Zhiming Liu - 刘志明

Zhiming Liu - 刘志明
Northwestern Polytechnical University | NWPU · School of Software

PhD from University of Warwick, UK

About

215
Publications
62,968
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,304
Citations
Introduction
Centre for Intelligent and Embedded Software (CIES) of Northwest Polytechnical University (Taicang Campus) recruits postdoctoral research fellows, lecturers and associate professors. -- Computer Science -- Software Engineering -- Formal Methods -- Model Driven Development of Component-Based Software -- Software Development for Inter-Networking Systems (IoT, CPS, BigData) -- AI -- Human-Cyber-Physical Systems For information of RISE, contact Zhiming Liu by zliu@nwpu.edu.cn
Additional affiliations
January 2016 - July 2016
Southwest University in Chongqing
Position
  • Professor
July 2002 - present
United Nations University (UNU)
Position
  • Senior Researcher
October 1994 - June 2005
University of Leicester
Position
  • Lecturer in Computer Science
Education
September 1995 - December 1997
Software Institute of Chinese Academy of Sciences
Field of study
  • Computer Science
June 1988 - October 1991
The University of Warwick
Field of study
  • Computer Science

Publications

Publications (215)
Chapter
In this paper, we propose a safe reinforcement learning approach to synthesize deep neural network (DNN) controllers for nonlinear systems subject to safety constraints. The proposed approach employs an iterative scheme where a learner and a verifier interact to synthesize safe DNN controllers. The learner trains a DNN controller via deep reinforce...
Article
We provide a new approach to synthesize controllers for nonlinear continuous dynamical systems with control against safety properties. The controllers are based on neural networks (NNs). To certify the safety property we utilize barrier functions, which are represented by NNs as well. We train the controller-NN and barrier-NN simultaneously, achiev...
Article
The Clock Constraint Specification Language (CCSL) is a clock-based formalism for the specification and analysis of real-time embedded systems. The major goal of schedulability analysis of CCSL specifications is to solve the schedule problem, which is to answer ‘whether there exists a clock behaviour (also called a ‘schedule’) that conforms to a gi...
Chapter
We provide a novel approach to synthesize controllers for nonlinear continuous dynamical systems with control against safety properties. The controllers are based on neural networks (NNs). To certify the safety property we utilize barrier functions, which are also represented by NNs. We train controller-NN and barrier-NN simultaneously, achieving v...
Article
Full-text available
In this perspective article, we first recall the historic background of human-cyber-physical systems (HCPSs), and then introduce and clarify important concepts. We discuss the key challenges in establishing the scientific foundation from a system engineering point of view, including (1) complex heterogeneity, (2) lack of appropriate abstractions, (...
Chapter
Temporal networks are networks that edges evolve over time. Network embedding is an important approach that aims at learning low-dimension latent representations of nodes while preserving the spatial-temporal features for temporal network analysis. In this paper, we propose a spatial-temporal higher-order graph convolutional network framework (ST-H...
Preprint
We provide a novel approach to synthesize controllers for nonlinear continuous dynamical systems with control against safety properties. The controllers are based on neural networks (NNs). To certify the safety property we utilize barrier functions, which are represented by NNs as well. We train the controller-NN and barrier-NN simultaneously, achi...
Chapter
Full-text available
It is over fifty years since the subject discipline of software engineering and more than forty years from when the area of formal methods have been established. During this period, the academic community has accomplished extensive research in foundations and methods of software engineering, as well as developing and teaching a large body of softwa...
Article
Temporal networks are networks that edges evolve over time, hence link prediction in temporal networks aims at inferring new edges based on a sequence of network snapshots. In this paper, we propose a graph wavelet neural network (TT-GWNN) framework using topological and temporal features for link prediction in temporal networks. To capture topolog...
Preprint
Recent research has shown that it is challenging to detect out-of-distribution (OOD) data in deep generative models including flow-based models and variational autoencoders (VAEs). In this paper, we prove a theorem that, for a well-trained flow-based model, the distance between the distribution of representations of an OOD dataset and prior can be...
