Last update:
Tue Aug 20 09:24:21 MDT 2024
Tei Kuo Introduction . . . . . . . . . . . . . . 1e:1--1e:1
John A. Stankovic Research Directions for Cyber Physical
Systems in Wireless and Mobile
Healthcare . . . . . . . . . . . . . . . 1:1--1:12
Jianjia Wu and
Wei Zhao Design and Realization of WInternet:
From Net of Things to Internet of Things 2:1--2:12
Edward A. Lee Fundamental Limits of Cyber-Physical
Systems Modeling . . . . . . . . . . . . 3:1--3:26
Desheng Zhang and
Juanjuan Zhao and
Fan Zhang and
Tian He and
Haengju Lee and
Sang H. Son Heterogeneous Model Integration for
Multi-Source Urban Infrastructure Data 4:1--4:26
Zhichuan Huang and
Ting Zhu and
David Irwin and
Aditya Mishra and
Daniel Menasche and
Prashant Shenoy Minimizing Transmission Loss in Smart
Microgrids by Sharing Renewable Energy 5:1--5:22
Desheng Zhang and
Juanjuan Zhao and
Fan Zhang and
Ruobing Jiang and
Tian He and
Nikos Papanikolopoulos Last-Mile Transit Service with Urban
Infrastructure Data . . . . . . . . . . 6:1--6:26
Riham Altawy and
Amr M. Youssef Security, Privacy, and Safety Aspects of
Civilian Drones: A Survey . . . . . . . 7:1--7:25
Rui Tan and
Hoang Hai Nguyen and
David K. Y. Yau Collaborative Load Management with
Safety Assurance in Smart Grids . . . . 12:1--12:27
Liang He and
Eugene Kim and
Kang G. Shin A Case Study on Improving Capacity
Delivery of Battery Packs via
Reconfiguration . . . . . . . . . . . . 11:1--11:23
David Irwin and
Srinivasan Iyengar and
Stephen Lee and
Aditya Mishra and
Prashant Shenoy and
Ye Xu Enabling Distributed Energy Storage by
Incentivizing Small Load Shifts . . . . 10:1--10:30
Jian-Min Jiang and
Huibiao Zhu and
Qin Li and
Yongxin Zhao and
Lin Zhao and
Shi Zhang and
Ping Gong and
Zhong Hong and
Donghuo Chen Event-Based Mobility Modeling and
Analysis . . . . . . . . . . . . . . . . 9:1--9:32
Marco Zimmerling and
Luca Mottola and
Pratyush Kumar and
Federico Ferrari and
Lothar Thiele Adaptive Real-Time Communication for
Wireless Cyber-Physical Systems . . . . 8:1--8:29
Ilias Gerostathopoulos and
Tomas Bures and
Petr Hnetynka and
Adam Hujecek and
Frantisek Plasil and
Dominik Skoda Strengthening Adaptation in
Cyber-Physical Systems via
Meta-Adaptation Strategies . . . . . . . 13:1--13:25
Kedar Khandeparkar and
Krithi Ramamritham and
Rajeev Gupta QoS-Driven Data Processing Algorithms
for Smart Electric Grids . . . . . . . . 14:1--14:24
Junkil Park and
Radoslav Ivanov and
James Weimer and
Miroslav Pajic and
Sang Hyuk Son and
Insup Lee Security of Cyber-Physical Systems in
the Presence of Transient Sensor Faults 15:1--15:23
Hongwei Wang and
Yunlong Gao and
Shaohan Hu and
Shiguang Wang and
Renato Mancuso and
Minje Kim and
Poliang Wu and
Lu Su and
Lui Sha and
Tarek Abdelzaher On Exploiting Structured Human
Interactions to Enhance Sensing Accuracy
in Cyber-physical Systems . . . . . . . 16:1--16:19
Wei Zhao and
Tarek Abdelzaher Preface to the Special Issue: Toward an
Efficient and Effective Internet of
Things for Cyber-Physical Systems . . . 7:1--7:2
Roy Dong and
Lillian J. Ratliff and
Alvaro A. Cárdenas and
Henrik Ohlsson and
S. Shankar Sastry Quantifying the Utility--Privacy
Tradeoff in the Internet of Things . . . 8:1--8:28
Sze Zheng Yong and
Minghui Zhu and
Emilio Frazzoli Switching and Data Injection Attacks on
Stochastic Cyber-Physical Systems:
Modeling, Resilient Estimation, and
Attack Mitigation . . . . . . . . . . . 9:1--9:2
Qiang Wu and
T. John Koo and
Yoshihiko Susuki Dynamic Security Analysis of Power
Systems by a Sampling-Based Algorithm 10:1--10:26
Guanjun Liu and
Changjun Jiang and
Mengchu Zhou Time-Soundness of Time Petri Nets
Modelling Time-Critical Systems . . . . 11:1--11:27
Gerry Siegemund and
Volker Turau A Self-Stabilizing Publish/Subscribe
Middleware for IoT Applications . . . . 12:1--12:26
Alessandro A. Nacci and
Vincenzo Rana and
Bharathan Balaji and
Paola Spoletini and
Rajesh Gupta and
Donatella Sciuto and
Yuvraj Agarwal BuildingRules: a Trigger--Action-Based
System to Manage Complex Commercial
Buildings . . . . . . . . . . . . . . . 13:1--13:22
Ping Wang and
Meng Ma and
Chao-Hsien Chu Long-Term Event Processing over Data
Streams in Cyber-Physical Systems . . . 14:1--14:23
Wei Zhao and
Tarek Abdelzaher Preface to the Special Issue: Toward an
Efficient and Effective Internet of
Things for Cyber-Physical Systems (Part
II) . . . . . . . . . . . . . . . . . . 15:1--15:2
Subhav Pradhan and
Abhishek Dubey and
Shweta Khare and
Saideep Nannapaneni and
Aniruddha Gokhale and
Sankaran Mahadevan and
Douglas C. Schmidt and
Martin Lehofer CHARIOT: Goal-Driven Orchestration
Middleware for Resilient IoT Systems . . 16:1--16:37
Farzad Samie and
Vasileios Tsoutsouras and
Lars Bauer and
Sotirios Xydis and
Dimitrios Soudris and
Jörg Henkel Distributed Trade-Based Edge Device
Management in Multi-Gateway IoT . . . . 17:1--17:25
Jinwei Liu and
Haiying Shen and
Husnu S. Narman and
Wingyan Chung and
Zongfang Lin A Survey of Mobile Crowdsensing
Techniques: a Critical Component for The
Internet of Things . . . . . . . . . . . 18:1--18:26
Paul Martin and
Andrew Symington and
Mani Srivastava SLATS: Simultaneous Localization and
Time Synchronization . . . . . . . . . . 19:1--19:25
Qianyi Huang and
Yan Mei and
Wei Wang and
Qian Zhang Toward Battery-Free Wearable Devices:
The Synergy between Two Feet . . . . . . 20:1--20:18
Amel Bennaceur and
Thein Than Tun and
Arosha K. Bandara and
Yijun Yu and
Bashar Nuseibeh Feature-Driven Mediator Synthesis:
Supporting Collaborative Security in the
Internet of Things . . . . . . . . . . . 21:1--21:25
Lei Bu and
Wen Xiong and
Chieh-Jan Mike Liang and
Shi Han and
Dongmei Zhang and
Shan Lin and
Xuandong Li Systematically Ensuring the Confidence
of Real-Time Home Automation IoT Systems 22:1--22:23
Luan V. Nguyen and
Khaza Anuarul Hoque and
Stanley Bak and
Steven Drager and
Taylor T. Johnson Cyber-Physical Specification Mismatches 23:1--23:26
Rajrup Ghosh and
Yogesh Simmhan Distributed Scheduling of Event
Analytics across Edge and Cloud . . . . 24:1--24:28
Mischa Schmidt and
Anett Schülke and
Alberto Venturi and
Roman Kurpatov and
