. UAI 2023: 1618-1627 - [i4]Samik Basu, Vasant G. Honavar, Ganesh Ram Santhanam, Jia Tao:
Representing and Reasoning with Multi-Stakeholder Qualitative Preference Queries. CoRR abs/2307.16307 (2023) - 2021
- [j13]Samik Basu, Ratnesh Kumar:
Control of Non-Deterministic Systems With $\mu$-Calculus Specifications Using Quotienting. IEEE CAA J. Autom. Sinica 8(5): 953-970 (2021) - [j12]Xiaoyun Fu, Madhavan R. Padmanabhan, Raj Gaurav Kumar, Samik Basu, Shawn F. Dorius, A. Pavan:
Measuring the impact of influence on individuals: roadmap to quantifying attitude. Soc. Netw. Anal. Min. 11(1): 61 (2021) - [c83]Xiaoyun Fu, Rishabh Rajendra Bhatt, Samik Basu, Aduri Pavan:
Multi-Objective Submodular Optimization with Approximate Oracles and Influence Maximization. IEEE BigData 2021: 328-334 - 2020
- [c82]Xiaoyun Fu, Madhavan R. Padmanabhan, Raj Gaurav Kumar, Samik Basu, Shawn F. Dorius, Aduri Pavan:
Measuring the Impact of Influence on Individuals: Roadmap to Quantifying Attitude. ASONAM 2020: 227-231 - [c81]Raj Gaurav Kumar, Preeti Bhardwaj, Samik Basu, Aduri Pavan:
Disrupting Diffusion: Critical Nodes in Network. WI/IAT 2020: 397-404 - [i3]Xiaoyun Fu, Madhavan Rajagopal Padmanabhan, Raj Gaurav Kumar, Samik Basu, Shawn F. Dorius, Aduri Pavan:
Measuring the Impact of Influence on Individuals: Roadmap to Quantifying Attitude. CoRR abs/2010.13304 (2020)
2010 – 2019
- 2018
- [c80]Madhavan R. Padmanabhan, Naresh Somisetty, Samik Basu, A. Pavan:
Influence Maximization in Social Networks With Non-Target Constraints. IEEE BigData 2018: 771-780 - 2017
- [c79]Maheedhar Gunasekharan, Samik Basu, Ganesh Ram Santhanam:
Selecting the minimal set of preferred responses to counter detected intrusions. CISRC 2017: 5:1-5:8 - 2016
- [b1]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
Representing and Reasoning with Qualitative Preferences: Tools and Applications. Synthesis Lectures on Artificial Intelligence and Machine Learning, Morgan & Claypool Publishers 2016, ISBN 978-3-031-00445-2 - [j11]Samik Basu, Tevfik Bultan:
On deciding synchronizability for asynchronously communicating systems. Theor. Comput. Sci. 656: 60-75 (2016) - [c78]Chris Strasburg, Samik Basu, Johnny S. Wong:
A Cross-Domain Comparable Measurement Framework to Quantify Intrusion Detection Effectiveness. CISRC 2016: 11:1-11:8 - [c77]Samik Basu, Tevfik Bultan:
Automated Choreography Repair. FASE 2016: 13-30 - 2015
- [c76]Ganesh Ram Santhanam, Gopalakrishnan Sivaprakasam, Giora Slutzki, Samik Basu:
A Knowledge Based Framework for Case-specific Diagnosis. ICAART (2) 2015: 482-488 - [c75]Zachary J. Oster, Ganesh Ram Santhanam, Samik Basu:
Scalable modeling and analysis of requirements preferences: A qualitative approach using CI-Nets. RE 2015: 214-219 - [i2]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
CRISNER: A Practically Efficient Reasoner for Qualitative Preferences. CoRR abs/1507.08559 (2015) - 2014
- [c74]Tanmoy Sarkar, Samik Basu, Johnny Wong:
iConSMutate: Concolic Testing of Database Applications Using Existing Database States Guided by SQL Mutants. ITNG 2014: 479-484 - [c73]Samik Basu, Tevfik Bultan:
Automatic verification of interactions in asynchronous systems with unbounded buffers. ASE 2014: 743-754 - [i1]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
Representing and Reasoning with Qualitative Preferences for Compositional Systems. CoRR abs/1401.3899 (2014) - 2013