Book
This book constitutes the refereed proceedings of the 5th International School on Engineering Trustworthy Software Systems, SETSS 2019, held in Chongqing, China, in April 2019. The five chapters in this volume provide lectures on leading-edge research in methods and tools for use in computer system engineering. The topics covered in these chapters...
Article
Observabililty is an important topic of Boolean control networks (BCNs). In this paper, we propose a new type of observability named online observability to present the sufficient and necessary condition of determining the initial states of BCNs, when their initial states cannot be reset. And we design an algorithm to decide whether a BCN has the o...
Article
Prototyping is an effective and efficient way of requirements validation to avoid introducing errors in the early stage of software development. However, manually developing a prototype of a software system requires additional efforts, which would increase the overall cost of software development. In this article, we present an approach with a deve...
Conference Paper
Prototyping is an effective and efficient way of requirement validation to avoid introducing errors in the early stage of software development. However, manually developing a prototype of a software system requires additional efforts, which would increase the overall cost of software development. Based on our proposed approach, we develop RM2PT: a...
Preprint
Full-text available
Four types of observability of Boolean control networks (BCNs) have been proposed to to study the initial state of BCNs. However, all of them are offline observability meaning that once the input sequence is determined, it remains unchanged during the process of determining the BCN's initial state. It makes us can not find the input sequence to det...
Preprint
Column generation is often used to solve multi-commodity flow problems. A program for column generation always includes a module that solves a linear equation. In this paper, we address three major issues in solving linear problem during column generation procedure which are (1) how to employ the sparse property of the coefficient matrix; (2) how t...
Book
This volume contains lectures on leading-edge research in methods and tools for use in computer system engineering; at the 4th International School on Engineering Trustworthy Software Systems, SETSS 2018, held in April 2018 at Southwest University in Chongqing, China. The five chapters in this volume provide an overview of research in the frontier...
Chapter
Encrypted computing is an emerging approach to security and privacy of user data on a computing system with respect to the operating system and other powerful insiders as adversaries. It is based on a processor that ‘works encrypted’, taking encrypted inputs to encrypted outputs while data remains in encrypted form throughout processing. An appropr...
Preprint
In this paper, we study the parameter synthesis problem for a class of parametric timed automata. The problem asks to construct the set of valuations of the parameters in the parametric timed automa- ton, referred to as the feasible region, under which the resulting timed automaton satisfies certain properties. We show that the parameter syn- thesi...
Preprint
Prototyping is an effective and efficient way of requirement validation to avoid introducing errors in the early stage of software development. However, manually developing a prototype of a software system requires additional efforts, which would increase the overall cost of software development. In this paper, we present an approach with a develop...
Chapter
Full-text available
The microservices architectural style is rising fast, and many companies use this style to structure their systems. A big challenge in designing this architecture is to find an appropriate partition of the system into microservices. Microservices are usually designed intuitively, based on the experience of the designers. We describe a systematic ap...
Preprint
Full-text available
We consider the parameter synthesis problem of parametric timed automata (PTAs). The problem is, given a PTA and a property, to compute the set of valuations of the parameters under which the resulting timed automaton satisfies the property. Such a set of parameter valuations is called a feasible region for the PTA and the property. The problem is...
Conference Paper
Full-text available
Encrypted computing is an emerging approach to security and privacy of user data on a computing system with respect to the operating system and other powerful insiders as adversaries. It is based on a processor that 'works encrypted', taking encrypted inputs to encrypted outputs while data remains in encrypted form throughout processing. An appropr...
Preprint
Full-text available
Encrypted computing is an emerging approach to security for user data against the operating system and other powerful insiders in a computing system. It is based on a processor that 'works encrypted', taking encrypted inputs to encrypted outputs while the data remains in encrypted form throughout. An appropriate machine code instruction set is requ...
Article
Full-text available
Legacy Electronic Health Record (EHR) systems were not developed with the level of connectivity expected from them nowadays. Therefore, interoperability weakness inherent in the legacy systems can result in poor patient care and waste of financial resources. Simultaneously, healthcare providers are not yet ready to dispose of them, even if they wan...
Preprint
Full-text available
The microservices architectural style is rising fast, and many companies use this style to structure their systems. A big challenge in designing this architecture is to find an appropriate partition of the system into microservices. Microservices are usually designed intuitively, based on the experience of the designers. We describe a systematic ap...
