Table of contents for issues of ACM Transactions on Cyber-Physical Systems (TCPS)

Last update: Mon Mar 25 14:35:44 MDT 2024                Valid HTML 3.2!

Volume 1, Number 1, February, 2017
Volume 1, Number 2, February, 2017
Volume 1, Number 3, May, 2017
Volume 2, Number 2, June, 2018
Volume 2, Number 3, July, 2018
Volume 2, Number 4, September, 2018
Volume 3, Number 1, January, 2019
Volume 3, Number 2, March, 2019
Volume 3, Number 3, October, 2019
Volume 3, Number 4, October, 2019
Volume 4, Number 1, January, 2020
Volume 4, Number 2, February, 2020
Volume 4, Number 3, March, 2020
Volume 4, Number 4, August, 2020
Volume 5, Number 1, January, 2021
Volume 5, Number 2, January, 2021
Volume 5, Number 3, July, 2021
Volume 5, Number 4, October, 2021
Volume 6, Number 1, January, 2022
Volume 6, Number 2, April, 2022
Volume 6, Number 3, July, 2022
Volume 6, Number 4, October, 2022
Volume 7, Number 1, January, 2023
Volume 7, Number 2, April, 2023
Volume 7, Number 3, July, 2023
Volume 7, Number 4, October, 2023


ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 1, Number 1, February, 2017

                        Tei Kuo   Introduction . . . . . . . . . . . . . . 1e:1--1e:1
              John A. Stankovic   Research Directions for Cyber Physical
                                  Systems in Wireless and Mobile
                                  Healthcare . . . . . . . . . . . . . . . 1:1--1:12
                 Jianjia Wu and   
                       Wei Zhao   Design and Realization of WInternet:
                                  From Net of Things to Internet of Things 2:1--2:12
                  Edward A. Lee   Fundamental Limits of Cyber-Physical
                                  Systems Modeling . . . . . . . . . . . . 3:1--3:26
              Desheng Zhang and   
              Juanjuan Zhao and   
                  Fan Zhang and   
                    Tian He and   
                Haengju Lee and   
                    Sang H. Son   Heterogeneous Model Integration for
                                  Multi-Source Urban Infrastructure Data   4:1--4:26

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 1, Number 2, February, 2017

             Zhichuan Huang and   
                   Ting Zhu and   
                David Irwin and   
              Aditya Mishra and   
            Daniel Menasche and   
                Prashant Shenoy   Minimizing Transmission Loss in Smart
                                  Microgrids by Sharing Renewable Energy   5:1--5:22
              Desheng Zhang and   
              Juanjuan Zhao and   
                  Fan Zhang and   
              Ruobing Jiang and   
                    Tian He and   
         Nikos Papanikolopoulos   Last-Mile Transit Service with Urban
                                  Infrastructure Data  . . . . . . . . . . 6:1--6:26
               Riham Altawy and   
                 Amr M. Youssef   Security, Privacy, and Safety Aspects of
                                  Civilian Drones: A Survey  . . . . . . . 7:1--7:25
                    Rui Tan and   
           Hoang Hai Nguyen and   
                David K. Y. Yau   Collaborative Load Management with
                                  Safety Assurance in Smart Grids  . . . . 12:1--12:27
                   Liang He and   
                 Eugene Kim and   
                   Kang G. Shin   A Case Study on Improving Capacity
                                  Delivery of Battery Packs via
                                  Reconfiguration  . . . . . . . . . . . . 11:1--11:23
                David Irwin and   
         Srinivasan Iyengar and   
                Stephen Lee and   
              Aditya Mishra and   
            Prashant Shenoy and   
                          Ye Xu   Enabling Distributed Energy Storage by
                                  Incentivizing Small Load Shifts  . . . . 10:1--10:30
             Jian-Min Jiang and   
                Huibiao Zhu and   
                     Qin Li and   
               Yongxin Zhao and   
                   Lin Zhao and   
                  Shi Zhang and   
                  Ping Gong and   
                 Zhong Hong and   
                   Donghuo Chen   Event-Based Mobility Modeling and
                                  Analysis . . . . . . . . . . . . . . . . 9:1--9:32
           Marco Zimmerling and   
               Luca Mottola and   
             Pratyush Kumar and   
           Federico Ferrari and   
                  Lothar Thiele   Adaptive Real-Time Communication for
                                  Wireless Cyber-Physical Systems  . . . . 8:1--8:29

