default search action
ACM Transactions on Cyber-Physical Systems, Volume 5
Volume 5, Number 1, January 2021
Special Issue on Security and Privacy for Connected CPS
- Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Chia-Mu Yu:
Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems. 1:1-1:2 - Kaushal Kafle, Kevin Moran, Sunil Manandhar, Adwait Nadkarni, Denys Poshyvanyk:
Security in Centralized Data Store-based Home Automation Platforms: A Systematic Analysis of Nest and Hue. 2:1-2:27 - Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
CANOPY: A Verifiable Privacy-Preserving Token Ring-Based Communication Protocol for Smart Homes. 3:1-3:34 - Muhammad Ajmal Azad, Charith Perera, Samiran Bag, Mahmoud Barhamgi, Feng Hao:
Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks. 4:1-4:24 - Gabriela Suntaxi, Aboubakr Achraf El Ghazi, Klemens Böhm:
Preserving Secrecy in Mobile Social Networks. 5:1-5:29 - Heena Rathore, Abhay Samant, Murtuza Jadliwala:
TangleCV: A Distributed Ledger Technique for Secure Message Sharing in Connected Vehicles. 6:1-6:25 - Abhimanyu Rawat, Mohammad Khodari, Mikael Asplund, Andrei V. Gurtov:
Decentralized Firmware Attestation for In-Vehicle Networks. 7:1-7:23 - Scott Eisele, Taha Eghtesad, Keegan Campanelli, Prakhar Agrawal, Aron Laszka, Abhishek Dubey:
Safe and Private Forward-trading Platform for Transactive Microgrids. 8:1-8:29 - Venkata Reddy Palleti, Vishrut Kumar Mishra, Chuadhry Mujeeb Ahmed, Aditya Mathur:
Can Replay Attacks Designed to Steal Water from Water Distribution Systems Remain Undetected? 9:1-9:19 - Abdelaziz Khaled, Samir Ouchani, Zahir Tari, Khalil Drira:
Assessing the Severity of Smart Attacks in Industrial Cyber-Physical Systems. 10:1-10:28 - Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Mehdi Elahi, Claus Pahl:
From Trustworthy Data to Trustworthy IoT: A Data Collection Methodology Based on Blockchain. 11:1-11:26
Volume 5, Number 2, January 2021
Special Issue on Time for CPS
- Aviral Shrivastava, Patricia Derler:
Introduction to the Special Issue on Time for CPS (TCPS). 12:1-12:2 - Rafael Rosales, Michael Paulitsch:
Composable Finite State Machine-based Modeling for Quality-of-Information-aware Cyber-physical Systems. 13:1-13:27 - Kai-Björn Gemlau, Leonie Köhler, Rolf Ernst, Sophie Quinton:
System-level Logical Execution Time: Augmenting the Logical Execution Time Paradigm for Distributed Real-time Automotive Software. 14:1-14:27 - João Bastos, Jeroen Voeten, Sander Stuijk, Ramon R. H. Schiffelers, Henk Corporaal:
Taming the State-space Explosion in the Makespan Optimization of Flexible Manufacturing Systems. 15:1-15:26 - Bingzhuo Zhong, Claudius Jordan, Julien Provost:
Extending Signal Temporal Logic with Quantitative Semantics by Intervals for Robust Monitoring of Cyber-physical Systems. 16:1-16:25
- Fei Miao, Sihong He, Lynn Pepin, Shuo Han, Abdeltawab M. Hendawi, Mohamed E. Khalefa, John A. Stankovic, George J. Pappas:
Data-driven Distributionally Robust Optimization For Vehicle Balancing of Mobility-on-Demand Systems. 17:1-17:27 - Laksh Bhatia, Ivana Tomic, Anqi Fu, Michael Breza, Julie A. McCann:
Control Communication Co-Design for Wide Area Cyber-Physical Systems. 18:1-18:27 - Li Yan, Haiying Shen:
Utilizing Game Theory to Optimize In-motion Wireless Charging Service Efficiency for Electric Vehicles. 19:1-19:26 - Luyao Niu, Andrew Clark:
A Differentially Private Incentive Design for Traffic Offload to Public Transportation. 20:1-20:27 - Srinarayana Nagarathinam, Arunchandar Vasan, Venkatesh Sarangan, Rajesh Jayaprakash, Anand Sivasubramaniam:
User Placement and Optimal Cooling Energy for Co-working Building Spaces. 21:1-21:24
Volume 5, Number 3, July 2021
- Chenyang Lu:
Toward a Scientific and Engineering Discipline of Cyber-Physical Systems. 22e:1-22e:2 - Giuseppe Bombara, Calin Belta:
Offline and Online Learning of Signal Temporal Logic Formulae Using Decision Trees. 22:1-22:23 - Craig Bakker, Arnab Bhattacharya, Samrat Chatterjee, Draguna L. Vrabie:
Metagames and Hypergames for Deception-Robust Control. 23:1-23:25 - Pierre-François Gimenez, Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette:
RIDS: Radio Intrusion Detection and Diagnosis System for Wireless Communications in Smart Environment. 24:1 - Shrey Baheti, Shreyas Badiger, Yogesh Simmhan:
VIoLET: An Emulation Environment for Validating IoT Deployments at Large Scales. 25:1-25:39 - Jiachen Mao, Huanrui Yang, Ang Li, Hai Li, Yiran Chen:
TPrune: Efficient Transformer Pruning for Mobile Devices. 26:1-26:22 - Kai Li, Ning Lu, Jingjing Zheng, Pei Zhang, Wei Ni, Eduardo Tovar:
BloothAir: A Secure Aerial Relay System Using Bluetooth Connected Autonomous Drones. 27:1-27:22 - Jianjun Wen, Waltenegus Dargie:
Characterization of Link Quality Fluctuation in Mobile Wireless Sensor Networks. 28:1-28:24 - Gonçalo de Jesus, António Casimiro, Anabela Oliveira:
Using Machine Learning for Dependable Outlier Detection in Environmental Monitoring Systems. 29:1-29:30 - Martín Barrère, Chris Hankin:
Analysing Mission-critical Cyber-physical Systems with AND/OR Graphs and MaxSAT. 30:1-30:29 - Hamza Bourbouh, Pierre-Loïc Garoche, Christophe Garion, Xavier Thirioux:
From Lustre to Simulink: Reverse Compilation for Embedded Systems Applications. 31:1-31:20 - Georgios Bakirtzis, Cody H. Fleming, Christina Vasilakopoulou:
Categorical Semantics of Cyber-Physical Systems Theory. 32:1-32:32
Volume 5, Number 4, October 2021
- Jingtong Hu, Qi Zhu, Susmit Jha:
Introduction to the Special Issue on Artificial Intelligence and Cyber-Physical Systems: Part 1. 33:1-33:3 - Jianguo Chen, Kenli Li, Keqin Li, Philip S. Yu, Zeng Zeng:
Dynamic Bicycle Dispatching of Dockless Public Bicycle-sharing Systems Using Multi-objective Reinforcement Learning. 34:1-34:24 - Alëna Rodionova, Yash Vardhan Pant, Connor Kurtz, Kuk Jin Jang, Houssam Abbas, Rahul Mangharam:
Learning-'N-Flying: A Learning-Based, Decentralized Mission-Aware UAS Collision Avoidance Scheme. 35:1-35:26 - Siddharth Mysore, Bassel Mabsout, Kate Saenko, Renato Mancuso:
How to Train Your Quadrotor: A Framework for Consistently Smooth and Responsive Flight Control via Reinforcement Learning. 36:1-36:24 - Stephanie Abrecht, Lydia Gauerhof, Christoph Gladisch, Konrad Groh, Christian Heinzemann, Matthias Woehrle:
Testing Deep Learning-based Visual Perception for Automated Driving. 37:1-37:28 - Colin Shea-Blymyer, Houssam Abbas:
Algorithmic Ethics: Formalization and Verification of Autonomous Vehicle Obligations. 38:1-38:25 - Wei Jiang, Zhiyuan He, Jinyu Zhan, Weijia Pan, Deepak Adhikari:
Research Progress and Challenges on Application-Driven Adversarial Examples: A Survey. 39:1-39:25 - Menghong Feng, Noman Bashir, Prashant J. Shenoy, David Emory Irwin, Beka Kosanovic:
Model-driven Per-panel Solar Anomaly Detection for Residential Arrays. 40:1-40:20 - Md. Tahmid Rahman Laskar, Jimmy Xiangji Huang, Vladan Smetana, Chris Stewart, Kees Pouw, Aijun An, Stephen Chan, Lei Liu:
Extending Isolation Forest for Anomaly Detection in Big Data via K-Means. 41:1-41:26 - Tommaso Zoppi, Mohamad Gharib, Muhammad Atif, Andrea Bondavalli:
Meta-Learning to Improve Unsupervised Intrusion Detection in Cyber-Physical Systems. 42:1-42:27 - Chia-Heng Tu, Qihui Sun, Hsiao-Hsuan Chang:
RAP: A Software Framework of Developing Convolutional Neural Networks for Resource-constrained Devices Using Environmental Monitoring as a Case Study. 43:1-43:28 - Saideep Tiku, Prathmesh Kale, Sudeep Pasricha:
QuickLoc: Adaptive Deep-Learning for Fast Indoor Localization with Mobile Devices. 44:1-44:30 - Tieu Long Mai, Nicolas Navet:
Deep Learning to Predict the Feasibility of Priority-Based Ethernet Network Configurations. 45:1-45:26
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.