default search action
Michael Huth 0001
Person information
- affiliation: Imperial College London, UK
Other persons with the same name
- Michael Huth 0002 — Goethe-Universität, Frankfurt am Main, Germany
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [i18]Xihan Xiong, Zhipeng Wang, Xi Chen, William J. Knottenbelt, Michael Huth:
Leverage Staking with Liquid Staking Derivatives (LSDs): Opportunities and Risks. CoRR abs/2401.08610 (2024) - 2023
- [c72]Xihan Xiong, Zhipeng Wang, William J. Knottenbelt, Michael Huth:
Demystifying Just-in-Time (JIT) Liquidity Attacks on Uniswap V3. BRAINS 2023: 1-8 - [i17]Xihan Xiong, Zhipeng Wang, William J. Knottenbelt, Michael Huth:
Demystifying Just-in-Time (JIT) Liquidity Attacks on Uniswap V3. IACR Cryptol. ePrint Arch. 2023: 973 (2023) - [i16]Xihan Xiong, Zhipeng Wang, Xi Chen, William J. Knottenbelt, Michael Huth:
Leverage Staking with Liquid Staking Derivatives (LSDs): Opportunities and Risks. IACR Cryptol. ePrint Arch. 2023: 1842 (2023) - 2022
- [j30]Petar Radanliev, David De Roure, Razvan Nicolescu, Michael Huth, Omar Santos:
Digital twins: artificial intelligence and the IoT cyber-physical systems in Industry 4.0. Int. J. Intell. Robotics Appl. 6(1): 171-185 (2022) - [i15]Amit Chaulwar, Lukas Malik, Maciej Krajewski, Felix Reichel, Leif-Nissen Lundbæk, Michael Huth, Bartlomiej Matejczyk:
Extreme compression of sentence-transformer ranker models: faster inference, longer battery life, and less storage on edge devices. CoRR abs/2207.12852 (2022) - 2021
- [j29]Petar Radanliev, David De Roure, Razvan Nicolescu, Michael Huth, Omar Santos:
Artificial Intelligence and the Internet of Things in Industry 4.0. CCF Trans. Pervasive Comput. Interact. 3(3): 329-338 (2021) - [i14]Amit Chaulwar, Michael Huth:
Secure Bayesian Federated Analytics for Privacy-Preserving Trend Detection. CoRR abs/2107.13640 (2021) - 2020
- [j28]Patrick Ah-Fat, Michael Huth:
Protecting Private Inputs: Bounded Distortion Guarantees With Randomised Approximations. Proc. Priv. Enhancing Technol. 2020(3): 284-303 (2020) - [c71]Patrick Ah-Fat, Michael Huth, Rob Mead, Tim Burrell, Joshua Neil:
Effective Detection of Credential Thefts from Windows Memory: Learning Access Behaviours to Local Security Authority Subsystem Service. RAID 2020: 181-194 - [i13]Patrick Ah-Fat, Michael Huth:
Two and Three-Party Digital Goods Auctions: Scalable Privacy Analysis. CoRR abs/2009.09524 (2020)
2010 – 2019
- 2019
- [j27]Shihan Bao, Yue Cao, Ao Lei, Philip Michael Asuquo, Haitham S. Cruickshank, Zhili Sun, Michael Huth:
Pseudonym Management Through Blockchain: Cost-Efficient Privacy Preservation on Intelligent Transportation Systems. IEEE Access 7: 80390-80403 (2019) - [j26]Patrick Ah-Fat, Michael Huth:
Optimal Accuracy-Privacy Trade-Off for Secure Computations. IEEE Trans. Inf. Theory 65(5): 3165-3182 (2019) - [c70]Marcello Balduccini, Edward R. Griffor, Michael Huth, Claire Vishik, David A. Wollman, Patrick Kamongi:
Decision Support for Smart Grid: Using Reasoning to Contextualize Complex Decision Making. MSCPES@CPSIoTWeek 2019: 1-6 - [c69]Patrick Ah-Fat, Michael Huth:
Scalable Information Flow Analysis of Secure Three-Party Affine Computations. ISIT 2019: 2967-2971 - [c68]Kwok Cheung, Michael Huth, Laurence Kirk, Leif-Nissen Lundbæk, Rodolphe Marques, Jan Petsche:
Owner-Centric Sharing of Physical Resources, Data, and Data-Driven Insights in Digital Ecosystems. SACMAT 2019: 73-81 - [p2]Michael Huth, Flemming Nielson:
Static Analysis for Proactive Security. Computing and Software Science 2019: 374-392 - [i12]Patrick Ah-Fat, Michael Huth:
Scalable Information-Flow Analysis of Secure Three-Party Affine Computations. CoRR abs/1901.00798 (2019) - [i11]Petar Radanliev, David De Roure, Razvan Nicolescu, Michael Huth:
A reference architecture for integrating the Industrial Internet of Things in the Industry 4.0. CoRR abs/1903.04369 (2019) - [i10]Kwok Cheung, Michael Huth, Laurence Kirk, Leif-Nissen Lundbæk, Rodolphe Marques, Jan Petsche:
Owner-centric sharing of physical resources, data, and data-driven insights in digital ecosystems. CoRR abs/1906.01785 (2019) - 2018
- [b4]Bernhard Steffen, Oliver Rüthing, Michael Huth:
Mathematical Foundations of Advanced Informatics, Volume 1: Inductive Approaches. Springer 2018, ISBN 978-3-319-68396-6, pp. 1-218 - [j25]Miten Mistry, Andrea Callia D'Iddio, Michael Huth, Ruth Misener:
Satisfiability modulo theories for process systems engineering. Comput. Chem. Eng. 113: 98-114 (2018) - [j24]Petar Radanliev, David Charles De Roure, Razvan Nicolescu, Michael Huth, Rafael Montalvo Mantilla, Stacy Cannady, Peter Burnap:
Future developments in cyber risk assessment for the internet of things. Comput. Ind. 102: 14-22 (2018) - [j23]Razvan Nicolescu, Michael Huth, Petar Radanliev, David De Roure:
Mapping the values of IoT. J. Inf. Technol. 33(4): 345-360 (2018) - [c67]Michael Huth:
The Merits of Compositional Abstraction: A Case Study in Propositional Logic. Models, Mindsets, Meta 2018: 297-309 - [c66]Michael Huth, Claire Vishik, Riccardo Masucci:
Risk Engineering and Blockchain: Anticipating and Mitigating Risks. BIS (Workshops) 2018: 381-392 - [c65]Martin Burns, Edward R. Griffor, Marcello Balduccini, Claire Vishik, Michael Huth, David A. Wollman:
Reasoning about Smart City. SMARTCOMP 2018: 381-386 - [i9]Patrick Ah-Fat, Michael Huth:
Optimal Accuracy-Privacy Trade-Off for Secure Multi-Party Computations. CoRR abs/1803.00436 (2018) - [i8]Marcello Balduccini, Edward R. Griffor, Michael Huth, Claire Vishik, Martin Burns, David A. Wollman:
Ontology-Based Reasoning about the Trustworthiness of Cyber-Physical Systems. CoRR abs/1803.07438 (2018) - [i7]Petar Radanliev, David Charles De Roure, Razvan Nicolescu, Michael Huth, Rafael Montalvo Mantilla, Stacy Cannady, Peter Burnap:
Future developments in cyber risk assessment for the internet of things. CoRR abs/1809.05229 (2018) - 2017
- [c64]Leif-Nissen Lundbæk, Andrea Callia D'Iddio, Michael Huth:
Centrally Governed Blockchains: Optimizing Security, Cost, and Availability. Models, Algorithms, Logics and Tools 2017: 578-599 - [c63]Leif-Nissen Lundbaek, Michael Huth:
Oligarchic Control of Business-to-Business Blockchains. EuroS&P Workshops 2017: 68-71 - [c62]Patrick Ah-Fat, Michael Huth:
Secure Multi-party Computation: Information Flow of Outputs and Game Theory. POST 2017: 71-92 - [i6]Andrea Callia D'Iddio, Michael Huth:
Manyopt: An Extensible Tool for Mixed, Non-Linear Optimization Through SMT Solving. CoRR abs/1702.01332 (2017) - [i5]Paul Beaumont, Michael Huth:
Constrained Bayesian Networks: Theory, Optimization, and Applications. CoRR abs/1705.05326 (2017) - 2016
- [c61]Michael Huth, Jim Huan-Pu Kuo, Nir Piterman:
Static Analysis of Parity Games: Alternating Reachability Under Parity. Semantics, Logics, and Calculi 2016: 159-177 - [c60]Patrick Ah-Fat, Michael Huth:
Partial Solvers for Parity Games: Effective Polynomial-Time Composition. GandALF 2016: 1-15 - [i4]Leif-Nissen Lundbaek, Andrea Callia D'Iddio, Michael Huth:
Optimizing Governed Blockchains for Financial Process Authentications. CoRR abs/1612.00407 (2016) - 2015
- [j22]Michael Huth, Jim Huan-Pu Kuo, Nir Piterman:
The Rabin index of parity games: Its complexity and approximation. Inf. Comput. 245: 36-53 (2015) - [c59]Paul Beaumont, Neil Evans, Michael Huth, Tom Plant:
Confidence Analysis for Nuclear Arms Control: SMT Abstractions of Bayesian Belief Networks. ESORICS (1) 2015: 521-540 - 2014
- [j21]Jason Crampton, Michael Huth, Jim Huan-Pu Kuo:
Authorized workflow schemas: deciding realizability through $$\mathsf{LTL }(\mathsf{F })$$ model checking. Int. J. Softw. Tools Technol. Transf. 16(1): 31-48 (2014) - [c58]Michael Huth, Jim Huan-Pu Kuo:
On Designing Usable Policy Languages for Declarative Trust Aggregation. HCI (24) 2014: 45-56 - [c57]Michael Huth, Jim Huan-Pu Kuo:
PEALT: An Automated Reasoning Tool for Numerical Aggregation of Trust Evidence. TACAS 2014: 109-123 - [i3]Michael Huth, Jim Huan-Pu Kuo, Nir Piterman:
Fatal Attractors in Parity Games: Building Blocks for Partial Solvers. CoRR abs/1405.0386 (2014) - 2013
- [c56]Michael Huth, Jim Huan-Pu Kuo, Nir Piterman:
Fatal Attractors in Parity Games. FoSSaCS 2013: 34-49 - [c55]Michael Huth, Jim Huan-Pu Kuo, M. Angela Sasse, Iacovos Kirlappos:
Towards Usable Generation and Enforcement of Trust Evidence from Programmers' Intent. HCI (27) 2013: 246-255 - [c54]Michael Huth, Jim Huan-Pu Kuo:
Towards Verifiable Trust Management for Software Execution - (Extended Abstract). TRUST 2013: 275-276 - [c53]Michael Huth, Jim Huan-Pu Kuo, Nir Piterman:
The Rabin index of parity games. GandALF 2013: 35-49 - [e4]Michael Huth, N. Asokan, Srdjan Capkun, Ivan Flechais, Lizzie Coles-Kemp:
Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013. Proceedings. Lecture Notes in Computer Science 7904, Springer 2013, ISBN 978-3-642-38907-8 [contents] - [i2]Rafael Accorsi, Jason Crampton, Michael Huth, Stefanie Rinderle-Ma:
Verifiably Secure Process-Aware Information Systems (Dagstuhl Seminar 13341). Dagstuhl Reports 3(8): 73-86 (2013) - 2012
- [j20]Michael Huth, Nir Piterman, Daniel Wagner:
p-Automata: New foundations for discrete-time probabilistic verification. Perform. Evaluation 69(7-8): 356-378 (2012) - [c52]Jason Crampton, Michael Huth, Jim Huan-Pu Kuo:
Authorization Enforcement in Workflows: Maintaining Realizability Via Automated Reasoning. PAAR@IJCAR 2012: 29-42 - [c51]Glenn Bruns, Philip W. L. Fong, Ida Sri Rejeki Siahaan, Michael Huth:
Relationship-based access control: its expression and enforcement through hybrid logic. CODASPY 2012: 117-124 - 2011
