default search action
ACM Transactions on Cyber-Physical Systems, Volume 8
Volume 8, Number 1, January 2024
- Qiushi Liang
, Shengjie Zhao
, Jiangfan Zhang
, Hao Deng
:
Unsupervised BLSTM-Based Electricity Theft Detection with Training Data Contaminated. 1:1-1:20 - Werner Damm
, David Hess
, Mark Schweda
, Janos Sztipanovits
, Klaus Bengler
, Bianca Biebl
, Martin Fränzle
, Willem Hagemann
, Moritz Held
, Klas Ihme
, Severin Kacianka
, Alyssa J. Kerscher
, Sebastian Lehnhoff
, Andreas Lüdtke
, Alexander Pretschner
, Astrid Rakow
, Jochem W. Rieger
, Daniel Sonntag
, Maike Schwammberger
, Benedikt Austel
, Anirudh Unni
, Eric M. S. P. Veith:
A Reference Architecture of Human Cyber-Physical Systems - Part I: Fundamental Concepts. 2:1-2:32 - Klaus Bengler
, Werner Damm
, Andreas Lüdtke
, Jochem W. Rieger, Benedikt Austel
, Bianca Biebl
, Martin Fränzle
, Willem Hagemann
, Moritz Held
, David Hess
, Klas Ihme
, Severin Kacianka
, Alyssa J. Kerscher
, Forrest Laine
, Sebastian Lehnhoff
, Alexander Pretschner
, Astrid Rakow
, Daniel Sonntag
, Janos Sztipanovits
, Maike Schwammberger
, Mark Schweda
, Anirudh Unni
, Eric M. S. P. Veith:
A References Architecture for Human Cyber Physical Systems, Part II: Fundamental Design Principles for Human-CPS Interaction. 3:1-3:27 - Werner Damm
, Martin Fränzle
, Alyssa J. Kerscher, Forrest Laine
, Klaus Bengler, Bianca Biebl
, Willem Hagemann
, Moritz Held
, David Hess
, Klas Ihme
, Severin Kacianka, Sebastian Lehnhoff, Andreas Lüdtke, Alexander Pretschner, Astrid Rakow, Jochem W. Rieger, Daniel Sonntag, Janos Sztipanovits
, Maike Schwammberger
, Mark Schweda, Alexander Trende, Anirudh Unni, Eric M. S. P. Veith:
A Reference Architecture of Human Cyber-Physical Systems - Part III: Semantic Foundations. 4:1-4:23 - Levente Csikor
, Hoon Wei Lim
, Jun Wen Wong
, Soundarya Ramesh
, Rohini Poolat Parameswarath
, Mun Choon Chan
:
RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems. 5:1-5:25 - Vijay Varadharajan
, Uday Kiran Tupakula, Kallol Krishna Karmakar
:
Techniques for Enhancing Security in Industrial Control Systems. 6:1-6:36 - Ion Matei
, Wiktor Piotrowski, Alexandre Perez
, Johan de Kleer
, Jorge Tierno
, Wendy Mungovan
, Vance Turnewitsch
:
System Resilience through Health Monitoring and Reconfiguration. 7:1-7:27 - Kejing Zhao
, Zhiyong Zhang
, Kim-Kwang Raymond Choo
, Zhongya Zhang
, Tiantian Zhang
:
A Combinatorial Optimization Analysis Method for Detecting Malicious Industrial Internet Attack Behaviors. 8:1-8:20 - Stephen S. Kirkman
, Steven Fulton
, Jeffrey Hemmes
, Christopher Mark Garcia
, Justin C. Wilson
:
A Blockchain Architecture to Increase the Resilience of Industrial Control Systems from the Effects of a Ransomware Attack: A Proposal and Initial Results. 9:1-9:13
Volume 8, Number 2, April 2024
- Samarjit Chakraborty
, Somesh Jha
, Soheil Samii
, Philipp Mundhenk
:
Introduction to the Special Issue on Automotive CPS Safety & Security: Part 2. 10 - Alessandro Brighente
, Mauro Conti
, Denis Donadel
, Federico Turrin
:
EVScout2.0: Electric Vehicle Profiling through Charging Profile. 11 - Vahid Panahi
, Mehdi Kargahi
, Fathiyeh Faghih
:
Control Performance Analysis of Automotive Cyber-physical Systems: A Study on Efficient Formal Verification. 12 - Shailja Thakur
, Carlos Moreno
, Sebastian Fischmeister
:
CANOA: CAN Origin Authentication through Power Side-channel Monitoring. 13 - Yanmao Man
, Ming Li
, Ryan M. Gerdes
:
Remote Perception Attacks against Camera-based Object Recognition Systems and Countermeasures. 14 - Francesco Pollicino
, Dario Stabili
, Mirco Marchetti
:
Performance Comparison of Timing-Based Anomaly Detectors for Controller Area Network: A Reproducible Study. 15 - Jiangwei Wang
, Lili Su
, Songyang Han
, Dongjin Song
, Fei Miao
:
Towards Safe Autonomy in Hybrid Traffic: Detecting Unpredictable Abnormal Behaviors of Human Drivers via Information Sharing. 16 - Kuei-Fang Hsueh, Ayleen Farnood, Isam Al-Darabsah
, Mohammad Al Saaideh, Mohammad Al Janaideh, Deepa Kundur:
A Deep Time Delay Filter for Cooperative Adaptive Cruise Control. 17
- Sayan Mitra
, Nalini Venkatasubramanian:
Introduction to Special Issue for ICCPS 2022. 18 - Ruihang Wang
, Zhiwei Cao
, Xin Zhou
, Yonggang Wen
, Rui Tan
:
Green Data Center Cooling Control via Physics-guided Safe Reinforcement Learning. 19 - Mohammad Jaminur Islam
, Jose Paolo Talusan
, Shameek Bhattacharjee
, Francis Tiausas
, Abhishek Dubey
, Keiichi Yasumoto
, Sajal K. Das
:
Scalable Pythagorean Mean-based Incident Detection in Smart Transportation Systems. 20 - Yahan Yang
, Ramneet Kaur
, Souradeep Dutta
, Insup Lee
:
Memory-based Distribution Shift Detection for Learning Enabled Cyber-Physical Systems with Statistical Guarantees. 21 - Xin Qin
, Yuan Xia
, Aditya Zutshi
, Chuchu Fan
, Jyotirmoy V. Deshmukh
:
Statistical Verification using Surrogate Models and Conformal Inference and a Comparison with Risk-Aware Verification. 22
- Trier Mortlock
, Arnav V. Malawade
, Kohei Tsujio
, Mohammad Abdullah Al Faruque
:
CASTNet: A Context-Aware, Spatio-Temporal Dynamic Motion Prediction Ensemble for Autonomous Driving. 23 - Suman Das
, Michael Yuhas
, Rachel Koh
, Arvind Easwaran
:
Interpretable Latent Space for Meteorological Out-of-Distribution Detection via Weak Supervision. 24
Volume 8, Number 3, July 2024
- Mohammad Khayatian
, Mohammadreza Mehrabian
, I-Ching Tseng
, Chung-Wei Lin
, Calin Belta
, Aviral Shrivastava
:
Cooperative Driving of Connected Autonomous vehicle using Responsibility Sensitive Safety Rules: A Control Barrier Functions Approach. 25:1-25:26 - Harini Sridhar
, Gaojian Huang
, Adam J. Thorpe
, Meeko Oishi
, Brandon J. Pitts
:
Characterizing the Effect of Mind Wandering on Braking Dynamics in Partially Autonomous Vehicles. 26:1-26:21 - Neetesh Kumar
, Navjot Singh
, Anuj Sachan
, Rashmi Chaudhry
:
SIoV Mobility Management Using SDVN-Enabled Traffic Light Cooperative Framework. 27:1-27:24 - Enrico Casella
, Simone Silvestri
, Denise A. Baker
, Sajal K. Das
:
A Human-Centered Power Conservation Framework Based on Reverse Auction Theory and Machine Learning. 28:1-28:26
- Kuan-Hsun Chen
, Jing Li
, Federico Reghenzani
, Jian-Jia Chen
:
Introduction to the Special Issue on Fault-Resilient Cyber-Physical Systems - Part I. 29:1-29:3 - Ermeson Carneiro de Andrade
, Fumio Machida
:
Assuring Autonomy of UAVs in Mission-critical Scenarios by Performability Modeling and Analysis. 30:1-30:24 - M. Hani Sulieman
, Mengyu Liu
, Mustafa Cenk Gursoy
, Fanxin Kong
:
Path Planning for UAVs under GPS Permanent Faults. 31:1-31:23 - Alex Bendrick
, Jonas Peeck
, Rolf Ernst
:
An Error Protection Protocol for the Multicast Transmission of Data Samples in V2X Applications. 32:1-32:25 - Kai-En Lin
, Kuan-Chun Wang
, Yu-Heng Chen
, Li-Heng Lin
, Ying-Hua Lee
, Chung-Wei Lin
, Iris Hui-Ru Jiang
:
Graph-Based Deadlock Analysis and Prevention for Robust Intelligent Intersection Management. 33:1-33:22 - Deval Shah
, Zi Yu Xue
, Karthik Pattabiraman
, Tor M. Aamodt
:
Characterizing and Improving Resilience of Accelerators to Memory Errors in Autonomous Robots. 34:1-34:33 - David R. Keppler
, M. Faraz Karim
, Matthew S. Mickelson
, J. Sukarno Mertoguno
:
Experimentation and Implementation of the BFT++ Cyber-Attack Resilience Mechanism for Cyber-Physical Systems. 35:1-35:25 - Chao Wang
, Cheng-Hsun Chuang
, Yu-Wei Chen
, Yun-Fan Chen
:
On Cyber-Physical Fault Resilience in Data Communication: A Case From A LoRaWAN Network Systems Design. 36:1-36:25 - Mohammad Sagor
, Amran Haroon
, Radu Stoleru
, Suman Bhunia
, Ala Altaweel
, Mengyuan Chao
, Liuyi Jin
, Maxwell Maurice
, Roger Blalock
:
DistressNet-NG: A Resilient Data Storage and Sharing Framework for Mobile Edge Computing in Cyber-Physical Systems. 37:1-37:31
Volume 8, Number 4, October 2024
- Amulya Amulya
, K. S. Swarup
, Ramu Ramanathan
:
Cyber Security of Smart-Grid Frequency Control: A Review and Vulnerability Assessment Framework. 38:1-38:27 - Balaji Balasubramaniam
, Iftekhar Ahmed
, Hamid Bagheri
, Justin M. Bradley
:
Carving Out Control Code: Automated Identification of Control Software in Autopilot Systems. 39:1-39:20 - Neel Bhaskar
, Jawad Ahmed
, Rahat Masood
, Nadeem Ahmed
, Stephen Kerr
, Sanjay K. Jha
:
A Comprehensive Threat Modelling Analysis for Distributed Energy Resources. 40:1-40:32 - Ruijie Fu
, Lancong Guo
, An Zou
, Cailian Chen
, Xinping Guan
, Yehan Ma
:
Comprehensive Optimal Network Scheduling Strategies for Wireless Control Systems. 41:1-41:35 - Navid Hashemi
, Bardh Hoxha
, Danil V. Prokhorov
, Georgios Fainekos
, Jyotirmoy V. Deshmukh
:
Scaling Learning-based Policy Optimization for Temporal Logic Tasks by Controller Network Dropout. 42:1-42:28 - Meet Udeshi
, Prashanth Krishnamurthy
, Hammond Pearce
, Ramesh Karri
, Farshad Khorrami
:
REMaQE: Reverse Engineering Math Equations from Executables. 43:1-43:25
- Lu Feng
, Abhishek Dubey
:
Introduction to the Special Issue on ICCPS 2023. 44:1-44:2 - Jiale Chen
, Duc Van Le
, Rui Tan
, Daren Ho
:
A Collaborative Visual Sensing System for Precise Quality Inspection at Manufacturing Lines. 45:1-45:27 - Ramneet Kaur
, Yahan Yang
, Oleg Sokolsky
, Insup Lee
:
Out-of-distribution Detection in Dependent Data for Cyber-physical Systems with Conformal Guarantees. 46:1-46:27 - Yoones Rezaei
, Stephen Lee
:
sat2Map: Reconstructing 3D Building Roof from 2D Satellite Images. 47:1-47:25
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.