Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Xiangyu Luo is active.

Publication


Featured researches published by Xiangyu Luo.


Knowledge Based Systems | 2010

A concurrent dynamic logic of knowledge, belief and certainty for multi-agent systems

Lijun Wu; Jinshu Su; Kaile Su; Xiangyu Luo; Zhihua Yang

This paper extends the logic of knowledge, belief and certainty from one agent to multi-agent systems, and gives a good combination between logic of knowledge, belief, certainty in multi-agent systems and actions that have concurrent and dynamic properties. Based on it, we present a concurrent dynamic logic of knowledge, belief and certainty for MAS, which is called CDKBC logic. Furthermore, a CDKBC model is given for interpreting this logic. We construct a CDKBC proof system for the logic and show that the proof system is sound and complete, and prove that the validity problem for the system is EXPTIME-complete.


web intelligence | 2008

Solving Sum and Product Riddle via BDD-Based Model Checking

Xiangyu Luo; Kaile Su; Abdul Sattar; Yan Chen

We model the sum and product riddle in public announcement logic, which is interpreted on an epistemic Kripke model. The model is symbolically represented as a finite state program with n agents. A model checking method to the riddle is developed by using the BDD-based symbolic model checking algorithm for logic of knowledge we developed in [7]. The method is implemented by extending the model checker MCTK [7] and then the solution of the riddle is verified successfully.


MoChArt'10 Proceedings of the 6th international conference on Model checking and artificial intelligence | 2010

Symbolic model checking the knowledge in Herbivore protocol

Xiangyu Luo; Kaile Su; Ming Gu; Lijun Wu; Jinji Yang

The importance of anonymity has increased over the past few years in many applications. Herbivore is a distributed anonymous communication system, providing private file sharing and messaging over the Internet. In this paper, we utilize MCTK to model the round protocol of the Herbivore system and verify the anonymity and other knowledge properties that the protocol should provide, where MCTK is an OBDD-based symbolic model checker for temporal logic of knowledge developed by us, under the semantics of interpreted systems with local propositions. We model the round protocol of the Herbivore system in MCTK under the assumption that all agents have perfect recall of all observations. We implement the round protocol of the Herbivore system in MCTK and another epistemic model checker MCK. The encouraging experimental results show the validity of our MCTK.


knowledge science engineering and management | 2006

Observation-Based logic of knowledge, belief, desire and intention

Kaile Su; Weiya Yue; Abdul Sattar; Mehmet A. Orgun; Xiangyu Luo

We present a new model of knowledge, belief, desire and intention, called the interpreted KBDI-system model (or KBDI-model for short). The key point of the interpreted KBDI-system model is that we express an agent’s knowledge, belief, desire and intention as a set of runs (computing paths), which is exactly a system in the interpreted system model, a well-known agent model due to Halpern and his colleagues. Our KBDI-model is computationally grounded in that we are able to associate a KBDI-model with a computer program, and formulas, involving agents’ knowledge, belief, desire (goal) and intention, can be understood as properties of program computations. With KBDI-model, we have two different semantics to interpret our logic of knowledge, belief, desire and intention. Moreover, with respect to each semantics, we present a sound and complete proof system.


international conference on networks | 2009

Model Checking Needham-Schroeder Security Protocol Based on Temporal Logic of Knowledge

Xiangyu Luo; Yan Chen; Ming Gu; Lijun Wu

Formal verification approaches can guarantee the correctness of security protocols. In this paper we take the well-known Needham-Schroeder public-key authentication protocol as an example, to show how we can apply the symbolic model checker for multiagent systems MCTK, which is developed by us, to the verification of security protocols. One temporal epistemic property is checked successfully both in the original version and the Lowes revised version of the Needham-Schroeder protocol. The experimental result shows that our method is an effective way to the verification of security protocol.


pacific rim international conference on artificial intelligence | 2014

Quantified Coalition Logic for BDI-Agents: Completeness and Complexity

Qingliang Chen; Qun Li; Kaile Su; Xiangyu Luo

This paper introduces a multi-dimensional modal logic of Quantified Coalition Logic of Beliefs, Desires and Intentions (QCLBDI) to reason about how agents’ mental attitudes evolve by cooperation in game-like multi-agent systems. We present a complete axiomatic system of QCLBDI with the formal proof and show that the satisfiability for QCLBDI is PSPACE-complete, computationally no harder than that of CL.


international conference on computer design | 2010

The based-role PMI model for access control in large scale netware system

Lijun Wu; Jinshu Su; Zili Chen; Xiangyu Luo

T Because of the complexity of netware and its enveroment, how to ensure security of large scale netware systems is a longstanding key problem. The access control is always one of the important guarantees of security of large scale netware systems. The paper introduces the general AC(attribute certificate) and the role specification AC and the role assignment AC, and discusses the role-based PMI architecture, then combines the role-based PMI architecture with the PKI architecture to present a new access control model based on role PMI. The model has advantages of flexibility, convenience, less storage space and less network consumption etc. At present, we are going to use the model in management information systems of the large scale netware to realize access control for systems.


Frontiers of Computer Science in China | 2016

A first-order coalition logic for BDI-agents

Qingliang Chen; Kaile Su; Abdul Sattar; Xiangyu Luo; Aixiang Chen

Coalition logic (CL) enables us to model the strategic abilities and specify what a group of agents can achieve whatever the other agents do. However, some rational mental attitudes of the agents are beyond the scope of CL such as the prestigious beliefs, desires and intentions (BDI) which is an interesting and useful epistemic notion and has spawned substantial amount of studies in multi-agent systems. In this paper, we introduce a first-order coalition BDI (FCBDI) logic for multi-agent systems, which provides a semantic glue that allows the formal embedding and interaction of BDI, coalition and temporal operators in a first-order language. We further introduce a semantic model based on the interpreted system model and present an axiomatic system that is proved sound and complete with respect to the semantics. Finally, it is shown that the computational complexity of its model checking in finite structures is PSPACE-complete.


international conference on intelligent computing | 2010

Translation-based verification of Web services composition via ZING

Xiangyu Luo; Jingjing Lu; Kaile Su; Rongsheng Dong

BPEL4WS (BPEL for short) is a standard business process execution language for Web services composition. To formally verify the correctness and reliability of Web services compositions, we propose an Input/Output Labelled Transition System (I/OLTS) as the intermediate formal model, which is well adapted to model BPEL constructs and handle faults, events, terminations, message correlation and activities. To be able to automatically verify Web services compositions via a model checker, we first develop a translation procedure to translate BPEL language into I/OLTS, and then develop another translation procedure to translate the I/OLTS model into the input language of ZING, a software model checker developed by Microsoft. The translation-based verification process for Web services composition is illustrated by a case study.


national conference on artificial intelligence | 2005

Observation-based model for BDI-agents

Kaile Su; Abdul Sattar; Kewen Wang; Xiangyu Luo; Guido Governatori; Vineet Padmanabhan

Collaboration


Dive into the Xiangyu Luo's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lijun Wu

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yan Chen

Guilin University of Electronic Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Aixiang Chen

Guangdong University of Business Studies

View shared research outputs
Top Co-Authors

Avatar

Guanfeng Lv

Beijing University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jinji Yang

South China Normal University

View shared research outputs
Researchain Logo
Decentralizing Knowledge