


default search action
ACM Transactions on Cyber-Physical Systems, Volume 6
Volume 6, Number 1, January 2022
- Chao Chen, Abdelsalam (Sumi) Helal

, Zhi Jin, Mingyue Zhang, Choonhwa Lee:
IoTranx: Transactions for Safer Smart Spaces. 1:1-1:26 - Anshul Agarwal

, Krithi Ramamritham:
A Novel Approach for Deploying Minimum Sensors in Smart Buildings. 2:1-2:29 - Debayan Roy, Licong Zhang, Wanli Chang, Dip Goswami, Birgit Vogel-Heuser, Samarjit Chakraborty

:
Tool Integration for Automated Synthesis of Distributed Embedded Controllers. 3:1-3:31 - Matteo Trobinger, Gabriel de Albuquerque Gleizer, Timofei Istomin, Manuel Mazo

, Amy L. Murphy, Gian Pietro Picco:
The Wireless Control Bus: Enabling Efficient Multi-Hop Event-Triggered Control with Concurrent Transmissions. 4:1-4:29 - Michael I.-C. Wang

, Charles H.-P. Wen
, H. Jonathan Chao:
Roadrunner+: An Autonomous Intersection Management Cooperating with Connected Autonomous Vehicles and Pedestrians with Spillback Considered. 5:1-5:29 - Junjie Yan

, Kevin Huang, Kyle Lindgren, Tamara Bonaci, Howard Jay Chizeck:
Continuous Operator Authentication for Teleoperated Systems Using Hidden Markov Models. 6:1-6:25 - Rongrong Wang

, Duc Van Le
, Rui Tan
, Yew-Wah Wong
:
Real-Time Cooling Power Attribution for Co-Located Data Center Rooms with Distinct Temperatures and Humidities. 7:1-7:28 - Fang-Chieh Chou, Alben Rome Bagabaldo

, Alexandre M. Bayen:
The Lord of the Ring Road: A Review and Evaluation of Autonomous Control Policies for Traffic in a Ring Road. 8:1-8:25 - Liuwang Kang

, Haiying Shen:
Detection and Mitigation of Sensor and CAN Bus Attacks in Vehicle Anti-Lock Braking Systems. 9:1-9:24
Volume 6, Number 2, April 2022
- Jingtong Hu, Qi Zhu, Susmit Jha:

Introduction to the Special Issue on Artificial Intelligence and Cyber-Physical Systems - Part 2. 10:1-10:3 - Kazumune Hashimoto

, Natsuko Tsumagari, Toshimitsu Ushio:
Collaborative Rover-copter Path Planning and Exploration with Temporal Logic Specifications Based on Bayesian Update Under Uncertain Environments. 11:1-11:24 - Elham Khodabandehloo, Abbas Alimohammadi

, Daniele Riboni
:
FreeSia: A Cyber-physical System for Cognitive Assessment through Frequency-domain Indoor Locomotion Analysis. 12:1-12:31 - Xiaodong Yang

, Omar Ali Beg
, Matthew Kenigsberg
, Taylor T. Johnson
:
A Framework for Identification and Validation of Affine Hybrid Automata from Input-Output Traces. 13:1-13:24 - Bouziane Brik

, Mourad Messaadia, M'hammed Sahnoun
, Belgacem Bettayeb, Mohamed Amin Benatia:
Fog-supported Low-latency Monitoring of System Disruptions in Industry 4.0: A Federated Learning Approach. 14:1-14:23 - Shreyas Ramakrishna

, Zahra RahimiNasab
, Gabor Karsai
, Arvind Easwaran
, Abhishek Dubey
:
Efficient Out-of-Distribution Detection Using Latent Space of β-VAE for Cyber-Physical Systems. 15:1-15:34 - Jackson Codispoti

, Atieh Rajabi Khamesi
, Nelson Penn, Simone Silvestri, Eura Shin:
Learning from Non-experts: An Interactive and Adaptive Learning Approach for Appliance Recognition in Smart Homes. 16:1-16:22 - Maxim Shcherbakov, Sai Van Cuong:

A Hybrid Deep Learning Framework for Intelligent Predictive Maintenance of Cyber-physical Systems. 17:1-17:22 - Samar Abbas, Ahmed Ehsan, Saad Ahmed

, Sheraz Ali Khan, Tariq M. Jadoon, Muhammad Hamad Alizai
:
ASHRAY: Enhancing Water-usage Comfort in Developing Regions using Data-driven IoT Retrofits. 18:1-18:28 - Oliver Biggar