Enrique Blanco Henríquez Cyber-Physical System for
Energy-Efficient Stadium Operation:
Methodology and Experimental Validation 25:1--25:26
Wanli Chang and
Dip Goswami and
Samarjit Chakraborty and
Arne Hamann OS-Aware Automotive Controller Design
Using Non-Uniform Sampling . . . . . . . 26:1--26:22
Xiaofeng Wang and
Naira Hovakimyan and
Lui Sha RSimplex: a Robust Control Architecture
for Cyber And Physical Failures . . . . 27:1--27:26
Subhash Lakshminarayana and
Teo Zhan Teng and
Rui Tan and
David K. Y. Yau Modeling and Detecting False Data
Injection Attacks against Railway
Traction Power Systems . . . . . . . . . 28:1--28:29
Insup Lee and
Miroslav Pajic Guest Editorial: Special Issue on
Medical Cyber-Physical Systems . . . . . 29:1--29:2
Pasquale Buonocunto and
Andrea Giantomassi and
Mauro Marinoni and
Davide Calvaresi and
Giorgio Buttazzo A Limb Tracking Platform for
Tele-Rehabilitation . . . . . . . . . . 30:1--30:23
D. De Venuto and
V. F. Annese and
G. Mezzina and
F. Scioscia and
M. Ruta and
E. Di Sciascio and
A. Sangiovanni Vincentelli A Mobile Health System for
Neurocognitive Impairment Evaluation
Based on P300 Detection . . . . . . . . 31:1--31:21
Eugene Yip and
Sidharta Andalam and
Partha S. Roop and
Avinash Malik and
Mark L. Trew and
Weiwei Ai and
Nitish Patel Towards the Emulation of the Cardiac
Conduction System for Pacemaker
Validation . . . . . . . . . . . . . . . 32:1--32:26
Nicola Paoletti and
Andrea Patan\`e and
Marta Kwiatkowska Closed-Loop Quantitative Verification of
Rate-Adaptive Pacemakers . . . . . . . . 33:1--33:31
Guillaume Joerger and
Juliette Rambourg and
Helene Gaspard-Boulinc and
Stephane Conversy and
Barbara L. Bass and
Brian J. Dunkin and
Marc Garbey A Cyber-Physical System to Improve the
Management of a Large Suite of Operating
Rooms . . . . . . . . . . . . . . . . . 34:1--34:24
André A. Geraldes and
Luca Geretti and
Davide Bresolin and
Riccardo Muradore and
Paolo Fiorini and
Leonardo S. Mattos and
Tiziano Villa Formal Verification of Medical CPS: a
Laser Incision Case Study . . . . . . . 35:1--35:29
Md Zakirul Alam Bhuiyan and
Sy-yen Kuo and
Damian Lyons and
Zili Shao Dependability in Cyber-Physical Systems
and Applications . . . . . . . . . . . . 1:1--1:4
Feng Tan and
Liansheng Liu and
Stefan Winter and
Qixin Wang and
Neeraj Suri and
Lei Bu and
Yu Peng and
Xue Liu and
Xiyuan Peng Cross-Domain Noise Impact Evaluation for
Black Box Two-Level Control CPS . . . . 2:1--2:25
Yehan Ma and
Dolvara Gunatilaka and
Bo Li and
Humberto Gonzalez and
Chenyang Lu Holistic Cyber-Physical Management for
Dependable Wireless Control Systems . . 3:1--3:25
Guoqi Xie and
Gang Zeng and
Jiyao An and
Renfa Li and
Keqin Li Resource-Cost-Aware Fault-Tolerant
Design Methodology for End-to-End
Functional Safety Computation on
Automotive Cyber-Physical Systems . . . 4:1--4:27
Yang Liu and
Xiaoming Chen and
Dileep Kadambi and
Ajinkya Bari and
Xin Li and
Shiyan Hu and
Pingqiang Zhou Dependable Visual Light-Based Indoor
Localization with Automatic Anomaly
Detection for Location-Based Service of
Mobile Cyber-Physical Systems . . . . . 5:1--5:17
Tian Wang and
Wenhua Wang and
Anfeng Liu and
Shaobin Cai and
Jiannong Cao Improve the Localization Dependability
for Cyber-Physical Applications . . . . 6:1--6:21
Chang Wang and
Yongxin Zhu and
Weiwei Shi and
Victor Chang and
P. Vijayakumar and
Bin Liu and
Yishu Mao and
Jiabao Wang and
Yiping Fan A Dependable Time Series Analytic
Framework for Cyber-Physical Systems of
IoT-based Smart Grid . . . . . . . . . . 7:1--7:18
Jiahui Yu and
Kun Wang and
Deze Zeng and
Chunsheng Zhu and
Song Guo Privacy-preserving Data Aggregation
Computing in Cyber-Physical Social
Systems . . . . . . . . . . . . . . . . 8:1--8:23
Ning Li and
Zheng Yan and
Mingjun Wang and
Laurence T. Yang Securing Communication Data in Pervasive
Social Networking Based on Trust with
KP-ABE . . . . . . . . . . . . . . . . . 9:1--9:23
Beibei Li and
Rongxing Lu and
Kim-Kwang Raymond Choo and
Wei Wang and
Sheng Luo On Reliability Analysis of Smart Grids
under Topology Attacks: a Stochastic
Petri Net Approach . . . . . . . . . . . 10:1--10:25
Qingchen Zhang and
Laurence T. Yang and
Zhikui Chen and
Peng Li Dependable Deep Computation Model for
Feature Learning on Big Data in
Cyber-Physical Systems . . . . . . . . . 11:1--11:17
Yu Jiang and
Houbing Song and
Yixiao Yang and
Han Liu and
Ming Gu and
Yong Guan and
Jiaguang Sun and
Lui Sha Dependable Model-driven Development of
CPS: From Stateflow Simulation to
Verified Implementation . . . . . . . . 12:1--12:31
Jiang Wan and
Anthony Lopez and
Mohammad Abdullah Al Faruque Physical Layer Key Generation: Securing
Wireless Communication in Automotive
Cyber-Physical Systems . . . . . . . . . 13:1--13:26
Pei-Chi Huang and
Luis Sentis and
Joel Lehman and
Chien-Liang Fok and
Aloysius K. Mok and
Risto Miikkulainen Tradeoffs in Neuroevolutionary
Learning-Based Real-Time Robotic Task
Design in the Imprecise Computation
Framework . . . . . . . . . . . . . . . 14:1--14:29
Roopak Sinha and
Barry Dowdeswell and
Gulnara Zhabelova and
Valeriy Vyatkin TORUS: Scalable Requirements
Traceability for Large-Scale
Cyber-Physical Systems . . . . . . . . . 15:1--15:25
Edward Tremel and
Ken Birman and
Robert Kleinberg and
Márk Jelasity Anonymous, Fault-Tolerant Distributed
Queries for Smart Devices . . . . . . . 16:1--16:29
Srinivasan Iyengar and
Sandeep Kalra and
Anushree Ghosh and
David Irwin and
Prashant Shenoy and
Benjamin Marlin Inferring Smart Schedules for Dumb
Thermostats . . . . . . . . . . . . . . 17:1--17:29
Andrea Ceccarelli and
Tommaso Zoppi and
Alexandr Vasenev and
Marco Mori and
Dan Ionita and
Lorena Montoya and
Andrea Bondavalli Threat Analysis in Systems-of-Systems:
an Emergence-Oriented Approach . . . . . 18:1--18:24
Marco Biagi and
Laura Carnevali and
Fabio Tarani and
Enrico Vicario Model-Based Quantitative Evaluation of
Repair Procedures in Gas Distribution
Networks . . . . . . . . . . . . . . . . 19:1--19:26
C. W. Badenhop and
S. R. Graham and
B. E. Mullins and
L. O. Mailloux Looking Under the Hood of Z-Wave:
Volatile Memory Introspection for the
ZW0301 Transceiver . . . . . . . . . . . 20:1--20:24