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 1, Number 3, May, 2017

     Ilias Gerostathopoulos and   
                Tomas Bures and   
              Petr Hnetynka and   
               Adam Hujecek and   
           Frantisek Plasil and   
                  Dominik Skoda   Strengthening Adaptation in
                                  Cyber-Physical Systems via
                                  Meta-Adaptation Strategies . . . . . . . 13:1--13:25
         Kedar Khandeparkar and   
         Krithi Ramamritham and   
                   Rajeev Gupta   QoS-Driven Data Processing Algorithms
                                  for Smart Electric Grids . . . . . . . . 14:1--14:24
                Junkil Park and   
            Radoslav Ivanov and   
               James Weimer and   
             Miroslav Pajic and   
              Sang Hyuk Son and   
                      Insup Lee   Security of Cyber-Physical Systems in
                                  the Presence of Transient Sensor Faults  15:1--15:23
               Hongwei Wang and   
                Yunlong Gao and   
                 Shaohan Hu and   
              Shiguang Wang and   
             Renato Mancuso and   
                  Minje Kim and   
                 Poliang Wu and   
                      Lu Su and   
                    Lui Sha and   
               Tarek Abdelzaher   On Exploiting Structured Human
                                  Interactions to Enhance Sensing Accuracy
                                  in Cyber-physical Systems  . . . . . . . 16:1--16:19


ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 2, Number 2, June, 2018

                   Wei Zhao and   
               Tarek Abdelzaher   Preface to the Special Issue: Toward an
                                  Efficient and Effective Internet of
                                  Things for Cyber-Physical Systems  . . . 7:1--7:2
                   Roy Dong and   
         Lillian J. Ratliff and   
  Alvaro A. Cárdenas and   
             Henrik Ohlsson and   
              S. Shankar Sastry   Quantifying the Utility--Privacy
                                  Tradeoff in the Internet of Things . . . 8:1--8:28
             Sze Zheng Yong and   
                Minghui Zhu and   
                Emilio Frazzoli   Switching and Data Injection Attacks on
                                  Stochastic Cyber-Physical Systems:
                                  Modeling, Resilient Estimation, and
                                  Attack Mitigation  . . . . . . . . . . . 9:1--9:2
                   Qiang Wu and   
                T. John Koo and   
               Yoshihiko Susuki   Dynamic Security Analysis of Power
                                  Systems by a Sampling-Based Algorithm    10:1--10:26
                Guanjun Liu and   
             Changjun Jiang and   
                   Mengchu Zhou   Time-Soundness of Time Petri Nets
                                  Modelling Time-Critical Systems  . . . . 11:1--11:27
            Gerry Siegemund and   
                   Volker Turau   A Self-Stabilizing Publish/Subscribe
                                  Middleware for IoT Applications  . . . . 12:1--12:26
        Alessandro A. Nacci and   
              Vincenzo Rana and   
           Bharathan Balaji and   
            Paola Spoletini and   
               Rajesh Gupta and   
           Donatella Sciuto and   
                 Yuvraj Agarwal   BuildingRules: a Trigger--Action-Based
                                  System to Manage Complex Commercial
                                  Buildings  . . . . . . . . . . . . . . . 13:1--13:22
                  Ping Wang and   
                    Meng Ma and   
                 Chao-Hsien Chu   Long-Term Event Processing over Data
                                  Streams in Cyber-Physical Systems  . . . 14:1--14:23

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 2, Number 3, July, 2018

                   Wei Zhao and   
               Tarek Abdelzaher   Preface to the Special Issue: Toward an
                                  Efficient and Effective Internet of
                                  Things for Cyber-Physical Systems (Part
                                  II)  . . . . . . . . . . . . . . . . . . 15:1--15:2
             Subhav Pradhan and   
             Abhishek Dubey and   
               Shweta Khare and   
        Saideep Nannapaneni and   
          Aniruddha Gokhale and   
         Sankaran Mahadevan and   
         Douglas C. Schmidt and   
                 Martin Lehofer   CHARIOT: Goal-Driven Orchestration
                                  Middleware for Resilient IoT Systems . . 16:1--16:37
               Farzad Samie and   
      Vasileios Tsoutsouras and   
                 Lars Bauer and   
             Sotirios Xydis and   
          Dimitrios Soudris and   
               Jörg Henkel   Distributed Trade-Based Edge Device
                                  Management in Multi-Gateway IoT  . . . . 17:1--17:25
                 Jinwei Liu and   
               Haiying Shen and   
            Husnu S. Narman and   
              Wingyan Chung and   
                   Zongfang Lin   A Survey of Mobile Crowdsensing
                                  Techniques: a Critical Component for The
                                  Internet of Things . . . . . . . . . . . 18:1--18:26
                Paul Martin and   
           Andrew Symington and   
                Mani Srivastava   SLATS: Simultaneous Localization and
                                  Time Synchronization . . . . . . . . . . 19:1--19:25
               Qianyi Huang and   
                    Yan Mei and   
                   Wei Wang and   
                     Qian Zhang   Toward Battery-Free Wearable Devices:
                                  The Synergy between Two Feet . . . . . . 20:1--20:18
             Amel Bennaceur and   
             Thein Than Tun and   
          Arosha K. Bandara and   
                   Yijun Yu and   
                Bashar Nuseibeh   Feature-Driven Mediator Synthesis:
                                  Supporting Collaborative Security in the
                                  Internet of Things . . . . . . . . . . . 21:1--21:25
                     Lei Bu and   
                  Wen Xiong and   
       Chieh-Jan Mike Liang and   
                    Shi Han and   
              Dongmei Zhang and   
                   Shan Lin and   
                    Xuandong Li   Systematically Ensuring the Confidence
                                  of Real-Time Home Automation IoT Systems 22:1--22:23