, Mohammad Zamani
, Iman Shames
:
On Modularity in Reactive Control Architectures, with an Application to Formal Verification. 19:1-19:36
Volume 6, Number 3, July 2022
- Fabian Mager

, Dominik Baumann
, Carsten Herrmann
, Sebastian Trimpe
, Marco Zimmerling
:
Scaling beyond Bandwidth Limitations: Wireless Control with Stability Guarantees under Overload. 20:1-20:30 - Mohammad Khayatian

, Mohammadreza Mehrabian
, Edward Andert, Reese Grimsley, Kyle Liang, Yi Hu
, Ian McCormack, Carlee Joe-Wong, Jonathan Aldrich
, Bob Iannucci, Aviral Shrivastava:
Plan B: Design Methodology for Cyber-Physical Systems Robust to Timing Failures. 21:1-21:39 - Monowar Hasan

, Sibin Mohan
, Rakesh B. Bobba
, Rodolfo Pellizzoni:
Beyond Just Safety: Delay-aware Security Monitoring for Real-time Control Systems. 22:1-22:25 - Mohsen Ghafouri

, Mohammad Ekramul Kabir
, Bassam Moussa
, Chadi Assi
:
Coordinated Charging and Discharging of Electric Vehicles: A New Class of Switching Attacks. 23:1-23:26 - Dharshan Krishna Murthy

, Alejandro Masrur:
A Cyber-physical Approach for Emergency Braking in Close-Distance Driving Arrangements. 24:1-24:26 - Georgios Bakirtzis

, Fabrizio Genovese
, Cody H. Fleming
:
Yoneda Hacking: The Algebra of Attacker Actions. 25:1-25:27 - José Manuel Gaspar Sánchez

, Nils Jörgensen
, Martin Törngren
, Rafia Inam
, Andrii Berezovskyi
, Lei Feng
, Elena Fersman
, Muhammad Rusyadi Ramli
, Kaige Tan
:
Edge Computing for Cyber-physical Systems: A Systematic Mapping Study Emphasizing Trustworthiness. 26:1-26:28 - Ping Yu

, Wei Ni
, Ren Ping Liu
, Zhaoxin Zhang
, Hua Zhang
, Qiaoyan Wen
:
Efficient Encrypted Range Query on Cloud Platforms. 27:1-27:23 - Abubakar Sadiq Mohammed

, Philipp Reinecke
, Pete Burnap
, Omer F. Rana
, Eirini Anthi
:
Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective. 28:1-28:27
Volume 6, Number 4, October 2022
- Mohammad Abdullah Al Faruque

, Meeko Mitsuko Oishi
:
Introduction to the Special Section on Selected Papers from ICCPS 2021. 29e:1-29e:3 - Yukun Yuan

, Meiyi Ma
, Songyang Han
, Desheng Zhang
, Fei Miao
, John A. Stankovic
, Shan Lin
:
DeResolver: A Decentralized Conflict Resolution Framework with Autonomous Negotiation for Smart City Services. 29:1-29:27 - Masaki Waga

, Étienne André
, Ichiro Hasuo:
Model-bounded Monitoring of Hybrid Systems. 30:1-30:26 - Shili Sheng

, Erfan Pakdamanian
, Kyungtae Han
, Ziran Wang
, John Lenneman
, David Parker
, Lu Feng
:
Planning for Automated Vehicles with Human Trust. 31:1-31:21 - Geoffrey Pettet

, Ayan Mukhopadhyay, Mykel J. Kochenderfer
, Abhishek Dubey:
Hierarchical Planning for Dynamic Resource Allocation in Smart and Connected Communities. 32:1-32:26 - Michael Wrana

, Marwa Elsayed
, Karim Lounis
, Ziad Mansour
, Steven H. H. Ding, Mohammad Zulkernine
:
OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation. 33:1-33:27 - Diksha Moolchandani

, Kishore Yadav
, Geesara Kulathunga
, Ilya Afanasyev
, Anshul Kumar
, Manuel Mazzara
, Smruti Sarangi
:
Game Theory-Based Parameter Tuning for Energy-Efficient Path Planning on Modern UAVs. 34:1-34:29 - Ranjan Pal

, Peihan Liu
, Taoan Lu
, Ed Hua
:
How Hard Is Cyber-risk Management in IT/OT Systems? A Theory to Classify and Conquer Hardness of Insuring ICSs. 35:1-35:31

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