Desheng Zhang and
Tian He and
Fan Zhang National-scale Traffic Model Calibration
in Real Time with Multi-source
Incomplete Data . . . . . . . . . . . . 21:1--21:26
William Koch and
Renato Mancuso and
Richard West and
Azer Bestavros Reinforcement Learning for UAV Attitude
Control . . . . . . . . . . . . . . . . 22:1--22:21
Sean Barker and
Sandeep Kalra and
David Irwin and
Prashant Shenoy Building Virtual Power Meters for Online
Load Tracking . . . . . . . . . . . . . 23:1--23:24
Luis Almeida and
Bjorn Andersson and
Jen-Wei Hsieh and
Li-Pin Chang and
Xiaobo Sharon Hu Introduction to the Special Issue on
Real-Time aspects in Cyber-Physical
Systems . . . . . . . . . . . . . . . . 24:1--24:2
Shunsuke Aoki and
Ragunathan (Raj) Rajkumar CSIP: a Synchronous Protocol for
Automated Vehicles at Road Intersections 25:1--25:25
Philip Parsch and
Alejandro Masrur Accounting for Reliability in
Unacknowledged Time-Constrained WSNs . . 26:1--26:28
João Loureiro and
Raghuraman Rangarajan and
Borislav Nikolic and
Leandro Soares Indrusiak and
Eduardo Tovar Extensive Analysis of a Real-Time Dense
Wired Sensor Network Based on Traffic
Shaping . . . . . . . . . . . . . . . . 27:1--27:27
Baekgyu Kim and
Lu Feng and
Oleg Sokolsky and
Insup Lee Determining Timing Parameters for the
Code Generation from
Platform-Independent Timed Models . . . 28:1--28:32
Chao Wang and
Christopher Gill and
Chenyang Lu Real-Time Middleware for Cyber-Physical
Event Processing . . . . . . . . . . . . 29:1--29:25
Hendrik Roehm and
Jens Oehlerking and
Matthias Woehrle and
Matthias Althoff Model Conformance for Cyber-Physical
Systems: a Survey . . . . . . . . . . . 30:1--30:26
Dima Rabadi and
Rui Tan and
David K. Y. Yau and
Sreejaya Viswanathan and
Hao Zheng and
Peng Cheng Resilient Clock Synchronization Using
Power Grid Voltage . . . . . . . . . . . 31:1--31:26
Chen Pan and
Mimi Xie and
Song Han and
Zhi-Hong Mao and
Jingtong Hu Modeling and Optimization for
Self-powered Non-volatile IoT Edge
Devices with Ultra-low Harvesting Power 32:1--32:26
Róbinson Medina and
Juan Valencia and
Sander Stuijk and
Dip Goswami and
Twan Basten Designing a Controller with Image-based
Pipelined Sensing and Additive
Uncertainties . . . . . . . . . . . . . 33:1--33:26
Junia Valente and
Kanchan Bahirat and
Kelly Venechanos and
Alvaro A. Cardenas and
Prabhakaran Balakrishnan Improving the Security of Visual
Challenges . . . . . . . . . . . . . . . 34:1--34:26
Tongquan Wei and
Junlong Zhou and
Rajiv Ranjan and
Isaac Triguero and
Huafeng Yu and
Chun Jason Xue and
Schahram Dustdar Introduction to the Special Issue on
Human-interaction-aware Data Analytics
for Cyber-physical Systems . . . . . . . 35e:1--35e:2
Xiaokang Wang and
Laurence T. Yang and
Yihao Wang and
Xingang Liu and
Qingxia Zhang and
M. Jamal Deen A Distributed Tensor-Train Decomposition
Method for Cyber-Physical-Social
Services . . . . . . . . . . . . . . . . 35:1--35:15
Tingmin Wu and
Lihong Tang and
Rongjunchen Zhang and
Sheng Wen and
Cecile Paris and
Surya Nepal and
Marthie Grobler and
Yang Xiang Catering to Your Concerns: Automatic
Generation of Personalised
Security-Centric Descriptions for
Android Apps . . . . . . . . . . . . . . 36:1--36:21
Wei Li and
Xiaomin Chang and
Junwei Cao and
Ting Yang and
Yaojie Sun and
Albert Y. Zomaya A Sustainable and User-Behavior-Aware
Cyber-Physical System for Home Energy
Management . . . . . . . . . . . . . . . 37:1--37:24
Fu Xiao and
Jing Chen and
Zhetao Li and
Haiping Huang and
Lijuan Sun Improved LDA Dimension Reduction Based
Behavior Learning with Commodity WiFi
for Cyber-Physical Systems . . . . . . . 38:1--38:19
Guoqi Xie and
Yang Bai and
Wei Wu and
Yanwen Li and
Renfa Li and
Keqin Li Human-Interaction-aware Adaptive
Functional Safety Processing for
Multi-Functional Automotive
Cyber-Physical Systems . . . . . . . . . 39:1--39:25
Hui Huang and
Shiyan Hu and
Ye Sun Energy-Efficient ECG Signal Compression
for User Data Input in Cyber-Physical
Systems by Leveraging Empirical Mode
Decomposition . . . . . . . . . . . . . 40:1--40:19
Hyung-Jin Yoon and
Christopher Widdowson and
Thiago Marinho and
Ranxiao Frances Wang and
Naira Hovakimyan Socially Aware Path Planning for a
Flying Robot in Close Proximity of
Humans . . . . . . . . . . . . . . . . . 41:1--41:24
Chaoqun Yang and
Li Feng and
Zhiguo Shi and
Rongxing Lu and
Kim-Kwang Raymond Choo A Crowdsensing-based Cyber-physical
System for Drone Surveillance Using
Random Finite Set Theory . . . . . . . . 42:1--42:22
Samarjit Chakraborty and
Tian He Introduction to the Special Issue on
Transportation Cyber-Physical Systems 1:1--1:3
Mostafa Gilanifar and
Hui Wang and
Eren Erman Ozguven and
Yuxun Zhou and
Reza Arghandeh Bayesian Spatiotemporal Gaussian Process
for Short-term Load Forecasting Using
Combined Transportation and Electricity
Data . . . . . . . . . . . . . . . . . . 2:1--2:25
Bowen Zheng and
Chung-Wei Lin and
Shinichi Shiraishi and
Qi Zhu Design and Analysis of Delay-Tolerant
Intelligent Intersection Management . . 3:1--3:27
Subhojeet Mukherjee and
Jeffrey C. Van Etten and
Namburi Rani Samyukta and
Jacob Walker and
Indrakshi Ray and
Indrajit Ray TruckSTM: Runtime Realization of
Operational State Transitions for Medium
and Heavy Duty Vehicles . . . . . . . . 4:1--4:25
Sebastian Van De Hoef and
Jonas Mårtensson and
Dimos V. Dimarogonas and
Karl Henrik Johansson A Predictive Framework for Dynamic
Heavy-Duty Vehicle Platoon Coordination 5:1--5:25
Yue Guan and
Anuradha M. Annaswamy and
H. Eric Tseng A Dynamic Routing Framework for Shared
Mobility Services . . . . . . . . . . . 6:1--6:28
Hoon Wei Lim and
William G. Temple and
Bao Anh N. Tran and
Binbin Chen and
Zbigniew Kalbarczyk and
Jianying Zhou Data Integrity Threats and
Countermeasures in Railway Spot
Transmission Systems . . . . . . . . . . 7:1--7:26
Baekgyu Kim and
Takato Masuda and
Shinichi Shiraishi Test Specification and Generation for
Connected and Autonomous Vehicle in
Virtual Environments . . . . . . . . . . 8:1--8:26
Rajesh P. Barnwal and
Nirnay Ghosh and
Soumya K. Ghosh and
Sajal K. Das Publish or Drop Traffic Event Alerts?