Conference Paper
Full-text available
Appropriately modifying the arithmetic in a processor causes data to remain in encrypted form throughout processing, providing a technical approach to privacy for the ordinary user against the operator and other powerful insiders. The theory has been verified in a prototype superscalar processor design that fully implements the OpenRISC processor s...
Preprint
Full-text available
Appropriately modifying the arithmetic embedded in a processor causes data to remain in encrypted form throughout processing, providing a technical approach to privacy for the ordinary user against the operator and other powerful insiders. The theory has been verified via a prototype superscalar processor design that fully implements the OpenRISC p...
Data
Full text from conference, available after 1 year as per IEEE copyright agreement. Abstract: `Encrypted computing' is an approach to the prevention of insider attacks by the privileged operator against the unprivileged user on a computation system. It requires a processor that works natively on encrypted data in user mode, and the security barrier...
Conference Paper
Full-text available
Encrypted computing' is an approach to the prevention of insider attacks by the privileged operator against the unprivileged user on a computation system. It requires a processor that works natively on encrypted data in user mode, and the security barrier that protects the user is hardware-based encryption, not access protocols. We report on progre...
Preprint
Legacy Electronic Health Records (EHRs) systems were not developed with the level of connectivity expected from them nowadays. Therefore, interoperability weakness inherent in the legacy systems can result in poor patient care and waste of financial resources. Large hospitals are less likely to share their data with external hospitals due to econom...
Preprint
Full-text available
Appropriately modifying the arithmetic in a processor causes data to remain in encrypted form throughout processing. That principle is the basis for the design reported here, extending our initial reports in 2016. The design aims to prevent insider attacks by the operator against the user. Progress and practical experience with the prototype supers...
Conference Paper
Over the past few years we have articulated theory that describes `encrypted computing', in which data remains in encrypted form while being worked on inside a processor, by virtue of a modified arithmetic. The last two years have seen research and development on a standards-compliant processor that shows that near-conventional speeds are attainabl...
Conference Paper
We present a technique for the automatic identification of clinically-relevant patterns in medical datasets. To preserve patient privacy, we propose and implement the idea of treating medical dataset as a black box for both internal and external users of data. The proposed approach directly handles clinical data queries on a given medical dataset,...
Conference Paper
Full-text available
This paper sets out conditions for privacy and security of data against the privileged operator on processors that `work encrypted'. A compliant machine code architecture plus an `obfuscating' compiler turns out to be both necessary and sufficient to achieve that, the combination mathematically assuring the privacy of user data in arbitrary computa...
Chapter
The sustainable development of most economies and the quality of life of their citizens largely depend on the development and application of evolutionary digital ecosystems. The characteristic features of these systems are reflected in the so called Internet of Things (IoT), Smart Cities and Cyber-Physical Systems (CPS). Compared to the challenges...
Book
This volume contains a record of some of the lectures and seminars delivered at the Second International School on Engineering Trustworthy Software Systems (SETSS 2016), held in March/April 2016 at Southwest University in Chongqing, China. The six contributions included in this volume provide an overview of leading-edge research in methods and tool...
Article
Full-text available
This paper addresses the challenge of identifying clinically-relevant patterns in medical datasets without endangering patient privacy. To this end, we treat medical datasets as black box for both internal and external users of the data enabling a remote query mechanism to construct and execute database queries. The novelty of the approach lies in...
Conference Paper
Full-text available
This paper presents a linear programming (LP) relaxation based approach for generating polynomial barrier certificates for safety verification of semi-algebraic hybrid systems. The key idea is to introduce an LP relaxation to encode the set of nonnegativity constraints derived from the conditions of the associated barrier certificates and then reso...
Article
Full-text available
Smart city systems embrace major challenges associated with climate change, energy efficiency, mobility and future services by embedding the virtual space into a complex cyber-physical system. Those systems are constantly evolving and scaling up, involving a wide range of integration among users, devices, utilities, public services and also policie...
Conference Paper
Full-text available
This paper explores a new approach to encrypted microprocessing, potentiating new trade-offs in security versus performance engineering. The coprocessor prototype described runs standard machine code (32-bit OpenRISC v1.1) with encrypted data in registers, on buses, and in memory. The architecture is 'superscalar', executing multiple instructions s...
