


default search action
ACM Transactions on Cyber-Physical Systems, Volume 5
Volume 5, Number 1, January 2021
Special Issue on Security and Privacy for Connected CPS
- Moreno Ambrosin, Mauro Conti

, Riccardo Lazzeretti, Chia-Mu Yu:
Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems. 1:1-1:2 - Kaushal Kafle, Kevin Moran, Sunil Manandhar, Adwait Nadkarni, Denys Poshyvanyk

:
Security in Centralized Data Store-based Home Automation Platforms: A Systematic Analysis of Nest and Hue. 2:1-2:27 - Nisha Panwar

, Shantanu Sharma
, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
CANOPY: A Verifiable Privacy-Preserving Token Ring-Based Communication Protocol for Smart Homes. 3:1-3:34 - Muhammad Ajmal Azad

, Charith Perera, Samiran Bag, Mahmoud Barhamgi, Feng Hao:
Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks. 4:1-4:24 - Gabriela Suntaxi

, Aboubakr Achraf El Ghazi
, Klemens Böhm:
Preserving Secrecy in Mobile Social Networks. 5:1-5:29 - Heena Rathore

, Abhay Samant
, Murtuza Jadliwala:
TangleCV: A Distributed Ledger Technique for Secure Message Sharing in Connected Vehicles. 6:1-6:25 - Abhimanyu Rawat

, Mohammad Khodari, Mikael Asplund
, Andrei V. Gurtov
:
Decentralized Firmware Attestation for In-Vehicle Networks. 7:1-7:23 - Scott Eisele

, Taha Eghtesad, Keegan Campanelli, Prakhar Agrawal, Aron Laszka
, Abhishek Dubey:
Safe and Private Forward-trading Platform for Transactive Microgrids. 8:1-8:29 - Venkata Reddy Palleti

, Vishrut Kumar Mishra, Chuadhry Mujeeb Ahmed
, Aditya Mathur:
Can Replay Attacks Designed to Steal Water from Water Distribution Systems Remain Undetected? 9:1-9:19 - Abdelaziz Khaled

, Samir Ouchani
, Zahir Tari
, Khalil Drira:
Assessing the Severity of Smart Attacks in Industrial Cyber-Physical Systems. 10:1-10:28 - Claudio A. Ardagna

, Rasool Asal
, Ernesto Damiani
, Nabil El Ioini, Mehdi Elahi
, Claus Pahl
:
From Trustworthy Data to Trustworthy IoT: A Data Collection Methodology Based on Blockchain. 11:1-11:26
Volume 5, Number 2, January 2021
Special Issue on Time for CPS
- Aviral Shrivastava

, Patricia Derler:
Introduction to the Special Issue on Time for CPS (TCPS). 12:1-12:2 - Rafael Rosales, Michael Paulitsch:

Composable Finite State Machine-based Modeling for Quality-of-Information-aware Cyber-physical Systems. 13:1-13:27 - Kai-Björn Gemlau

, Leonie Köhler
, Rolf Ernst, Sophie Quinton:
System-level Logical Execution Time: Augmenting the Logical Execution Time Paradigm for Distributed Real-time Automotive Software. 14:1-14:27 - João Bastos, Jeroen Voeten, Sander Stuijk

, Ramon R. H. Schiffelers, Henk Corporaal:
Taming the State-space Explosion in the Makespan Optimization of Flexible Manufacturing Systems. 15:1-15:26 - Bingzhuo Zhong, Claudius Jordan, Julien Provost:

Extending Signal Temporal Logic with Quantitative Semantics by Intervals for Robust Monitoring of Cyber-physical Systems. 16:1-16:25
- Fei Miao, Sihong He, Lynn Pepin, Shuo Han, Abdeltawab M. Hendawi, Mohamed E. Khalefa, John A. Stankovic, George J. Pappas

:
Data-driven Distributionally Robust Optimization For Vehicle Balancing of Mobility-on-Demand Systems. 17:1-17:27 - Laksh Bhatia, Ivana Tomic, Anqi Fu, Michael Breza, Julie A. McCann:

Control Communication Co-Design for Wide Area Cyber-Physical Systems. 18:1-18:27 - Li Yan, Haiying Shen:

Utilizing Game Theory to Optimize In-motion Wireless Charging Service Efficiency for Electric Vehicles. 19:1-19:26 - Luyao Niu, Andrew Clark:

A Differentially Private Incentive Design for Traffic Offload to Public Transportation. 20:1-20:27 - Srinarayana Nagarathinam

, Arunchandar Vasan, Venkatesh Sarangan, Rajesh Jayaprakash
, Anand Sivasubramaniam:
User Placement and Optimal Cooling Energy for Co-working Building Spaces. 21:1-21:24
Volume 5, Number 3, July 2021
- Chenyang Lu:

Toward a Scientific and Engineering Discipline of Cyber-Physical Systems. 22e:1-22e:2 - Giuseppe Bombara, Calin Belta