Quality-aware Decision Making in
Participatory Sensing-based Vehicular
CPS . . . . . . . . . . . . . . . . . . 9:1--9:28
Mikael Asplund Combining Detection and Verification for
Secure Vehicular Cooperation Groups . . 10:1--10:31
Carmen Cheh and
Binbin Chen and
William G. Temple and
William H. Sanders Modeling Adversarial Physical Movement
in a Railway Station: Classification and
Metrics . . . . . . . . . . . . . . . . 11:1--11:25
Woo-Hyun Ko and
Bharadwaj Satchidanandan and
P. R. Kumar Dynamic Watermarking-based Defense of
Transportation Cyber-physical Systems 12:1--12:21
Chongguang Bi and
Jun Huang and
Guoliang Xing and
Landu Jiang and
Xue Liu and
Minghua Chen SafeWatch: a Wearable Hand Motion
Tracking System for Improving Driving
Safety . . . . . . . . . . . . . . . . . 13:1--13:21
Meiyi Ma and
Sarah M. Preum and
Mohsin Y. Ahmed and
William Tärneberg and
Abdeltawab Hendawi and
John A. Stankovic Data Sets, Modeling, and Decision Making
in Smart Cities: a Survey . . . . . . . 14:1--14:28
Sirajum Munir and
Hao-Tsung Yang and
Shan Lin and
S. M. Shahriar Nirjon and
Chen Lin and
Enamul Hoque and
John A. Stankovic and
Kamin Whitehouse Reliable Communication and Latency Bound
Generation in Wireless Cyber-Physical
Systems . . . . . . . . . . . . . . . . 15:1--15:26
Leonardo Babun and
Hidayet Aksu and
A. Selcuk Uluagac A System-level Behavioral Detection
Framework for Compromised CPS Devices:
Smart-Grid Case . . . . . . . . . . . . 16:1--16:28
Li Yan and
Haiying Shen TOP: Optimizing Vehicle Driving Speed
with Vehicle Trajectories for Travel
Time Minimization and Road Congestion
Avoidance . . . . . . . . . . . . . . . 17:1--17:25
Dominik Baumann and
Fabian Mager and
Romain Jacob and
Lothar Thiele and
Marco Zimmerling and
Sebastian Trimpe Fast Feedback Control over Multi-hop
Wireless Networks with Mode Changes and
Stability Guarantees . . . . . . . . . . 18:1--18:32
J. Harbin and
A. Burns and
R. I. Davis and
L. S. Indrusiak and
I. Bate and
D. Griffin The AirTight Protocol for Mixed
Criticality Wireless CPS . . . . . . . . 19:1--19:28
Mohammad Khayatian and
Yingyan Lou and
Mohammadreza Mehrabian and
Aviral Shirvastava Crossroads+: a Time-aware Approach for
Intersection Management of Connected
Autonomous Vehicles . . . . . . . . . . 20:1--20:28
Christopher Pereyda and
Nisha Raghunath and
Bryan Minor and
Garrett Wilson and
Maureen Schmitter-Edgecombe and
Diane J. Cook Cyber-physical Support of Daily
Activities: a Robot/Smart Home
Partnership . . . . . . . . . . . . . . 21:1--21:24
Kai Li and
Wei Ni and
Yousef Emami and
Yiran Shen and
Ricardo Severino and
David Pereira and
Eduardo Tovar Design and Implementation of Secret Key
Agreement for Platoon-based Vehicular
Cyber-physical Systems . . . . . . . . . 22:1--22:20
Voica Gavrilut and
Paul Pop Traffic-type Assignment for TSN-based
Mixed-criticality Cyber-physical Systems 23:1--23:27
Zhicheng Fu and
Chunhui Guo and
Zhenyu Zhang and
Shangping Ren and
Lui Sha UACFinder: Mining Syntactic Carriers of
Unspecified Assumptions in Medical
Cyber-Physical System Design Models . . 24:1--24:25
Zhenyong Zhang and
Ruilong Deng and
David K. Y. Yau and
Peng Cheng and
Jiming Chen On Hiddenness of Moving Target Defense
against False Data Injection Attacks on
Power Grid . . . . . . . . . . . . . . . 25:1--25:29
Ali Tamimi and
Adam Hahn and
Sandip Roy Cyber Threat Impact Analysis to Air
Traffic Flows Through Dynamic Queue
Networks . . . . . . . . . . . . . . . . 26:1--26:22
Di Wu and
Hanlin Zhu and
Yongxin Zhu and
Victor Chang and
Cong He and
Ching-Hsien Hsu and
Hui Wang and
Songlin Feng and
Li Tian and
Zunkai Huang Anomaly Detection Based on RBM-LSTM
Neural Network for CPS in Advanced
Driver Assistance System . . . . . . . . 27:1--27:17
Vuk Lesi and
Ilija Jovanov and
Miroslav Pajic Integrating Security in
Resource-Constrained Cyber-Physical
Systems . . . . . . . . . . . . . . . . 28:1--28:27
Neetesh Saxena and
Alvaro A. Cardenas and
Raheem Beyah and
Rongxing Lu and
Kim-Kwang Raymond Choo and
Yiran Chen Introduction to the Special Issue on
User-Centric Security and Safety for CPS 29:1--29:2
Ding Wang and
Ping Wang and
Chenyu Wang Efficient Multi-Factor User
Authentication Protocol with Forward
Secrecy for Real-Time Data Access in
WSNs . . . . . . . . . . . . . . . . . . 30:1--30:26
Mohammadhadi Alaeiyan and
Ali Dehghantanha and
Tooska Dargahi and
Mauro Conti and
Saeed Parsa A Multilabel Fuzzy Relevance Clustering
System for Malware Attack Attribution in
the Edge Layer of Cyber-Physical
Networks . . . . . . . . . . . . . . . . 31:1--31:22
Deepak Puthal and
Laurence T. Yang and
Schahram Dustdar and
Zhenyu Wen and
Song Jun and
Aad van Moorsel and
Rajiv Ranjan A User-centric Security Solution for
Internet of Things and Edge Convergence 32:1--32:19
George Hatzivasilis and
Othonas Soultatos and
Sotiris Ioannidis and
George Spanoudakis and
Vasilios Katos and
Giorgos Demetriou MobileTrust: Secure Knowledge
Integration in VANETs . . . . . . . . . 33:1--33:25
Meriem Guerar and
Luca Verderame and
Alessio Merlo and
Francesco Palmieri and
Mauro Migliardi and
Luca Vallerini CirclePIN: a Novel Authentication
Mechanism for Smartwatches to Prevent
Unauthorized Access to IoT Devices . . . 34:1--34:19
Ke Huang and
Xiaosong Zhang and
Xiaofen Wang and
Yi Mu and
Fatemeh Rezaeibagha and
Guangquan Xu and
Hao Wang and
Xi Zheng and
Guomin Yang and
Qi Xia and
Xiaojiang Du HUCDO: a Hybrid User-centric Data
Outsourcing Scheme . . . . . . . . . . . 35:1--35:23
Mohammadreza Arani and
Deepa Kundur A User-centric Approach toward Resilient
Frequency-regulating Wind Generators . . 36:1--36:23
Axel Jantsch and
Peter R. Lewis and
Nikil Dutt Introduction to the Special Issue on
Self-Aware Cyber-physical Systems . . . 37:1--37:2
K. Bellman and
C. Landauer and
N. Dutt and
L. Esterle and
A. Herkersdorf and
A. Jantsch and
N. TaheriNejad and
P. R. Lewis and
M. Platzner and
K. Tammemäe Self-aware Cyber-Physical Systems . . . 38:1--38:26
Lukas Esterle and
John N. A. Brown I Think Therefore You Are: Models for
Interaction in Collectives of Self-aware
Cyber-physical Systems . . . . . . . . . 39:1--39:25
Adrian Sapio and
Shuvra S. Bhattacharyya and
Marilyn Wolf Runtime Adaptation in Wireless Sensor
Nodes Using Structured Learning . . . . 40:1--40:28
Yehan Ma and
Chenyang Lu and
Yebin Wang Efficient Holistic Control:
Self-awareness across Controllers and
Wireless Networks . . . . . . . . . . . 41:1--41:27
Ruizhi Chai and
Ying Zhang and
Geng Sun and
Hongsheng Li Self-aware Power Management for
Maintaining Event Detection Probability
of Supercapacitor-powered Cyber-physical
Systems . . . . . . . . . . . . . . . . 42:1--42:19
Matthew Weber and
Baihong Jin and
Gil Lederman and
Yasser Shoukry and
Edward A. Lee and
Sanjit Seshia and
Alberto Sangiovanni-Vincentelli Gordian: Formal Reasoning-based Outlier
Detection for Secure Localization . . . 43:1--43:27
Hong Lu and
Tao Yue and
Shaukat Ali Pattern-based Interactive Configuration
Derivation for Cyber-physical System
Product Lines . . . . . . . . . . . . . 44:1--44:24
Craig Bakker and
Arnab Bhattacharya and
Samrat Chatterjee and
Draguna L. Vrabie Hypergames and Cyber-Physical Security
for Control Systems . . . . . . . . . . 45:1--45:41
Yunhao Bai and
Kuangyu Zheng and
Zejiang Wang and
Xiaorui Wang and
Junmin Wang MC-Safe: Multi-channel Real-time V2V
Communication for Enhancing Driving
Safety . . . . . . . . . . . . . . . . . 46:1--46:27
Pushpak Jagtap and
Fardin Abdi and