- [c72]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
Verifying Preferential Equivalence and Subsumption via Model Checking. ADT 2013: 324-335 - [c71]Chris Strasburg, Samik Basu, Johnny S. Wong:
S-MAIDS: A Semantic Model for Automated Tuning, Correlation, and Response Selection in Intrusion Detection Systems. COMPSAC 2013: 319-328 - [c70]Ganesh Ram Santhanam, Zachary J. Oster, Samik Basu:
Identifying a preferred countermeasure strategy for attack graphs. CSIIRW 2013: 11 - [c69]Tanmoy Sarkar, Samik Basu, Johnny Wong:
SynConSMutate: Concolic Testing of Database Applications via Synthetic Data Guided by SQL Mutants. ITNG 2013: 337-342 - [c68]Michelle Ruse, Samik Basu:
Detecting Cross-Site Scripting Vulnerability Using Concolic Testing. ITNG 2013: 633-638 - [c67]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
Preference Based Service Adaptation Using Service Substitution. Web Intelligence 2013: 487-493 - [e1]Samik Basu, Cesare Pautasso, Liang Zhang, Xiang Fu:
Service-Oriented Computing - 11th International Conference, ICSOC 2013, Berlin, Germany, December 2-5, 2013, Proceedings. Lecture Notes in Computer Science 8274, Springer 2013, ISBN 978-3-642-45004-4 [contents] - 2012
- [j10]Natalia Stakhanova, Chris Strasburg, Samik Basu, Johnny S. Wong:
Towards cost-sensitive assessment of intrusion response selection. J. Comput. Secur. 20(2-3): 169-198 (2012) - [j9]Paul Jennings, Arka P. Ghosh, Samik Basu:
A two-phase approximation for model checking probabilistic unbounded until properties of probabilistic systems. ACM Trans. Softw. Eng. Methodol. 21(3): 18:1-18:35 (2012) - [c66]Roopak Sinha, Partha S. Roop, Zoran Salcic, Samik Basu:
Correct-by-construction multi-component SoC design. DATE 2012: 647-652 - [c65]Zachary J. Oster, Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
Model Checking of Qualitative Sensitivity Preferences to Minimize Credential Disclosure. FACS 2012: 205-223 - [c64]Tanmoy Sarkar, Samik Basu, Johnny S. Wong:
ConSMutate: SQL Mutants for Guiding Concolic Testing of Database Applications. ICFEM 2012: 462-477 - [c63]Zachary J. Oster, Syed Adeel Ali, Ganesh Ram Santhanam, Samik Basu, Partha S. Roop:
A Service Composition Framework Based on Goal-Oriented Requirements Engineering, Model Checking, and Qualitative Preference Analysis. ICSOC 2012: 283-297 - [c62]Samik Basu, Tevfik Bultan, Meriem Ouederni:
Deciding choreography realizability. POPL 2012: 191-202 - [c61]Samik Basu, Tevfik Bultan, Meriem Ouederni:
Synchronizability for Verification of Asynchronously Communicating Systems. VMCAI 2012: 56-71 - 2011
- [j8]Jing Liu, Samik Basu, Robyn R. Lutz:
Compositional model checking of software product lines using variation point obligations. Autom. Softw. Eng. 18(1): 39-76 (2011) - [j7]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
Representing and Reasoning with Qualitative Preferences for Compositional Systems. J. Artif. Intell. Res. 42: 211-274 (2011) - [c60]Ganesh Ram Santhanam, Yuly Suvorov, Samik Basu, Vasant G. Honavar:
Verifying Intervention Policies to Counter Infection Propagation over Networks: A Model Checking Approach. AAAI 2011: 1408-1414 - [c59]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