:
Offline and Online Learning of Signal Temporal Logic Formulae Using Decision Trees. 22:1-22:23 - Craig Bakker

, Arnab Bhattacharya, Samrat Chatterjee, Draguna L. Vrabie
:
Metagames and Hypergames for Deception-Robust Control. 23:1-23:25 - Pierre-François Gimenez, Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette:

RIDS: Radio Intrusion Detection and Diagnosis System for Wireless Communications in Smart Environment. 24:1 - Shrey Baheti, Shreyas Badiger, Yogesh Simmhan

:
VIoLET: An Emulation Environment for Validating IoT Deployments at Large Scales. 25:1-25:39 - Jiachen Mao, Huanrui Yang, Ang Li, Hai Li, Yiran Chen:

TPrune: Efficient Transformer Pruning for Mobile Devices. 26:1-26:22 - Kai Li

, Ning Lu, Jingjing Zheng, Pei Zhang, Wei Ni, Eduardo Tovar
:
BloothAir: A Secure Aerial Relay System Using Bluetooth Connected Autonomous Drones. 27:1-27:22 - Jianjun Wen, Waltenegus Dargie:

Characterization of Link Quality Fluctuation in Mobile Wireless Sensor Networks. 28:1-28:24 - Gonçalo de Jesus

, António Casimiro
, Anabela Oliveira
:
Using Machine Learning for Dependable Outlier Detection in Environmental Monitoring Systems. 29:1-29:30 - Martín Barrère

, Chris Hankin
:
Analysing Mission-critical Cyber-physical Systems with AND/OR Graphs and MaxSAT. 30:1-30:29 - Hamza Bourbouh, Pierre-Loïc Garoche, Christophe Garion

, Xavier Thirioux
:
From Lustre to Simulink: Reverse Compilation for Embedded Systems Applications. 31:1-31:20 - Georgios Bakirtzis

, Cody H. Fleming
, Christina Vasilakopoulou
:
Categorical Semantics of Cyber-Physical Systems Theory. 32:1-32:32
Volume 5, Number 4, October 2021
- Jingtong Hu, Qi Zhu, Susmit Jha:

Introduction to the Special Issue on Artificial Intelligence and Cyber-Physical Systems: Part 1. 33:1-33:3 - Jianguo Chen, Kenli Li, Keqin Li, Philip S. Yu, Zeng Zeng:

Dynamic Bicycle Dispatching of Dockless Public Bicycle-sharing Systems Using Multi-objective Reinforcement Learning. 34:1-34:24 - Alëna Rodionova, Yash Vardhan Pant, Connor Kurtz, Kuk Jin Jang

, Houssam Abbas, Rahul Mangharam:
Learning-'N-Flying: A Learning-Based, Decentralized Mission-Aware UAS Collision Avoidance Scheme. 35:1-35:26 - Siddharth Mysore, Bassel Mabsout, Kate Saenko

, Renato Mancuso:
How to Train Your Quadrotor: A Framework for Consistently Smooth and Responsive Flight Control via Reinforcement Learning. 36:1-36:24 - Stephanie Abrecht, Lydia Gauerhof, Christoph Gladisch, Konrad Groh, Christian Heinzemann, Matthias Woehrle:

Testing Deep Learning-based Visual Perception for Automated Driving. 37:1-37:28 - Colin Shea-Blymyer, Houssam Abbas:

Algorithmic Ethics: Formalization and Verification of Autonomous Vehicle Obligations. 38:1-38:25 - Wei Jiang, Zhiyuan He

, Jinyu Zhan, Weijia Pan, Deepak Adhikari
:
Research Progress and Challenges on Application-Driven Adversarial Examples: A Survey. 39:1-39:25 - Menghong Feng, Noman Bashir

, Prashant J. Shenoy
, David Emory Irwin, Beka Kosanovic:
Model-driven Per-panel Solar Anomaly Detection for Residential Arrays. 40:1-40:20 - Md. Tahmid Rahman Laskar, Jimmy Xiangji Huang

, Vladan Smetana, Chris Stewart, Kees Pouw, Aijun An
, Stephen Chan, Lei Liu
:
Extending Isolation Forest for Anomaly Detection in Big Data via K-Means. 41:1-41:26 - Tommaso Zoppi, Mohamad Gharib

, Muhammad Atif, Andrea Bondavalli
:
Meta-Learning to Improve Unsupervised Intrusion Detection in Cyber-Physical Systems. 42:1-42:27 - Chia-Heng Tu, Qihui Sun, Hsiao-Hsuan Chang:

RAP: A Software Framework of Developing Convolutional Neural Networks for Resource-constrained Devices Using Environmental Monitoring as a Case Study. 43:1-43:28 - Saideep Tiku

, Prathmesh Kale, Sudeep Pasricha:
QuickLoc: Adaptive Deep-Learning for Fast Indoor Localization with Mobile Devices. 44:1-44:30 - Tieu Long Mai, Nicolas Navet:

Deep Learning to Predict the Feasibility of Priority-Based Ethernet Network Configurations. 45:1-45:26

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