Matthias Rungger and
Majid Zamani and
Marco Caccamo Software Fault Tolerance for
Cyber-Physical Systems via Full System
Restart . . . . . . . . . . . . . . . . 47:1--47:20
Mohammad Khayatian and
Mohammadreza Mehrabian and
Edward Andert and
Rachel Dedinsky and
Sarthake Choudhary and
Yingyan Lou and
Aviral Shirvastava A Survey on Intersection Management of
Connected Autonomous Vehicles . . . . . 48:1--48:27
Moreno Ambrosin and
Mauro Conti and
Riccardo Lazzeretti and
Chia-Mu Yu Introduction to the Special Issue on
Security and Privacy for Connected
Cyber-physical Systems . . . . . . . . . 1:1--1:2
Kaushal Kafle and
Kevin Moran and
Sunil Manandhar and
Adwait Nadkarni and
Denys Poshyvanyk Security in Centralized Data Store-based
Home Automation Platforms: a Systematic
Analysis of Nest and Hue . . . . . . . . 2:1--2:27
Nisha Panwar and
Shantanu Sharma and
Guoxi Wang and
Sharad Mehrotra and
Nalini Venkatasubramanian CANOPY: a Verifiable Privacy-Preserving
Token Ring-Based Communication Protocol
for Smart Homes . . . . . . . . . . . . 3:1--3:34
Muhammad Ajmal Azad and
Charith Perera and
Samiran Bag and
Mahmoud Barhamgi and
Feng Hao Privacy-preserving Crowd-sensed Trust
Aggregation in the User-centeric
Internet of People Networks . . . . . . 4:1--4:24
Gabriela Suntaxi and
Aboubakr Achraf El Ghazi and
Klemens Böhm Preserving Secrecy in Mobile Social
Networks . . . . . . . . . . . . . . . . 5:1--5:29
Heena Rathore and
Abhay Samant and
Murtuza Jadliwala TangleCV: a Distributed Ledger Technique
for Secure Message Sharing in Connected
Vehicles . . . . . . . . . . . . . . . . 6:1--6:25
Abhimanyu Rawat and
Mohammad Khodari and
Mikael Asplund and
Andrei Gurtov Decentralized Firmware Attestation for
In-Vehicle Networks . . . . . . . . . . 7:1--7:23
Scott Eisele and
Taha Eghtesad and
Keegan Campanelli and
Prakhar Agrawal and
Aron Laszka and
Abhishek Dubey Safe and Private Forward-trading
Platform for Transactive Microgrids . . 8:1--8:29
Venkata Reddy Palleti and
Vishrut Kumar Mishra and
Chuadhry Mujeeb Ahmed and
Aditya Mathur Can Replay Attacks Designed to Steal
Water from Water Distribution Systems
Remain Undetected? . . . . . . . . . . . 9:1--9:19
Abdelaziz Khaled and
Samir Ouchani and
Zahir Tari and
Khalil Drira Assessing the Severity of Smart Attacks
in Industrial Cyber-Physical Systems . . 10:1--10:28
Claudio A. Ardagna and
Rasool Asal and
Ernesto Damiani and
Nabil El Ioini and
Mehdi Elahi and
Claus Pahl From Trustworthy Data to Trustworthy
IoT: a Data Collection Methodology Based
on Blockchain . . . . . . . . . . . . . 11:1--11:26
Aviral Shrivastava and
Patricia Derler Introduction to the Special Issue on
Time for CPS (TCPS) . . . . . . . . . . 12:1--12:2
Rafael Rosales and
Michael Paulitsch Composable Finite State Machine-based
Modeling for
Quality-of-Information-aware
Cyber-physical Systems . . . . . . . . . 13:1--13:27
Kai-Björn Gemlau and
Leonie KÖHLER and
Rolf Ernst and
Sophie Quinton System-level Logical Execution Time:
Augmenting the Logical Execution Time
Paradigm for Distributed Real-time
Automotive Software . . . . . . . . . . 14:1--14:27
João Bastos and
Jeroen Voeten and
Sander Stuijk and
Ramon Schiffelers and
Henk Corporaal Taming the State-space Explosion in the
Makespan Optimization of Flexible
Manufacturing Systems . . . . . . . . . 15:1--15:26
Bingzhuo Zhong and
Claudius Jordan and
Julien Provost Extending Signal Temporal Logic with
Quantitative Semantics by Intervals for
Robust Monitoring of Cyber-physical
Systems . . . . . . . . . . . . . . . . 16:1--16:25
Fei Miao and
Sihong He and
Lynn Pepin and
Shuo Han and
Abdeltawab Hendawi and
Mohamed E. Khalefa and
John A. Stankovic and
George Pappas Data-driven Distributionally Robust
Optimization For Vehicle Balancing of
Mobility-on-Demand Systems . . . . . . . 17:1--17:27
Laksh Bhatia and
Ivana Tomi\'c and
Anqi Fu and
Michael Breza and
Julie A. Mccann Control Communication Co-Design for Wide
Area Cyber-Physical Systems . . . . . . 18:1--18:27
Li Yan and
Haiying Shen Utilizing Game Theory to Optimize
In-motion Wireless Charging Service
Efficiency for Electric Vehicles . . . . 19:1--19:26
Luyao Niu and
Andrew Clark A Differentially Private Incentive
Design for Traffic Offload to Public
Transportation . . . . . . . . . . . . . 20:1--20:27
Srinarayana Nagarathinam and
Arunchandar Vasan and
Venkatesh Sarangan and
Rajesh Jayaprakash and
Anand Sivasubramaniam User Placement and Optimal Cooling
Energy for Co-working Building Spaces 21:1--21:24
Chenyang Lu Toward a Scientific and Engineering
Discipline of Cyber-Physical Systems . . 22e:1--22e:2
Giuseppe Bombara and
Calin Belta Offline and Online Learning of Signal
Temporal Logic Formulae Using Decision
Trees . . . . . . . . . . . . . . . . . 22:1--22:23
Craig Bakker and
Arnab Bhattacharya and
Samrat Chatterjee and
Draguna L. Vrabie Metagames and Hypergames for
Deception-Robust Control . . . . . . . . 23:1--23:25
Pierre-François Gimenez and
Jonathan Roux and
Eric Alata and
Guillaume Auriol and
Mohamed Kaaniche and
Vincent Nicomette \pkgRIDS: Radio Intrusion Detection and
Diagnosis System for Wireless
Communications in Smart Environment . . 24:1--24:1
Shrey Baheti and
Shreyas Badiger and
Yogesh Simmhan \pkgVIoLET: an Emulation Environment for
Validating IoT Deployments at Large
Scales . . . . . . . . . . . . . . . . . 25:1--25:39
Jiachen Mao and
Huanrui Yang and
Ang Li and
Hai Li and
Yiran Chen \pkgTPrune: Efficient Transformer
Pruning for Mobile Devices . . . . . . . 26:1--26:22
Kai Li and
Ning Lu and
Jingjing Zheng and
Pei Zhang and
Wei Ni and
Eduardo Tovar \pkgBloothAir: a Secure Aerial Relay
System Using Bluetooth Connected
Autonomous Drones . . . . . . . . . . . 27:1--27:22
Jianjun Wen and
Waltenegus Dargie Characterization of Link Quality
Fluctuation in Mobile Wireless Sensor
Networks . . . . . . . . . . . . . . . . 28:1--28:24
Gonçalo Jesus and
António Casimiro and
Anabela Oliveira Using Machine Learning for Dependable
Outlier Detection in Environmental
Monitoring Systems . . . . . . . . . . . 29:1--29:30
Martín Barr\`ere and
Chris Hankin Analysing Mission-critical
Cyber-physical Systems with AND/OR
Graphs and MaxSAT . . . . . . . . . . . 30:1--30:29
Hamza Bourbouh and
Pierre-Lo\"\ic Garoche and
Christophe Garion and
Xavier Thirioux From Lustre to Simulink: Reverse
Compilation for Embedded Systems
Applications . . . . . . . . . . . . . . 31:1--31:20
Georgios Bakirtzis and
Cody H. Fleming and
Christina Vasilakopoulou Categorical Semantics of Cyber-Physical
Systems Theory . . . . . . . . . . . . . 32:1--32:32
Jingtong Hu and
Qi Zhu and
Susmit Jha Introduction to the Special Issue on
Artificial Intelligence and
Cyber-Physical Systems: Part 1 . . . . . 33:1--33:3
Jianguo Chen and
Kenli Li and
Keqin Li and
Philip S. Yu and
Zeng Zeng Dynamic Bicycle Dispatching of Dockless
Public Bicycle-sharing Systems Using
Multi-objective Reinforcement Learning 34:1--34:24
Alëna Rodionova and
Yash Vardhan Pant and
Connor Kurtz and
Kuk Jang and
Houssam Abbas and
Rahul Mangharam Learning-`N-Flying: a Learning-Based,
Decentralized Mission-Aware UAS
Collision Avoidance Scheme . . . . . . . 35:1--35:26
Siddharth Mysore and
Bassel Mabsout and
Kate Saenko and
Renato Mancuso How to Train Your Quadrotor: a Framework
for Consistently Smooth and Responsive
Flight Control via Reinforcement
Learning . . . . . . . . . . . . . . . . 36:1--36:24
Stephanie Abrecht and
Lydia Gauerhof and
Christoph Gladisch and
Konrad Groh and
