default search action
J. Sukarno Mertoguno
Person information
- affiliation: Office of Naval Research, Arlington
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]David R. Keppler, M. Faraz Karim, Matthew S. Mickelson, J. Sukarno Mertoguno:
Experimentation and Implementation of the BFT++ Cyber-Attack Resilience Mechanism for Cyber-Physical Systems. ACM Trans. Cyber Phys. Syst. 8(3): 35:1-35:25 (2024) - [i6]Dinuka Sahabandu, Bhaskar Ramasubramanian, Michail S. Alexiou, J. Sukarno Mertoguno, Linda Bushnell, Radha Poovendran:
A Method for Fast Autonomy Transfer in Reinforcement Learning. CoRR abs/2407.20466 (2024) - 2023
- [j15]Abdullah Al Maruf, Luyao Niu, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint. ACM Trans. Cyber Phys. Syst. 7(3): 19:1-19:25 (2023) - [j14]Dinuka Sahabandu, J. Sukarno Mertoguno, Radha Poovendran:
A Natural Language Processing Approach for Instruction Set Architecture Identification. IEEE Trans. Inf. Forensics Secur. 18: 4086-4099 (2023) - [c15]Luyao Niu, Abdullah Al Maruf, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
POSTER: A Common Framework for Resilient and Safe Cyber-Physical System Design. AsiaCCS 2023: 1025-1027 - [c14]Luyao Niu, Abdullah Al Maruf, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
A Compositional Resilience Index for Computationally Efficient Safety Analysis of Interconnected Systems. CDC 2023: 7554-7561 - [c13]Michail S. Alexiou, J. Sukarno Mertoguno:
A Survey on Recent Advancements in Lightweight Generative Adversarial Networks, their Applications and Datasets. ICTAI 2023: 269-278 - [c12]Michail S. Alexiou, J. Sukarno Mertoguno:
Automated Binary Program Partitioning through Structural Analysis. IISA 2023: 1-7 - [c11]Michail S. Alexiou, J. Sukarno Mertoguno:
Not-in-Perspective: Towards Shielding Google's Perspective API Against Adversarial Negation Attacks. IISA 2023: 1-8 - [c10]Yisroel Mirsky, George Macon, Michael D. Brown, Carter Yagemann, Matthew Pruett, Evan Downing, J. Sukarno Mertoguno, Wenke Lee:
VulChecker: Graph-based Vulnerability Localization in Source Code. USENIX Security Symposium 2023: 6557-6574 - [i5]Luyao Niu, Abdullah Al Maruf, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
A Compositional Resilience Index for Computationally Efficient Safety Analysis of Interconnected Systems. CoRR abs/2304.02058 (2023) - 2022
- [c9]Abdullah Al Maruf, Luyao Niu, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics. CDC 2022: 910-917 - [c8]Luyao Niu, Abdullah Al Maruf, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
An Analytical Framework for Control Synthesis of Cyber-Physical Systems with Safety Guarantee. CDC 2022: 1533-1540 - [i4]Abdullah Al Maruf, Luyao Niu, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics. CoRR abs/2204.00512 (2022) - [i3]Luyao Niu, Abdullah Al Maruf, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
An Analytical Framework for Control Synthesis of Cyber-Physical Systems with Safety Guarantee. CoRR abs/2204.00514 (2022) - [i2]Dinuka Sahabandu, J. Sukarno Mertoguno, Radha Poovendran:
A Natural Language Processing Approach for Instruction Set Architecture Identification. CoRR abs/2204.06624 (2022) - [i1]Abdullah Al Maruf, Luyao Niu, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint. CoRR abs/2208.14282 (2022) - 2021
- [j13]Nikolaos G. Bourbakis, Giorgia Rematska, J. Sukarno Mertoguno:
Deep Understanding of Technical Documents: Part I. Diagrams Structural-functional Modeling. Int. J. Artif. Intell. Tools 30(3): 2150015:1-2150015:28 (2021) - [j12]Nikolaos G. Bourbakis, Giorgia Rematska, J. Sukarno Mertoguno:
Deep Understanding of Technical Documents: Part II. Automatic Extraction of Pseudocode. Int. J. Artif. Intell. Tools 30(3): 2150016:1-2150016:27 (2021) - [j11]Michail S. Alexiou, Nikolaos Gkorgkolis, J. Sukarno Mertoguno, Nikolaos G. Bourbakis:
Deep Understanding of Technical Documents: An Enhancement on Diagrams Understanding. Int. J. Artif. Intell. Tools 30(5): 2150027:1-2150027:21 (2021) - 2020
- [j10]Nikolaos G. Bourbakis, J. Sukarno Mertoguno:
A Holistic Approach for Automatic Deep Understanding and Protection of Technical Documents. Int. J. Artif. Intell. Tools 29(6): 2050007:1-2050007:39 (2020)
2010 – 2019
- 2019
- [c7]J. Sukarno Mertoguno:
Toward Autonomy: Symbiotic Formal and Statistical Machine Reasoning. CogMI 2019: 210-215 - 2018
- [c6]J. Sukarno Mertoguno, Ryan Craven, Daniel Koller, Matthew S. Mickelson:
Reducing Attack Surface via Executable Transformation. SecDev 2018: 138 - 2014
- [j9]J. Sukarno Mertoguno:
Human Decision Making Model for Autonomic Cyber Systems. Int. J. Artif. Intell. Tools 23(6) (2014) - 2011
- [j8]Raghudeep Kannavara, J. Sukarno Mertoguno, Nikolaos G. Bourbakis:
SCAN secure processor and its biometric capabilities. J. Electronic Imaging 20(2): 023014 (2011)
2000 – 2009
- 2007
- [c5]Grigorios Chrysos, Apostolos Dollas, Nikolaos G. Bourbakis, J. Sukarno Mertoguno:
An Integrated Video Compression, Encryption and Information Hiding Architecture based on the SCAN Algorithm and the Stretch Technology. FCCM 2007: 327-330 - 2003
- [j7]J. Sukarno Mertoguno, Nikolaos G. Bourbakis:
A digital retina-like low-level vision processor. IEEE Trans. Syst. Man Cybern. Part B 33(5): 782-788 (2003) - 2002
- [j6]Nikolaos G. Bourbakis, A. Mogzadeh, J. Sukarno Mertoguno, Cris Koutsougeras:
A knowledge-based expert system for automatic visual VLSI reverse-engineering: VLSI layout version. IEEE Trans. Syst. Man Cybern. Part A 32(3): 428-436 (2002) - 2001
- [j5]H. Y. Yang, J. Sukarno Mertoguno, Nikolaos G. Bourbakis:
Design of the Kydon-RISC processor. Microprocess. Microsystems 25(1): 1-18 (2001) - 2000
- [c4]J. Sukarno Mertoguno, Nikolaos G. Bourbakis:
A Retina-like Low Level Vision Architecture. BIBE 2000: 263-269
1990 – 1999
- 1998
- [j4]J. Sukarno Mertoguno:
Distributed Knowledge-Base: Adaptive Multi-Agents Approach. Int. J. Artif. Intell. Tools 7(1): 59-70 (1998) - [j3]Nikolaos G. Bourbakis, Fotios Barlos, J. Sukarno Mertoguno:
Hermes Autonomous Vision System: The Flat Quadtree Model. Int. J. Pattern Recognit. Artif. Intell. 12(3): 265-291 (1998) - 1995
- [j2]J. Sukarno Mertoguno, Nikolaos G. Bourbakis:
Kydon Vision System: the Adaptive Learning Model. Int. J. Artif. Intell. Tools 4(4): 453-470 (1995) - [j1]W. Tariq, Nikolaos G. Bourbakis, J. Sukarno Mertoguno, Christos Alexopoulos:
Application-specific integrated circuit based image processor and its simulated results. J. Electronic Imaging 4(3): 260-269 (1995) - [c3]Bhaskar Saha, J. Sukarno Mertoguno, Nikolaos G. Bourbakis:
The VLSI design and implementation of the array processors of a multilayer vision system architecture. ASAP 1995: 125-128 - [c2]J. Sukarno Mertoguno, Nikolaos G. Bourbakis:
The Levels of Learning in Kydon's Hierarchy. Evolutionary Programming 1995: 259-270 - [c1]J. Sukarno Mertoguno, Nikolaos G. Bourbakis:
Analysis of the learning model for KYDON system. ICTAI 1995: 354-361
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint