default search action
ACM Transactions on Cyber-Physical Systems, Volume 6
Volume 6, Number 1, January 2022
- Chao Chen, Abdelsalam (Sumi) Helal, Zhi Jin, Mingyue Zhang, Choonhwa Lee:
IoTranx: Transactions for Safer Smart Spaces. 1:1-1:26 - Anshul Agarwal, Krithi Ramamritham:
A Novel Approach for Deploying Minimum Sensors in Smart Buildings. 2:1-2:29 - Debayan Roy, Licong Zhang, Wanli Chang, Dip Goswami, Birgit Vogel-Heuser, Samarjit Chakraborty:
Tool Integration for Automated Synthesis of Distributed Embedded Controllers. 3:1-3:31 - Matteo Trobinger, Gabriel de Albuquerque Gleizer, Timofei Istomin, Manuel Mazo, Amy L. Murphy, Gian Pietro Picco:
The Wireless Control Bus: Enabling Efficient Multi-Hop Event-Triggered Control with Concurrent Transmissions. 4:1-4:29 - Michael I.-C. Wang, Charles H.-P. Wen, H. Jonathan Chao:
Roadrunner+: An Autonomous Intersection Management Cooperating with Connected Autonomous Vehicles and Pedestrians with Spillback Considered. 5:1-5:29 - Junjie Yan, Kevin Huang, Kyle Lindgren, Tamara Bonaci, Howard Jay Chizeck:
Continuous Operator Authentication for Teleoperated Systems Using Hidden Markov Models. 6:1-6:25 - Rongrong Wang, Duc Van Le, Rui Tan, Yew-Wah Wong:
Real-Time Cooling Power Attribution for Co-Located Data Center Rooms with Distinct Temperatures and Humidities. 7:1-7:28 - Fang-Chieh Chou, Alben Rome Bagabaldo, Alexandre M. Bayen:
The Lord of the Ring Road: A Review and Evaluation of Autonomous Control Policies for Traffic in a Ring Road. 8:1-8:25 - Liuwang Kang, Haiying Shen:
Detection and Mitigation of Sensor and CAN Bus Attacks in Vehicle Anti-Lock Braking Systems. 9:1-9:24
Volume 6, Number 2, April 2022
- Jingtong Hu, Qi Zhu, Susmit Jha:
Introduction to the Special Issue on Artificial Intelligence and Cyber-Physical Systems - Part 2. 10:1-10:3 - Kazumune Hashimoto, Natsuko Tsumagari, Toshimitsu Ushio:
Collaborative Rover-copter Path Planning and Exploration with Temporal Logic Specifications Based on Bayesian Update Under Uncertain Environments. 11:1-11:24 - Elham Khodabandehloo, Abbas Alimohammadi, Daniele Riboni:
FreeSia: A Cyber-physical System for Cognitive Assessment through Frequency-domain Indoor Locomotion Analysis. 12:1-12:31 - Xiaodong Yang, Omar Ali Beg, Matthew Kenigsberg, Taylor T. Johnson:
A Framework for Identification and Validation of Affine Hybrid Automata from Input-Output Traces. 13:1-13:24 - Bouziane Brik, Mourad Messaadia, M'hammed Sahnoun, Belgacem Bettayeb, Mohamed Amin Benatia:
Fog-supported Low-latency Monitoring of System Disruptions in Industry 4.0: A Federated Learning Approach. 14:1-14:23 - Shreyas Ramakrishna, Zahra RahimiNasab, Gabor Karsai, Arvind Easwaran, Abhishek Dubey:
Efficient Out-of-Distribution Detection Using Latent Space of β-VAE for Cyber-Physical Systems. 15:1-15:34 - Jackson Codispoti, Atieh Rajabi Khamesi, Nelson Penn, Simone Silvestri, Eura Shin:
Learning from Non-experts: An Interactive and Adaptive Learning Approach for Appliance Recognition in Smart Homes. 16:1-16:22 - Maxim Shcherbakov, Sai Van Cuong:
A Hybrid Deep Learning Framework for Intelligent Predictive Maintenance of Cyber-physical Systems. 17:1-17:22 - Samar Abbas, Ahmed Ehsan, Saad Ahmed, Sheraz Ali Khan, Tariq M. Jadoon, Muhammad Hamad Alizai:
ASHRAY: Enhancing Water-usage Comfort in Developing Regions using Data-driven IoT Retrofits. 18:1-18:28 - Oliver Biggar, Mohammad Zamani, Iman Shames:
On Modularity in Reactive Control Architectures, with an Application to Formal Verification. 19:1-19:36
Volume 6, Number 3, July 2022
- Fabian Mager, Dominik Baumann, Carsten Herrmann, Sebastian Trimpe, Marco Zimmerling:
Scaling beyond Bandwidth Limitations: Wireless Control with Stability Guarantees under Overload. 20:1-20:30 - Mohammad Khayatian, Mohammadreza Mehrabian, Edward Andert, Reese Grimsley, Kyle Liang, Yi Hu, Ian McCormack, Carlee Joe-Wong, Jonathan Aldrich, Bob Iannucci, Aviral Shrivastava:
Plan B: Design Methodology for Cyber-Physical Systems Robust to Timing Failures. 21:1-21:39 - Monowar Hasan, Sibin Mohan, Rakesh B. Bobba, Rodolfo Pellizzoni:
Beyond Just Safety: Delay-aware Security Monitoring for Real-time Control Systems. 22:1-22:25 - Mohsen Ghafouri, Mohammad Ekramul Kabir, Bassam Moussa, Chadi Assi:
Coordinated Charging and Discharging of Electric Vehicles: A New Class of Switching Attacks. 23:1-23:26 - Dharshan Krishna Murthy, Alejandro Masrur:
A Cyber-physical Approach for Emergency Braking in Close-Distance Driving Arrangements. 24:1-24:26 - Georgios Bakirtzis, Fabrizio Genovese, Cody H. Fleming:
Yoneda Hacking: The Algebra of Attacker Actions. 25:1-25:27 - José Manuel Gaspar Sánchez, Nils Jörgensen, Martin Törngren, Rafia Inam, Andrii Berezovskyi, Lei Feng, Elena Fersman, Muhammad Rusyadi Ramli, Kaige Tan:
Edge Computing for Cyber-physical Systems: A Systematic Mapping Study Emphasizing Trustworthiness. 26:1-26:28 - Ping Yu, Wei Ni, Ren Ping Liu, Zhaoxin Zhang, Hua Zhang, Qiaoyan Wen:
Efficient Encrypted Range Query on Cloud Platforms. 27:1-27:23 - Abubakar Sadiq Mohammed, Philipp Reinecke, Pete Burnap, Omer F. Rana, Eirini Anthi:
Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective. 28:1-28:27
Volume 6, Number 4, October 2022
- Mohammad Abdullah Al Faruque, Meeko Mitsuko Oishi:
Introduction to the Special Section on Selected Papers from ICCPS 2021. 29e:1-29e:3 - Yukun Yuan, Meiyi Ma, Songyang Han, Desheng Zhang, Fei Miao, John A. Stankovic, Shan Lin:
DeResolver: A Decentralized Conflict Resolution Framework with Autonomous Negotiation for Smart City Services. 29:1-29:27 - Masaki Waga, Étienne André, Ichiro Hasuo:
Model-bounded Monitoring of Hybrid Systems. 30:1-30:26 - Shili Sheng, Erfan Pakdamanian, Kyungtae Han, Ziran Wang, John Lenneman, David Parker, Lu Feng:
Planning for Automated Vehicles with Human Trust. 31:1-31:21 - Geoffrey Pettet, Ayan Mukhopadhyay, Mykel J. Kochenderfer, Abhishek Dubey:
Hierarchical Planning for Dynamic Resource Allocation in Smart and Connected Communities. 32:1-32:26 - Michael Wrana, Marwa Elsayed, Karim Lounis, Ziad Mansour, Steven H. H. Ding, Mohammad Zulkernine:
OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation. 33:1-33:27 - Diksha Moolchandani, Kishore Yadav, Geesara Kulathunga, Ilya Afanasyev, Anshul Kumar, Manuel Mazzara, Smruti Sarangi:
Game Theory-Based Parameter Tuning for Energy-Efficient Path Planning on Modern UAVs. 34:1-34:29 - Ranjan Pal, Peihan Liu, Taoan Lu, Ed Hua:
How Hard Is Cyber-risk Management in IT/OT Systems? A Theory to Classify and Conquer Hardness of Insuring ICSs. 35:1-35:31
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.