Christian Heinzemann and
Matthias Woehrle Testing Deep Learning-based Visual
Perception for Automated Driving . . . . 37:1--37:28
Colin Shea-Blymyer and
Houssam Abbas Algorithmic Ethics: Formalization and
Verification of Autonomous Vehicle
Obligations . . . . . . . . . . . . . . 38:1--38:25
Wei Jiang and
Zhiyuan He and
Jinyu Zhan and
Weijia Pan and
Deepak Adhikari Research Progress and Challenges on
Application-Driven Adversarial Examples:
a Survey . . . . . . . . . . . . . . . . 39:1--39:25
Menghong Feng and
Noman Bashir and
Prashant Shenoy and
David Irwin and
Beka Kosanovic Model-driven Per-panel Solar Anomaly
Detection for Residential Arrays . . . . 40:1--40:20
Md Tahmid Rahman Laskar and
Jimmy Xiangji Huang and
Vladan Smetana and
Chris Stewart and
Kees Pouw and
Aijun An and
Stephen Chan and
Lei Liu Extending Isolation Forest for Anomaly
Detection in Big Data via $K$-Means . . 41:1--41:26
Tommaso Zoppi and
Mohamad Gharib and
Muhammad Atif and
Andrea Bondavalli Meta-Learning to Improve Unsupervised
Intrusion Detection in Cyber-Physical
Systems . . . . . . . . . . . . . . . . 42:1--42:27
Chia-Heng Tu and
Qihui Sun and
Hsiao-Hsuan Chang \pkgRAP: a Software Framework of
Developing Convolutional Neural Networks
for Resource-constrained Devices Using
Environmental Monitoring as a Case Study 43:1--43:28
Saideep Tiku and
Prathmesh Kale and
Sudeep Pasricha \pkgQuickLoc: Adaptive Deep-Learning for
Fast Indoor Localization with Mobile
Devices . . . . . . . . . . . . . . . . 44:1--44:30
Tieu Long Mai and
Nicolas Navet Deep Learning to Predict the Feasibility
of Priority-Based Ethernet Network
Configurations . . . . . . . . . . . . . 45:1--45:26
Chao Chen and
Abdelsalam (Sumi) Helal and
Zhi Jin and
Mingyue Zhang and
Choonhwa Lee \pkgIoTranx: Transactions for Safer
Smart Spaces . . . . . . . . . . . . . . 1:1--1:26
Anshul Agarwal and
Krithi Ramamritham A Novel Approach for Deploying Minimum
Sensors in Smart Buildings . . . . . . . 2:1--2:29
Debayan Roy and
Licong Zhang and
Wanli Chang and
Dip Goswami and
Birgit Vogel-Heuser and
Samarjit Chakraborty Tool Integration for Automated Synthesis
of Distributed Embedded Controllers . . 3:1--3:31
Matteo Trobinger and
Gabriel de Albuquerque Gleizer and
Timofei Istomin and
Manuel Mazo and
Amy L. Murphy and
Gian Pietro Picco The Wireless Control Bus: Enabling
Efficient Multi-Hop Event-Triggered
Control with Concurrent Transmissions 4:1--4:29
Michael I.-C. Wang and
Charles H.-P. Wen and
H. Jonathan Chao \pkgRoadrunner+: an Autonomous
Intersection Management Cooperating with
Connected Autonomous Vehicles and
Pedestrians with Spillback Considered 5:1--5:29
Junjie Yan and
Kevin Huang and
Kyle Lindgren and
Tamara Bonaci and
Howard J. Chizeck Continuous Operator Authentication for
Teleoperated Systems Using Hidden Markov
Models . . . . . . . . . . . . . . . . . 6:1--6:25
Rongrong Wang and
Duc Van Le and
Rui Tan and
Yew-Wah Wong Real-Time Cooling Power Attribution for
Co-Located Data Center Rooms with
Distinct Temperatures and Humidities . . 7:1--7:28
Fang-Chieh Chou and
Alben Rome Bagabaldo and
Alexandre M. Bayen The Lord of the Ring Road: a Review and
Evaluation of Autonomous Control
Policies for Traffic in a Ring Road . . 8:1--8:25
Liuwang Kang and
Haiying Shen Detection and Mitigation of Sensor and
CAN Bus Attacks in Vehicle Anti-Lock
Braking Systems . . . . . . . . . . . . 9:1--9:24
Jingtong Hu and
Qi Zhu and
Susmit Jha Introduction to the Special Issue on
Artificial Intelligence and
Cyber-Physical Systems --- Part 2 . . . 10:1--10:??
Kazumune Hashimoto and
Natsuko Tsumagari and
Toshimitsu Ushio Collaborative Rover-copter Path Planning
and Exploration with Temporal Logic
Specifications Based on Bayesian Update
Under Uncertain Environments . . . . . . 11:1--11:??
Elham Khodabandehloo and
Abbas Alimohammadi and
Daniele Riboni FreeSia: a Cyber-physical System for
Cognitive Assessment through
Frequency-domain Indoor Locomotion
Analysis . . . . . . . . . . . . . . . . 12:1--12:??
Xiaodong Yang and
Omar Ali Beg and
Matthew Kenigsberg and
Taylor T. Johnson A Framework for Identification and
Validation of Affine Hybrid Automata
from Input-Output Traces . . . . . . . . 13:1--13:??
Bouziane Brik and
Mourad Messaadia and
M'hammed Sahnoun and
Belgacem Bettayeb and
Mohamed Amin Benatia Fog-supported Low-latency Monitoring of
System Disruptions in Industry 4.0: a
Federated Learning Approach . . . . . . 14:1--14:??
Shreyas Ramakrishna and
Zahra Rahiminasab and
Gabor Karsai and
Arvind Easwaran and
Abhishek Dubey Efficient Out-of-Distribution Detection
Using Latent Space of $ \beta $-VAE for
Cyber-Physical Systems . . . . . . . . . 15:1--15:??
Jackson Codispoti and
Atieh R. Khamesi and
Nelson Penn and
Simone Silvestri and
Eura Shin Learning from Non-experts: an
Interactive and Adaptive Learning
Approach for Appliance Recognition in
Smart Homes . . . . . . . . . . . . . . 16:1--16:??
Maxim Shcherbakov and
Cuong Sai A Hybrid Deep Learning Framework for
Intelligent Predictive Maintenance of
Cyber-physical Systems . . . . . . . . . 17:1--17:??
Samar Abbas and
Ahmed Ehsan and
Saad Ahmed and
Sheraz Ali Khan and
Tariq M. Jadoon and
Muhammad Hamad Alizai ASHRAY: Enhancing Water-usage Comfort in
Developing Regions using Data-driven IoT
Retrofits . . . . . . . . . . . . . . . 18:1--18:??
Oliver Biggar and
Mohammad Zamani and
Iman Shames On Modularity in Reactive Control
Architectures, with an Application to
Formal Verification . . . . . . . . . . 19:1--19:??
Fabian Mager and
Dominik Baumann and
Carsten Herrmann and
Sebastian Trimpe and
Marco Zimmerling Scaling beyond Bandwidth Limitations:
Wireless Control with Stability
Guarantees under Overload . . . . . . . 20:1--20:??
Mohammad Khayatian and
Mohammadreza Mehrabian and
Edward Andert and
Reese Grimsley and
Kyle Liang and
Yi Hu and
Ian McCormack and
Carlee Joe-Wong and
Jonathan Aldrich and
Bob Iannucci and
Aviral Shrivastava Plan B: Design Methodology for
Cyber-Physical Systems Robust to Timing
Failures . . . . . . . . . . . . . . . . 21:1--21:??
Monowar Hasan and
Sibin Mohan and
Rakesh B. Bobba and
Rodolfo Pellizzoni Beyond Just Safety: Delay-aware Security
Monitoring for Real-time Control Systems 22:1--22:??
Mohsen Ghafouri and
Ekram Kabir and
Bassam Moussa and
Chadi Assi Coordinated Charging and Discharging of
Electric Vehicles: a New Class of
Switching Attacks . . . . . . . . . . . 23:1--23:??
Dharshan Krishna Murthy and
Alejandro Masrur A Cyber-physical Approach for Emergency
Braking in Close-Distance Driving
Arrangements . . . . . . . . . . . . . . 24:1--24:??
Georgios Bakirtzis and
Fabrizio Genovese and
Cody H. Fleming Yoneda Hacking: The Algebra of Attacker
Actions . . . . . . . . . . . . . . . . 25:1--25:??
José Manuel Gaspar Sánchez and
Nils Jörgensen and
Martin Törngren and
Rafia Inam and
Andrii Berezovskyi and
Lei Feng and
Elena Fersman and
Muhammad Rusyadi Ramli and
Kaige Tan Edge Computing for Cyber-physical
Systems: a Systematic Mapping Study
Emphasizing Trustworthiness . . . . . . 26:1--26:??
Ping Yu and
Wei Ni and
Ren Ping Liu and
Zhaoxin Zhang and
Hua Zhang and
Qiaoyan Wen Efficient Encrypted Range Query on Cloud
Platforms . . . . . . . . . . . . . . . 27:1--27:??
Abubakar Sadiq Mohammed and
Philipp Reinecke and
Pete Burnap and
Omer Rana and
Eirini Anthi Cybersecurity Challenges in the Offshore
Oil and Gas Industry: an Industrial
Cyber-Physical Systems (ICPS)
Perspective . . . . . . . . . . . . . . 28:1--28:??
Mohammad Al Faruque and
Meeko Mitsuko Oishi Introduction to the Special Section on
Selected Papers from ICCPS 2021 . . . . 29:1--29:??
Yukun Yuan and
Meiyi Ma and
Songyang Han and
Desheng Zhang and
Fei Miao and
John A. Stankovic and
Shan Lin DeResolver: a Decentralized Conflict
Resolution Framework with Autonomous
Negotiation for Smart City Services . . 29:1--29:??
Masaki Waga and
Étienne André and
Ichiro Hasuo Model-bounded Monitoring of Hybrid
Systems . . . . . . . . . . . . . . . . 30:1--30:??
Shili Sheng and
Erfan Pakdamanian and
Kyungtae Han and
Ziran Wang and
John Lenneman and
David Parker and
Lu Feng Planning for Automated Vehicles with
Human Trust . . . . . . . . . . . . . . 31:1--31:??
Geoffrey Pettet and
Ayan Mukhopadhyay and
Mykel J. Kochenderfer and
Abhishek Dubey Hierarchical Planning for Dynamic
Resource Allocation in Smart and
Connected Communities . . . . . . . . . 32:1--32:??
Michael Maximilian Wrana and
Marwa Elsayed and
Karim Lounis and
Ziad Mansour and
Steven Ding and
Mohammad Zulkernine OD1NF1ST: True Skip Intrusion Detection
and Avionics Network Cyber-attack
Simulation . . . . . . . . . . . . . . . 33:1--33:??
Diksha Moolchandani and
Kishore Yadav and
Geesara Kulathunga and
Ilya Afanasyev and
Anshul Kumar and
Manuel Mazzara and
Smruti Sarangi Game Theory-Based Parameter Tuning for
Energy-Efficient Path Planning on Modern
UAVs . . . . . . . . . . . . . . . . . . 34:1--34:??
Ranjan Pal and
Peihan Liu and
Taoan Lu and
Ed Hua How Hard Is Cyber-risk Management in
IT/OT Systems? A Theory to Classify and
Conquer Hardness of Insuring ICSs . . . 35:1--35:??
Samarjit Chakraborty and
Somesh Jha and
Soheil Samii and
Philipp Mundhenk Introduction to the Special Issue on
Automotive CPS Safety & Security: Part 1 1:1--1:??
Yanbing Mao and
Yuliang Gu and
Naira Hovakimyan and
Lui Sha and
Petros Voulgaris SL$1$-Simplex: Safe Velocity Regulation
of Self-Driving Vehicles in Dynamic and
Unforeseen Environments . . . . . . . . 2:1--2:??
Mazen Mohamad and
Rodi Jolak and
Örjan Askerdal and
Jan-Philipp Steghöfer and
Riccardo Scandariato CASCADE: an Asset-driven Approach to
Build Security Assurance Cases for
Automotive Systems . . . . . . . . . . . 3:1--3:??
Jarul Mehta and
Guillaume Richard and
Loren Lugosch and
Derek Yu and
Brett H. Meyer DT-DS: CAN Intrusion Detection with
Decision Tree Ensembles . . . . . . . . 4:1--4:??
Yuri Gil Dantas and
Vivek Nigam Automating Safety and Security Co-design
through Semantically Rich Architecture
Patterns . . . . . . . . . . . . . . . . 5:1--5:??
Jiyang Chen and
Tomasz Kloda and
Rohan Tabish and
Ayoosh Bansal and
Chien-Ying Chen and
Bo Liu and
Sibin Mohan and
Marco Caccamo and
Lui Sha SchedGuard++: Protecting against
Schedule Leaks Using Linux Containers on
Multi-Core Processors . . . . . . . . . 6:1--6:??
Ipsita Koley and
Soumyajit Dey and
Debdeep Mukhopadhyay and
Sachin Singh and
Lavanya Lokesh and
Shantaram Vishwanath Ghotgalkar CAD Support for Security and Robustness
Analysis of Safety-critical Automotive
Software . . . . . . . . . . . . . . . . 7:1--7:??
Daniel Angermeier and
Hannah Wester and
Kristian Beilke and
Gerhard Hansch and
Jörn Eichler Security Risk Assessments: Modeling and
Risk Level Propagation . . . . . . . . . 8:1--8:??
Handi Yu and
Xin Li Data-Driven Parameterized Corner
Synthesis for Efficient Validation of
Perception Systems for Autonomous
Driving . . . . . . . . . . . . . . . . 9:1--9:??
Daniel Markert and
Alejandro Masrur A Two-Speed Synchronous Traffic Protocol
for Intelligent Intersections: From
Single-Vehicle to Platoon Crossing . . . 10:1--10:??
Nitasha Sahani and
Ruoxi Zhu and
Jin-Hee Cho and
Chen-Ching Liu Machine Learning-based Intrusion
Detection for Smart Grid Computing: a
Survey . . . . . . . . . . . . . . . . . 11:1--11:??
Anas Alsoliman and
Giulio Rigoni and
Davide Callegaro and
Marco Levorato and
Cristina M. Pinotti and
Mauro Conti Intrusion Detection Framework for
Invasive FPV Drones Using Video
Streaming Characteristics . . . . . . . 12:1--12:??
Eugene Vinitsky and
Nathan Lichtlé and
Kanaad Parvate and
Alexandre Bayen Optimizing Mixed Autonomy Traffic Flow
with Decentralized Autonomous Vehicles
and Multi-Agent Reinforcement Learning 13:1--13:??
Abdulrahman Fahim and
Evangelos Papalexakis and
Srikanth V. Krishnamurthy and
Amit K. Roy Chowdhury and
Lance Kaplan and
Tarek Abdelzaher AcTrak: Controlling a Steerable
Surveillance Camera using Reinforcement
Learning . . . . . . . . . . . . . . . . 14:1--14:??
Mohammed Asiri and
Neetesh Saxena and
Rigel Gjomemo and
Pete Burnap Understanding Indicators of Compromise
against Cyber-attacks in Industrial
Control Systems: a Security Perspective 15:1--15:??
Adnan Mahmood and
Quan Z. Sheng and
Wei Emma Zhang and
Yan Wang and
Subhash Sagar Toward a Distributed Trust Management
System for Misbehavior Detection in the
Internet of Vehicles . . . . . . . . . . 16:1--16:??
Théo Serru and
Nga Nguyen and
Michel Batteux and
Antoine Rauzy Minimal Critical Sequences in
Model-based Safety and Security
Analyses: Commonalities and Differences 17:1--17:??
Sandeep Banik and
Thiagarajan Ramachandran and
Arnab Bhattacharya and
Shaunak D. Bopardikar Automated Adversary-in-the-Loop
Cyber-Physical Defense Planning . . . . 18:1--18:??
Abdullah Al Maruf and
Luyao Niu and
Andrew Clark and
J. Sukarno Mertoguno and
Radha Poovendran A Timing-Based Framework for Designing
Resilient Cyber-Physical Systems under
Safety Constraint . . . . . . . . . . . 19:1--19:??
Naomi Stricker and
Yingzhao Lian and
Yuning Jiang and
Colin N. Jones and
Lothar Thiele Self-triggered Control with Energy
Harvesting Sensor Nodes . . . . . . . . 20:1--20:??
Yi-Ting Hsieh and
Tzu-Tao Chang and
Chen-Jun Tsai and
Shih-Lun Wu and
Ching-Yuan Bai and
Kai-Chieh Chang and
Chung-Wei Lin and
Eunsuk Kang and
Chao Huang and
Qi Zhu System Verification and Runtime
Monitoring with Multiple Weakly-Hard
Constraints . . . . . . . . . . . . . . 21:1--21:??
Hassan Mousavi and
Ali Ebnenasir and
Elham Mahmoudzadeh Formal Specification, Verification and
Repair of Contiki's Scheduler . . . . . 22:1--22:??
Xueli Fan and
Qixin Wang and
Jie Liu A Reliable Wireless Protocol for Highway
and Metered-Ramp CAV Collaborative
Merging with Constant-Time-Headway
Safety Guarantee . . . . . . . . . . . . 23:1--23:??
Ertem Esiner and
Utku Tefek and
Daisuke Mashima and
Binbin Chen and
Zbigniew Kalbarczyk and
David M. Nicol Message Authentication and Provenance
Verification for Industrial Control
Systems . . . . . . . . . . . . . . . . 24:1--24:??