- [j19]David M. Nicol, Michael Huth:
Message from the program chairs. Perform. Evaluation 68(2): 89 (2011) - [j18]Glenn Bruns, Michael Huth:
Access control via belnap logic: Intuitive, expressive, and analyzable policy composition. ACM Trans. Inf. Syst. Secur. 14(1): 9:1-9:27 (2011) - [c50]Jason Crampton, Michael Huth:
On the Modeling and Verification of Security-Aware and Process-Aware Information Systems. Business Process Management Workshops (2) 2011: 423-434 - [c49]Michael Huth, Jim Huan-Pu Kuo, Nir Piterman:
Concurrent Small Progress Measures. Haifa Verification Conference 2011: 130-144 - [c48]Michael Huth, Jim Huan-Pu Kuo, Nir Piterman:
The Rabin Index of Parity Games - (Extended Abstract). Haifa Verification Conference 2011: 259-260 - [c47]Glenn Bruns, Michael Huth, Kumar Avijit:
Program synthesis in administration of higher-order permissions. SACMAT 2011: 41-50 - [r1]Michael Huth:
Formal Methods and Access Control. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 494-495 - 2010
- [j17]Adam Antonik, Michael Huth, Kim G. Larsen, Ulrik Nyman, Andrzej Wasowski:
Modal and mixed specifications: key decision problems and their complexities. Math. Struct. Comput. Sci. 20(1): 75-103 (2010) - [j16]Harald Fecher, Michael Huth, Nir Piterman, Daniel Wagner:
PCTL model checking of Markov chains: Truth and falsity as winning strategies in games. Perform. Evaluation 67(9): 858-872 (2010) - [c46]Jason Crampton, Michael Huth:
An Authorization Framework Resilient to Policy Evaluation Failures. ESORICS 2010: 472-487 - [c45]Jason Crampton, Michael Huth:
A Framework for the Modular Specification and Orchestration of Authorization Policies. NordSec 2010: 155-170 - [c44]Michael Huth, Nir Piterman, Daniel Wagner:
p-Automata: New Foundations for Discrete-Time Probabilistic Verification. QEST 2010: 161-170 - [p1]Jason Crampton, Michael Huth:
Towards an Access-Control Framework for Countering Insider Threats. Insider Threats in Cyber Security 2010: 173-195
2000 – 2009
- 2009
- [j15]Michael Huth, Nir Piterman, Huaxin Wang:
A workbench for preprocessor design and evaluation: toward benchmarks for parity games. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 23 (2009) - [j14]Michael Huth, Orna Grumberg:
Special section on advances in reachability analysis and decision procedures: contributions to abstraction-based system verification. Int. J. Softw. Tools Technol. Transf. 11(2): 85-94 (2009) - [c43]Michael Huth, Nir Piterman, Daniel Wagner:
Three-Valued Abstractions of Markov Chains: Completeness for a Sizeable Fragment of PCTL. FCT 2009: 205-216 - [c42]Mark Kattenbelt, Michael Huth:
Verification and Refutation of Probabilistic Specifications via Games. FSTTCS 2009: 251-262 - 2008
- [j13]Adam Antonik, Michael Huth, Kim G. Larsen, Ulrik Nyman, Andrzej Wasowski:
20 Years of Modal and Mixed Specifications. Bull. EATCS 95: 94-129 (2008) - [j12]Altaf Hussain, Michael Huth:
On model checking multiple hybrid views. Theor. Comput. Sci. 404(3): 186-201 (2008) - [c41]Glenn Bruns, Michael Huth:
Access-Control Policies via Belnap Logic: Effective and Efficient Composition and Analysis. CSF 2008: 163-176 - [c40]Adam Antonik, Michael Huth, Kim Guldstrand Larsen, Ulrik Nyman, Andrzej Wasowski:
Complexity of Decision Problems for Mixed and Modal Specifications. FoSSaCS 2008: 112-126 - [c39]Harald Fecher, Michael Huth, Nir Piterman, Daniel Wagner:
Hintikka Games for PCTL on Labeled Markov Chains. QEST 2008: 169-178 - [c38]Harald Fecher, Michael Huth:
Model Checking for Action Abstraction. VMCAI 2008: 112-126 - [c37]Adam Antonik, Michael Huth, Kim Guldstrand Larsen, Ulrik Nyman, Andrzej Wasowski:
EXPTIME-complete Decision Problems for Modal and Mixed Specifications. EXPRESS 2008: 19-33 - [c36]Nathaniel Charlton, Michael Huth:
Falsifying Safety Properties Through Games on Over-approximating Models. RP 2008: 71-86 - 2007
- [j11]Michael Huth:
Some current topics in model checking. Int. J. Softw. Tools Technol. Transf. 9(1): 25-36 (2007) - [c35]Nathaniel Charlton, Michael Huth:
Hector: Software Model Checking with Cooperating Analysis Plugins. CAV 2007: 168-172 - [c34]Glenn Bruns, Daniel S. Dantas, Michael Huth:
A simple and expressive semantic framework for policy composition in access control. FMSE 2007: 12-21 - [c33]Harald Fecher, Michael Huth:
More Precise Partition Abstractions. VMCAI 2007: 167-181 - [c32]Adam Antonik, Michael Huth:
On the Complexity of Semantic Self-minimization. AVoCS 2007: 3-19 - [c31]Harald Fecher, Michael Huth, Heiko Schmidt, Jens Schönborn:
Refinement Sensitive Formal Semantics of State Machines With Persistent Choice. AVoCS 2007: 71-86 - [e3]Orna Grumberg, Michael Huth:
Tools and Algorithms for the Construction and Analysis of Systems, 13th International Conference, TACAS 2007, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2007 Braga, Portugal, March 24 - April 1, 2007, Proceedings. Lecture Notes in Computer Science 4424, Springer 2007, ISBN 978-3-540-71208-4 [contents] - 2006
- [c30]Harald Fecher, Michael Huth:
Ranked Predicate Abstraction for Branching Time: Complete, Incremental, and Precise. ATVA 2006: 322-336 - [c29]Adam Antonik, Michael Huth:
Efficient Patterns for Model Checking Partial State Spaces in CTL intersection LTL. MFPS 2006: 41-57 - [c28]Adam Antonik, Nathaniel Charlton, Michael Huth:
Polynomial-Time Under-Approximation of Winning Regions in Parity Games. MFCSIT 2006: 115-139 - 2005
- [j10]Michael Huth:
Refinement is complete for implementations. Formal Aspects Comput. 17(2): 113-137 (2005) - [j9]Michael Huth:
Labelled transition systems as a Stone space. Log. Methods Comput. Sci. 1(1) (2005) - [j8]Michael Huth:
On finite-state approximants for probabilistic computation tree logic. Theor. Comput. Sci. 346(1): 113-134 (2005) - [c27]Patrice Godefroid, Michael Huth:
Model Checking Vs. Generalized Model Checking: Semantic Minimizations for Temporal Logics. LICS 2005: 158-167 - [c26]Altaf Hussain, Michael Huth:
Automata Games for Multiple-model Checking. MFPS 2005: 401-421 - [e2]Michael Huth:
Proceedings of the Fouth International Workshop on Automated Verification of Critical Systems, AVoCS 2004, London, UK, September 4, 2004. Electronic Notes in Theoretical Computer Science 128(6), Elsevier 2005 [contents] - 2004
- [b3]Michael Huth, Mark Dermot Ryan:
Logic in computer science - modelling and reasoning about systems (2. ed.). Cambridge University Press 2004, pp. I-XIV, 1-427 - [j7]Michael Huth, Radha Jagadeesan, David A. Schmidt:
A domain equation for refinement of partial systems. Math. Struct. Comput. Sci. 14(4): 469-505 (2004) - [j6]Michael Huth:
Mathematics for the exploration of requirements. ACM SIGCSE Bull. 36(2): 34-39 (2004) - [c25]Michael Huth, Altaf Hussain:
On model checking multiple hybrid views. ISoLA (Preliminary proceedings) 2004: 235-242 - [c24]Michael Huth:
Beyond Image-Finiteness: Labelled Transition Systems as a Stone Space. LICS 2004: 222-231 - [c23]Michael Huth:
An Abstraction Framework for Mixed Non-deterministic and Probabilistic Systems. Validation of Stochastic Systems 2004: 419-444 - [c22]Michael Huth:
Preface. AVoCS 2004: 1-2 - [c21]Michael Huth:
Topological Analysis of Refinement. MFCSIT 2004: 3-23 - [c20]Michael Huth:
Abstraction and Probabilities for Hybrid Logics. QAPL 2004: 61-76 - [i1]Michael Huth:
Labelled transition systems as a Stone space. CoRR abs/cs/0412063 (2004) - 2002
- [c19]Michael Huth:
Possibilistic and Probabilistic Abstraction-Based Model Checking. PAPM-PROBMIV 2002: 115-134 - [c18]Michael Huth:
Model Checking Modal Transition Systems Using Kripke Structures. VMCAI 2002: 302-316 - [c17]Michael Huth, Shekhar Pradhan:
Consistent Partial Model Checking. Workshop on Domains 2002: 45-85 - 2001
- [b2]Michael Huth:
Secure communicating systems - design, analysis, and implementation. Cambridge University Press 2001, ISBN 978-0-521-80731-9, pp. I-X, 1-283 - [j5]Götz Alefeld, Vladik Kreinovich, Günter Mayer, Michael Huth:
A Comment on the Shape of the Solution Set for Systems of Interval Linear Equations with Dependent Coefficients. Reliab. Comput. 7(3): 275-277 (2001) - [c16]Patrice Godefroid, Michael Huth, Radha Jagadeesan:
Abstraction-Based Model Checking Using Modal Transition Systems. CONCUR 2001: 426-440 - [c15]Michael Huth, Radha Jagadeesan, David A. Schmidt:
Modal Transition Systems: A Foundation for Three-Valued Program Analysis. ESOP 2001: 155-169 - [c14]Michael Huth, Shekhar Pradhan:
Model-Checking View-Based Partial Specifications. MFPS 2001: 174-196 - 2000
- [b1]Michael Huth, Mark Dermot Ryan:
Logic in computer science - modelling and reasoning about systems. Cambridge University Press 2000, ISBN 978-0-521-65602-3, pp. I-XVII, 1-387 - [j4]Michael Huth, Achim Jung, Klaus Keimel:
Linear types and approximation. Math. Struct. Comput. Sci. 10(6): 719-745 (2000)
1990 – 1999
- 1999
- [j3]Michael Huth:
On the Approximation of Denotational Mu-Semantics. Appl. Categorical Struct. 7(1-2): 85-111 (1999) - [c13]Michael Huth:
A Unifying Framework for Model Checking Labeled Kripke Structures, Modal Transition Systems and Interval Transition Systems. FSTTCS 1999: 369-380 - [c12]Corina S. Pasareanu, Matthew B. Dwyer, Michael Huth:
Assume-Guarantee Model Checking of Software: A Comparative Case Study. SPIN 1999: 168-183 - [e1]Christel Baier, Michael Huth, Marta Z. Kwiatkowska, Mark Ryan:
First International Workshop on Probabilistic Methods in Verification, PROBMIV 1998, Indianapolis, Indiana, USA, June 19-20, 1998. Electronic Notes in Theoretical Computer Science 22, Elsevier 1999 [contents] - 1998
- [c11]Michael Huth, Marta Z. Kwiatkowska:
Comparing CTL and PCTL on labeled Markov chains.