String Constraints with Regex-Counting and String-Length Solved More Efficiently.- Reachability Based Uniform Controllability to Target Set with Evolution Function.- Enhancing Branch and Bound for Robustness Verification of Neural Networks via An Effective Branching Strategy.- Graph-Based Log Anomaly Detection via Adversarial Training.- Formal Verification based Synthesis for Behavior Trees.- SeHBPL: Behavioral Semantics-Based Patch Presence Test for Binaries.- Session Types with Multiple Senders Single Receiver.- Understanding the Reproducibility Issues of Monkey for GUI Testing.- Multi-Dimensional Abstraction and Decomposition for Separation of Concerns.- Solving SMT Over Non-Linear Real Arithmetic via Numerical Sampling and Symbolic Verification.- Leveraging TLA+ Specifications to Improve the Reliability of the ZooKeeper Coordination Service.- Modeling Regex Operators for Solving Regex Crossword Puzzles.- Software Vulnerability Detection Using an Enhanced Generalization Strategy.- HeatC: a Variable-Grained Coverage Criterion for Deep Learning Systems.- Formalization of Lambda Calculus with Explicit Names as a Nominal Reasoning Framework.- Vulnerability Report Analysis and Vulnerability Reproduction for Web Applications.- Run-Time Assured Reinforcement Learning for Safe Spacecraft Rendezvous with Obstacle Avoidance.- An Abstract Domain of Linear Templates with Disjunctive Right-Hand-Side Intervals.- Deducing Matching Strings for Real-World Regular Expressions.- Binary Level Concolic Execution on Windows with Rich Instrumentation Based Taint Analysis.- Cheat-FlipIt: an Approach to Modeling and Perception of a Deceptive Opponent.- Making an eBPF Virtual Machine Faster on Microcontrollers: Verified Optimization and Proof Simplification.- Optimized Solutions for Highly Contended Transactional Workloads.- DeepTD: Diversity-Guided Deep Neural Network Test Generation.