Chapter
Full-text available
The notion of software engineering implies that software design and production should be based on the types of theoretical foundations and practical disciplines that are established in the traditional branches of engineering. The goal is to make development of complex software systems more predictable and the systems developed more trustworthy - sa...
Book
The courses of SETSS 2014 aim to improve the understanding of the relation between theory and practice in software engineering, to contribute to narrowing the gap between them. This volume contains the lecture notes of the five courses and materials of one seminar. The common themes of the courses include the design and use of theories, techniques...
Article
Full-text available
In model driven architecture (MDA), system requirements are first captured by UML (unified modeling language) use cases with sequence diagrams to describe their intended use and implemented by classes of objected-oriented languages in the subsequent design stages. It is important that the dynamic behavior specified by the sequence diagrams is in fu...
Article
Full-text available
This paper takes on the problem of automatically identifying clinically-relevant patterns in medical datasets without compromising patient privacy. To achieve this goal, we treat datasets as a black box for both internal and external users of data that lets us handle clinical data queries directly and far more efficiently. The novelty of the approa...
Article
Graph transformation techniques, the Double-Pushout (DPO) approach in particular, have been successfully applied in the modeling of concurrent systems. In this area, a research thread has addressed the definition of concurrent semantics for process calculi. In this paper, we propose a theory of graph transformations for service programming with sop...
Conference Paper
Full-text available
It is expected that the Internet of Things (IoT) provides the foundational infrastructure for smart cities, and making ICT an enabling technology to meet major challenges associated with climate change, energy efficiency, mobility and future services. On the other hand a smart city with these requirements is usually evolving through incremental aut...
Conference Paper
Infeasible code has proved to be an interesting target for static analysis. It allows modular and scalable analysis, and at the same time, can be implemented with a close-to-zero rate of false warnings. The challenge for an infeasible code detection algorithm is to find executions that cover all statements with feasible executions as fast as possib...
Conference Paper
Recent developments in data de-identification technologies offer sophisticated solutions to protect medical data when, especially the data is to be provided for secondary purposes such as clinical or biomedical research. So as to determine to what degree an approach– along with its tool– is usable and effective, this paper takes into consideration...
Article
This project studies a working but manual immunization system in place in Pakistan, subject to concerns such as poor record-keeping, reaching targeted children and unavailability of latest census. We propose an openEHR-based solution, called Light-weight Electronic Traceable and Updatable System (LETUS), which aims at increasing childhood immunizat...
Article
Full-text available
Population aging looms over countries all over the world. The social and economic implications of this phenomenon extend beyond the individual person and the immediate family, affecting broader society and the global community in profound ways. Aging populations increase pressure on already over-burdened public health care services and expenditures...
Chapter
Full-text available
Model-Driven Software Development is nowadays taken as a mainstream methodology. In the software engineering community, it is a synonym of the OMG Model-Driven Architecture (MDA). However, in the formal method community, model-driven development is broadly seen as model-based techniques for software design and verification. Because of the differenc...
Article
The behavior of an Internetware system, which is running in a dymamic and open environment, is likely to deviate from its original requirements specification. In this paper, we propose an interaction based requirements monitoring approach for Internetware. Firstly the Internetware requirements are transformed into an environment based Internetware...
Conference Paper
Integrating formal methods into UML opens up a way to complement UML-based software development with precise semantics, development methodologies, as well as rigorous verification and refinement techniques. In this paper, we present an approach to integrate a formal method to practical component-based model driven development through defining a UML...
Article
Full-text available
We present a graph-basedmodel of a generic type system for an OO language. The type system supports the features of recursive types, generics and interfaces, which are commonly found in modern OO languages such as Java. In the classical graph theory, we define type graphs, instantiation graphs and conjunction graphs that naturally illustrate the re...
Conference Paper
We are happy to contribute to this volume of essays in honor of He Jifeng on the occasion of his 70th birthday. This work combines and extends two recent pieces of work that He Jifeng has made significant contributions: the rCOS Relational Semantics of Object-Oriented Programs [4] and the Trace Model for Pointers and Objects [7]. It presents a grap...