Identifying Sustainable Designs Using Preferences over Sustainability Attributes. AAAI Spring Symposium: Artificial Intelligence and Sustainable Design 2011 - [c58]Zachary J. Oster, Ganesh Ram Santhanam, Samik Basu:
Identifying Optimal Composite Services by Decomposing the Service Composition Problem. ICWS 2011: 267-274 - [c57]Zachary J. Oster, Ganesh Ram Santhanam, Samik Basu:
Automating analysis of qualitative preferences in goal-oriented requirements engineering. ASE 2011: 448-451 - [c56]Samik Basu, Tevfik Bultan:
Choreography conformance via synchronizability. WWW 2011: 795-804 - 2010
- [j6]Natalia Stakhanova, Samik Basu, Johnny Wong:
On the symbiosis of specification-based and anomaly-based detection. Comput. Secur. 29(2): 253-268 (2010) - [c55]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
Dominance Testing via Model Checking. AAAI 2010: 357-362 - [c54]Igors Svecs, Tanmoy Sarkar, Samik Basu, Johnny S. Wong:
XIDR: A Dynamic Framework Utilizing Cross-Layer Intrusion Detection for Effective Response Deployment. COMPSAC Workshops 2010: 287-292 - [c53]Zachary J. Oster, Ganesh Ram Santhanam, Samik Basu:
Decomposing the Service Composition Problem. ECOWS 2010: 163-170 - [c52]Youssef Hanna, David Samuelson, Samik Basu, Hridesh Rajan:
Automating Cut-off for Multi-parameterized Systems. ICFEM 2010: 338-354 - [c51]Hongyu Sun, Samik Basu, Vasant G. Honavar, Robyn R. Lutz:
Automata-Based Verification of Security Requirements of Composite Web Services. ISSRE 2010: 348-357 - [c50]Ru He, Paul Jennings, Samik Basu, Arka P. Ghosh, Huaiqing Wu:
A bounded statistical approach for model checking of unbounded until properties. ASE 2010: 225-234 - [c49]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
Efficient Dominance Testing for Unconditional Preferences. KR 2010 - [c48]Michelle Ruse, Tanmoy Sarkar, Samik Basu:
Analysis & Detection of SQL Injection Vulnerabilities via Automatic Test Case Generation of Programs. SAINT 2010: 31-37 - [c47]Chris Strasburg, Sandeep Krishnan, Karin S. Dorman, Samik Basu, Johnny S. Wong:
Masquerade Detection in Network Environments. SAINT 2010: 38-44 - [c46]Dinanath Nadkarni, Samik Basu, Vasant G. Honavar, Robyn R. Lutz:
Failure Analysis for Composition of Web Services Represented as Labeled Transition Systems. WS-FM 2010: 161-175
2000 – 2009
- 2009
- [c45]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
Web Service Substitution Based on Preferences Over Non-functional Attributes. IEEE SCC 2009: 210-217 - [c44]Chris Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong:
Intrusion response cost assessment methodology. AsiaCCS 2009: 388-391 - [c43]Chris Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong:
A Framework for Cost Sensitive Assessment of Intrusion Response Selection. COMPSAC (1) 2009: 355-360 - [c42]Roopak Sinha, Partha S. Roop, Samik Basu, Zoran Salcic:
Multi-clock Soc design using protocol conversion. DATE 2009: 123-128 - [c41]Samik Basu, Arka P. Ghosh, Ru He:
Approximate Model Checking of PCTL Involving Unbounded Path Properties. ICFEM 2009: 326-346 - [c40]Zachary J. Oster, Samik Basu:
Extending Substitutability in Composite Services by Allowing Asynchronous Communication with Message Buffers. ICTAI 2009: 572-575 - [c39]Saayan Mitra, Ratnesh Kumar, Samik Basu:
A Framework for Optimal Decentralized Service-Choreography. ICWS 2009: 493-500 - [c38]Xia Wang, Johnny S. Wong, Fred Stanley, Samik Basu:
Cross-Layer Based Anomaly Detection in Wireless Mesh Networks. SAINT 2009: 9-15 - [c37]Youssef Hanna, Samik Basu, Hridesh Rajan:
Behavioral automata composition for automatic topology independent verification of parameterized systems. ESEC/SIGSOFT FSE 2009: 325-334 - [c36]Hongyu Sun, Robyn R. Lutz, Samik Basu:
Product-line-based requirements customization for web service compositions. SPLC 2009: 141-150 - 2008
- [j5]Roopak Sinha, Partha S. Roop, Samik Basu:
SoC Design Approach Using Convertibility Verification. EURASIP J. Embed. Syst. 2008 (2008) - [j4]Jyotishman Pathak, Samik Basu, Robyn R. Lutz, Vasant G. Honavar:
MOSCOE: an Approach for Composing Web Services through Iterative Reformulation of Functional Specifications. Int. J. Artif. Intell. Tools 17(1): 109-138 (2008) - [c35]Jyotishman Pathak, Samik Basu, Vasant G. Honavar:
Composing Web Services through Automatic Reformulation of Service Specifications. IEEE SCC (1) 2008: 361-369 - [c34]Saayan Mitra, Ratnesh Kumar, Samik Basu:
Optimum Decentralized Choreography for Web Services Composition. IEEE SCC (2) 2008: 395-402 - [c33]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
TCP-Compose* - A TCP-Net Based Algorithm for Efficient Composition of Web Services Using Qualitative Preferences. ICSOC 2008: 453-467 - [c32]Natalia Stakhanova, Chris Strasburg, Samik Basu, Johnny S. Wong:
On Evaluation of Response Cost for Intrusion Response Systems. RAID 2008: 390-391 - [c31]Ganesh Ram Santhanam, Samik Basu, Vasant G. Honavar:
On Utilizing Qualitative Preferences in Web Service Composition: A CP-net Based Approach. SERVICES I 2008: 538-544 - [c30]Roopak Sinha, Partha S. Roop, Samik Basu:
A Module Checking Based Converter Synthesis Approach for SoCs. VLSI Design 2008: 492-501 - 2007
- [j3]Natalia Stakhanova, Samik Basu, Johnny Wong:
A taxonomy of intrusion response systems. Int. J. Inf. Comput. Secur. 1(1/2): 169-184 (2007) - [j2]Samik Basu, Scott A. Smolka:
Model checking the Java metalocking algorithm. ACM Trans. Softw. Eng. Methodol. 16(3): 12 (2007) - [c29]Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xia Wang, Johnny Wong:
Specification Synthesis for Monitoring and Analysis of MANET Protocols. AINA Workshops (1) 2007: 183-187 - [c28]Natalia Stakhanova, Samik Basu, Johnny Wong:
A Cost-Sensitive Model for Preemptive Intrusion Response Systems. AINA 2007: 428-435 - [c27]Samik Basu, Ratnesh Kumar:
Quotient-based control synthesis for partially observed non-deterministic plants with mu-calculus specifications. CDC 2007: 5294-5299 - [c26]Jyotishman Pathak, Samik Basu, Vasant G. Honavar:
On Context-Specific Substitutability of Web Services. ICWS 2007: 192-199 - [c25]Saayan Mitra, Ratnesh Kumar, Samik Basu:
Automated Choreographer Synthesis for Web Services Composition Using I/O Automata. ICWS 2007: 364-371 - [c24]Flavian Vasile, Samik Basu:
Cost-based Analysis of Multiple Counter-Examples. SEKE 2007: 33-38 - [c23]Saayan Mitra, Samik Basu, Ratnesh Kumar:
Local and On-the-fly Choreography-based Web Service Composition. Web Intelligence 2007: 521-527 - [c22]Roopak Sinha, Partha S. Roop, Samik Basu:
A Model Checking Approach to Protocol Conversion. SLA++P@ETAPS 2007: 81-94 - [p1]Jyotishman Pathak, Samik Basu, Vasant G. Honavar:
Assembling Composite Web Services from Autonomous Components. Emerging Artificial Intelligence Applications in Computer Engineering 2007: 394-405 - 2006
- [j1]Samik Basu, C. R. Ramakrishnan:
Compositional analysis for verification of parameterized systems. Theor. Comput. Sci. 354(2): 211-229 (2006) - [c21]Ratnesh Kumar, Changyan Zhou, Samik Basu:
Finite bisimulation of reactive untimed infinite state systems modeled as automata with variables. ACC 2006: 1-6 - [c20]Samik Basu, Ratnesh Kumar:
Quotient-based Control Synthesis for Non-Deterministic Plants with Mu-Calculus Specifications. CDC 2006: 6041-6046 - [c19]Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Johnny Wong:
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring. DASC 2006: 333-340 - [c18]Jyotishman Pathak, Samik Basu, Robyn R. Lutz, Vasant G. Honavar:
Parallel Web Service Composition in MoSCoE: A Choreography-Based Approach. ECOWS 2006: 3-12 - [c17]Jyotishman Pathak, Samik Basu, Robyn R. Lutz, Vasant G. Honavar:
MoSCoE: A Framework for Modeling Web Service Composition and Execution. ICDE Workshops 2006: 143 - [c16]Jyotishman Pathak, Samik Basu, Vasant G. Honavar:
Modeling Web Services by Iterative Reformulation of Functional and Non-functional Requirements. ICSOC 2006: 314-326 - [c15]Jyotishman Pathak, Samik Basu, Robyn R. Lutz, Vasant G. Honavar:
Selecting and Composing Web Services through Iterative Reformulation of Functional Specifications. ICTAI 2006: 445-454 - [c14]Andrew S. Miner, Samik Basu:
Verification of software via integration of design and implementation. IPDPS 2006 - [c13]Ping Yang, Samik Basu, C. R. Ramakrishnan:
Parameterized Verification of pi-Calculus Systems. TACAS 2006: 42-57 - [c12]Samik Basu, Partha S. Roop, Roopak Sinha:
Local Module Checking for CTL Specifications. FESCA@ETAPS 2006: 125-141 - 2005
- [c11]Natalia Stakhanova, Samik Basu, Johnny Wong, Oleg Stakhanov:
Trust Framework for P2P Networks Using Peer-Profile Based Anomaly Technique. ICDCS Workshops 2005: 203-209 - [c10]Curtis W. Keller, Diptikalyan Saha, Samik Basu, Scott A. Smolka:
FocusCheck: A Tool for Model Checking and Debugging Sequential C Programs. TACAS 2005: 563-569 - 2004
- [c9]Samik Basu, Diptikalyan Saha, Scott A. Smolka:
Localizing Program Errors for Cimple Debugging. FORTE 2004: 79-96 - [c8]Samik Basu, Prem Uppuluri:
Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection. ICDCIT 2004: 353-362 - [c7]Prem Uppuluri, Samik Basu:
LASE: Layered Approach for Sensor Security and Efficiency. ICPP Workshops 2004: 346-353 - 2003
- [c6]Samik Basu, Diptikalyan Saha, Yow-Jian Lin, Scott A. Smolka:
Generation of All Counter-Examples for Push-Down Systems. FORTE 2003: 79-94 - [c5]R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar, Daniel C. DuVarney:
Model-carrying code: a practical approach for safe execution of untrusted applications. SOSP 2003: 15-28 - [c4]Samik Basu, C. R. Ramakrishnan:
Compositional Analysis for Verification of Parameterized Systems. TACAS 2003: 315-330 - 2002
- [c3]Samik Basu, K. Narayan Kumar, L. Robert Pokorny, C. R. Ramakrishnan:
Resource-Constrained Model Checking of Recursive Programs. TACAS 2002: 236-250 - 2001
- [c2]Samik Basu, Madhavan Mukund, C. R. Ramakrishnan, I. V. Ramakrishnan, Rakesh M. Verma:
Local and Symbolic Bisimulation Using Tabled Constraint Logic Programming. ICLP 2001: 166-180 - 2000
- [c1]Samik Basu, Scott A. Smolka, Orson R. Ward:
Model Checking the Java Meta-Locking Algorithm. ECBS 2000: 342-350