Tommaso Zoppi and
Innocenzo Mungiello and
Andrea Ceccarelli and
Alberto Cirillo and
Lorenzo Sarti and
Lorenzo Esposito and
Giuseppe Scaglione and
Sergio Repetto and
Andrea Bondavalli Safe Maintenance of Railways using COTS
Mobile Devices: The Remote Worker
Dashboard . . . . . . . . . . . . . . . 25:1--25:??
Khaled Sarieddine and
Mohammad Ali Sayed and
Sadegh Torabi and
Ribal Atallah and
Chadi Assi Investigating the Security of EV
Charging Mobile Applications as an
Attack Surface . . . . . . . . . . . . . 26:1--26:??
Francis Tiausas and
Keiichi Yasumoto and
Jose Paolo Talusan and
Hayato Yamana and
Hirozumi Yamaguchi and
Shameek Bhattacharjee and
Abhishek Dubey and
Sajal K. Das HPRoP: Hierarchical Privacy-preserving
Route Planning for Smart Cities . . . . 27:1--27:??
Anqi Fu and
Sijia Chen and
Junfei Qiao and
Chengpu Yu Periodic Event-Triggered CACC and
Communication Co-design for Vehicle
Platooning . . . . . . . . . . . . . . . 28:1--28:??
Mohammad H. Mamduhi and
Ehsan Hashemi Event-Triggered Control with
Intermittent Communications over Erasure
Channels for Leader-Follower Problems
with the Combined-Slip Effect . . . . . 29:1--29:??
Qiushi Liang and
Shengjie Zhao and
Jiangfan Zhang and
Hao Deng Unsupervised BLSTM-Based Electricity
Theft Detection with Training Data
Contaminated . . . . . . . . . . . . . . 1:1--1:??
Werner Damm and
David Hess and
Mark Schweda and
Janos Sztipanovits and
Klaus Bengler and
Bianca Biebl and
Martin Fränzle and
Willem Hagemann and
Moritz Held and
Klas Ihme and
Severin Kacianka and
Alyssa J. Kerscher and
Sebastian Lehnhoff and
Andreas Luedtke and
Alexander Pretschner and
Astrid Rakow and
Jochem Rieger and
Daniel Sonntag and
Maike Schwammberger and
Benedikt Austel and
Anirudh Unni and
Eric Veith A Reference Architecture of Human
Cyber-Physical Systems --- Part I:
Fundamental Concepts . . . . . . . . . . 2:1--2:??
Klaus Bengler and
Werner Damm and
Andreas Luedtke and
Reiger Jochem and
Benedikt Austel and
Bianca Biebl and
Martin Fränzle and
Willem Hagemann and
Moritz Held and
David Hess and
Klas Ihme and
Severin Kacianka and
Alyssa J. Kerscher and
Laine Forrest and
Sebastian Lehnhoff and
Alexander Pretschner and
Astrid Rakow and
Daniel Sonntag and
Janos Sztipanovits and
Maike Schwammberger and
Mark Schweda and
Anirudh Unni and
Eric Veith A References Architecture for Human
Cyber Physical Systems, Part II:
Fundamental Design Principles for
Human-CPS Interaction . . . . . . . . . 3:1--3:??
Werner Damm and
Martin Fränzle and
Alyssa J. Kerscher and
Forrest Laine and
Klaus Bengler and
Bianca Biebl and
Willem Hagemann and
Moritz Held and
David Hess and
Klas Ihme and
Severin Kacianka and
Sebastian Lehnhoff and
Andreas Luedtke and
Alexander Pretschner and
Astrid Rakow and
Jochem Rieger and
Daniel Sonntag and
Janos Sztipanovits and
Maike Schwammberger and
Mark Schweda and
Alexander Trende and
Anirudh Unni and
Eric Veith A Reference Architecture of Human
Cyber-Physical Systems --- Part III:
Semantic Foundations . . . . . . . . . . 4:1--4:??
Levente Csikor and
Hoon Wei Lim and
Jun Wen Wong and
Soundarya Ramesh and
Rohini Poolat Parameswarath and
Mun Choon Chan RollBack: a New Time-Agnostic Replay
Attack Against the Automotive Remote
Keyless Entry Systems . . . . . . . . . 5:1--5:??
Vijay Varadharajan and
Uday Tupakula and
Kallol Krishna Karmakar Techniques for Enhancing Security in
Industrial Control Systems . . . . . . . 6:1--6:??
Ion Matei and
Wiktor Piotrowski and
Alexandre Perez and
Johan de Kleer and
Jorge Tierno and
Wendy Mungovan and
Vance Turnewitsch System Resilience through Health
Monitoring and Reconfiguration . . . . . 7:1--7:??
Kejing Zhao and
Zhiyong Zhang and
Kim-Kwang Raymond Choo and
Zhongya Zhang and
Tiantian Zhang A Combinatorial Optimization Analysis
Method for Detecting Malicious
Industrial Internet Attack Behaviors . . 8:1--8:??
Stephen S. Kirkman and
Steven Fulton and
Jeffrey Hemmes and
Christopher Garcia and
Justin C. Wilson A Blockchain Architecture to Increase
the Resilience of Industrial Control
Systems from the Effects of a Ransomware
Attack: a Proposal and Initial Results 9:1--9:??
Samarjit Chakraborty and
Somesh Jha and
Soheil Samii and
Philipp Mundhenk Introduction to the Special Issue on
Automotive CPS Safety & Security: Part 2 10:1--10:??
Alessandro Brighente and
Mauro Conti and
Denis Donadel and
Federico Turrin EVScout2.0: Electric Vehicle Profiling
through Charging Profile . . . . . . . . 11:1--11:??
Vahid Panahi and
Mehdi Kargahi and
Fathiyeh Faghih Control Performance Analysis of
Automotive Cyber-physical Systems: a
Study on Efficient Formal Verification 12:1--12:??
Shailja Thakur and
Carlos Moreno and
Sebastian Fischmeister CANOA: CAN Origin Authentication through
Power Side-channel Monitoring . . . . . 13:1--13:??
Yanmao Man and
Ming Li and
Ryan Gerdes Remote Perception Attacks against
Camera-based Object Recognition Systems
and Countermeasures . . . . . . . . . . 14:1--14:??
Francesco Pollicino and
Dario Stabili and
Mirco Marchetti Performance Comparison of Timing-Based
Anomaly Detectors for Controller Area
Network: a Reproducible Study . . . . . 15:1--15:??
Jiangwei Wang and
Lili Su and
Songyang Han and
Dongjin Song and
Fei Miao Towards Safe Autonomy in Hybrid Traffic:
Detecting Unpredictable Abnormal
Behaviors of Human Drivers via
Information Sharing . . . . . . . . . . 16:1--16:??
Kuei-Fang Hsueh and
Ayleen Farnood and
Isam Al-Darabsah and
Mohammad Al Saaideh and
Mohammad Al Janaideh and
Deepa Kundur A Deep Time Delay Filter for Cooperative
Adaptive Cruise Control . . . . . . . . 17:1--17:??
Sayan Mitra and
Nalini Venkatasubramanian Introduction to Special Issue for ICCPS
2022 . . . . . . . . . . . . . . . . . . 18:1--18:??
Ruihang Wang and
Zhiwei Cao and
Xin Zhou and
Yonggang Wen and
Rui Tan Green Data Center Cooling Control via
Physics-guided Safe Reinforcement
Learning . . . . . . . . . . . . . . . . 19:1--19:??
Md. Jaminur Islam and
Jose Paolo Talusan and
Shameek Bhattacharjee and
Francis Tiausas and
Abhishek Dubey and
Keiichi Yasumoto and
Sajal K. Das Scalable Pythagorean Mean-based Incident
Detection in Smart Transportation
Systems . . . . . . . . . . . . . . . . 20:1--20:??
Yahan Yang and
Ramneet Kaur and
Souradeep Dutta and
Insup Lee Memory-based Distribution Shift
Detection for Learning Enabled
Cyber-Physical Systems with Statistical
Guarantees . . . . . . . . . . . . . . . 21:1--21:??
Xin Qin and
Yuan Xia and
Aditya Zutshi and
Chuchu Fan and
Jyotirmoy V. Deshmukh Statistical Verification using Surrogate
Models and Conformal Inference and a
Comparison with Risk-Aware Verification 22:1--22:??
Trier Mortlock and
Arnav Malawade and
Kohei Tsujio and
Mohammad Al Faruque CASTNet: a Context-Aware,
Spatio-Temporal Dynamic Motion
Prediction Ensemble for Autonomous
Driving . . . . . . . . . . . . . . . . 23:1--23:??
Suman Das and
Michael Yuhas and
Rachel Koh and
Arvind Easwaran Interpretable Latent Space for
Meteorological Out-of-Distribution
Detection via Weak Supervision . . . . . 24:1--24:??