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 2, Number 4, September, 2018

             Luan V. Nguyen and   
        Khaza Anuarul Hoque and   
                Stanley Bak and   
              Steven Drager and   
              Taylor T. Johnson   Cyber-Physical Specification Mismatches  23:1--23:26
               Rajrup Ghosh and   
                 Yogesh Simmhan   Distributed Scheduling of Event
                                  Analytics across Edge and Cloud  . . . . 24:1--24:28
             Mischa Schmidt and   
         Anett Schülke and   
            Alberto Venturi and   
             Roman Kurpatov and   
Enrique Blanco Henríquez   Cyber-Physical System for
                                  Energy-Efficient Stadium Operation:
                                  Methodology and Experimental Validation  25:1--25:26
                Wanli Chang and   
                Dip Goswami and   
       Samarjit Chakraborty and   
                    Arne Hamann   OS-Aware Automotive Controller Design
                                  Using Non-Uniform Sampling . . . . . . . 26:1--26:22
              Xiaofeng Wang and   
           Naira Hovakimyan and   
                        Lui Sha   RSimplex: a Robust Control Architecture
                                  for Cyber And Physical Failures  . . . . 27:1--27:26
    Subhash Lakshminarayana and   
              Teo Zhan Teng and   
                    Rui Tan and   
                David K. Y. Yau   Modeling and Detecting False Data
                                  Injection Attacks against Railway
                                  Traction Power Systems . . . . . . . . . 28:1--28:29
                  Insup Lee and   
                 Miroslav Pajic   Guest Editorial: Special Issue on
                                  Medical Cyber-Physical Systems . . . . . 29:1--29:2
        Pasquale Buonocunto and   
         Andrea Giantomassi and   
             Mauro Marinoni and   
           Davide Calvaresi and   
               Giorgio Buttazzo   A Limb Tracking Platform for
                                  Tele-Rehabilitation  . . . . . . . . . . 30:1--30:23
               D. De Venuto and   
               V. F. Annese and   
                 G. Mezzina and   
                F. Scioscia and   
                    M. Ruta and   
             E. Di Sciascio and   
     A. Sangiovanni Vincentelli   A Mobile Health System for
                                  Neurocognitive Impairment Evaluation
                                  Based on P300 Detection  . . . . . . . . 31:1--31:21
                 Eugene Yip and   
           Sidharta Andalam and   
             Partha S. Roop and   
              Avinash Malik and   
               Mark L. Trew and   
                  Weiwei Ai and   
                   Nitish Patel   Towards the Emulation of the Cardiac
                                  Conduction System for Pacemaker
                                  Validation . . . . . . . . . . . . . . . 32:1--32:26
            Nicola Paoletti and   
            Andrea Patan\`e and   
              Marta Kwiatkowska   Closed-Loop Quantitative Verification of
                                  Rate-Adaptive Pacemakers . . . . . . . . 33:1--33:31
          Guillaume Joerger and   
          Juliette Rambourg and   
     Helene Gaspard-Boulinc and   
          Stephane Conversy and   
            Barbara L. Bass and   
            Brian J. Dunkin and   
                    Marc Garbey   A Cyber-Physical System to Improve the
                                  Management of a Large Suite of Operating
                                  Rooms  . . . . . . . . . . . . . . . . . 34:1--34:24
   André A. Geraldes and   
               Luca Geretti and   
            Davide Bresolin and   
          Riccardo Muradore and   
              Paolo Fiorini and   
         Leonardo S. Mattos and   
                  Tiziano Villa   Formal Verification of Medical CPS: a
                                  Laser Incision Case Study  . . . . . . . 35:1--35:29


ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 3, Number 1, January, 2019

    Md Zakirul Alam Bhuiyan and   
                 Sy-yen Kuo and   
               Damian Lyons and   
                      Zili Shao   Dependability in Cyber-Physical Systems
                                  and Applications . . . . . . . . . . . . 1:1--1:4
                   Feng Tan and   
              Liansheng Liu and   
              Stefan Winter and   
                 Qixin Wang and   
                Neeraj Suri and   
                     Lei Bu and   
                    Yu Peng and   
                    Xue Liu and   
                    Xiyuan Peng   Cross-Domain Noise Impact Evaluation for
                                  Black Box Two-Level Control CPS  . . . . 2:1--2:25
                   Yehan Ma and   
         Dolvara Gunatilaka and   
                      Bo Li and   
          Humberto Gonzalez and   
                    Chenyang Lu   Holistic Cyber-Physical Management for
                                  Dependable Wireless Control Systems  . . 3:1--3:25
                  Guoqi Xie and   
                  Gang Zeng and   
                   Jiyao An and   
                   Renfa Li and   
                       Keqin Li   Resource-Cost-Aware Fault-Tolerant
                                  Design Methodology for End-to-End
                                  Functional Safety Computation on
                                  Automotive Cyber-Physical Systems  . . . 4:1--4:27
                   Yang Liu and   
              Xiaoming Chen and   
             Dileep Kadambi and   
               Ajinkya Bari and   
                     Xin Li and   
                  Shiyan Hu and   
                 Pingqiang Zhou   Dependable Visual Light-Based Indoor
                                  Localization with Automatic Anomaly
                                  Detection for Location-Based Service of
                                  Mobile Cyber-Physical Systems  . . . . . 5:1--5:17
                  Tian Wang and   
                Wenhua Wang and   
                 Anfeng Liu and   
                Shaobin Cai and   
                   Jiannong Cao   Improve the Localization Dependability
                                  for Cyber-Physical Applications  . . . . 6:1--6:21
                 Chang Wang and   
                Yongxin Zhu and   
                 Weiwei Shi and   
               Victor Chang and   
             P. Vijayakumar and   
                    Bin Liu and   
                  Yishu Mao and   
                Jiabao Wang and   
                     Yiping Fan   A Dependable Time Series Analytic
                                  Framework for Cyber-Physical Systems of
                                  IoT-based Smart Grid . . . . . . . . . . 7:1--7:18
                  Jiahui Yu and   
                   Kun Wang and   
                  Deze Zeng and   
              Chunsheng Zhu and   
                       Song Guo   Privacy-preserving Data Aggregation
                                  Computing in Cyber-Physical Social
                                  Systems  . . . . . . . . . . . . . . . . 8:1--8:23
                    Ning Li and   
                  Zheng Yan and   
               Mingjun Wang and   
               Laurence T. Yang   Securing Communication Data in Pervasive
                                  Social Networking Based on Trust with
                                  KP-ABE . . . . . . . . . . . . . . . . . 9:1--9:23
                  Beibei Li and   
                Rongxing Lu and   
     Kim-Kwang Raymond Choo and   
                   Wei Wang and   
                      Sheng Luo   On Reliability Analysis of Smart Grids
                                  under Topology Attacks: a Stochastic
                                  Petri Net Approach . . . . . . . . . . . 10:1--10:25
             Qingchen Zhang and   
           Laurence T. Yang and   
                Zhikui Chen and   
                        Peng Li   Dependable Deep Computation Model for
                                  Feature Learning on Big Data in
                                  Cyber-Physical Systems . . . . . . . . . 11:1--11:17
                   Yu Jiang and   
               Houbing Song and   
                Yixiao Yang and   
                    Han Liu and   
                    Ming Gu and   
                  Yong Guan and   
               Jiaguang Sun and   
                        Lui Sha   Dependable Model-driven Development of
                                  CPS: From Stateflow Simulation to
                                  Verified Implementation  . . . . . . . . 12:1--12:31

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 3, Number 2, March, 2019

                  Jiang Wan and   
              Anthony Lopez and   
   Mohammad Abdullah Al Faruque   Physical Layer Key Generation: Securing
                                  Wireless Communication in Automotive
                                  Cyber-Physical Systems . . . . . . . . . 13:1--13:26
              Pei-Chi Huang and   
                Luis Sentis and   
                Joel Lehman and   
            Chien-Liang Fok and   
            Aloysius K. Mok and   
             Risto Miikkulainen   Tradeoffs in Neuroevolutionary
                                  Learning-Based Real-Time Robotic Task
                                  Design in the Imprecise Computation
                                  Framework  . . . . . . . . . . . . . . . 14:1--14:29
               Roopak Sinha and   
           Barry Dowdeswell and   
          Gulnara Zhabelova and   
                Valeriy Vyatkin   TORUS: Scalable Requirements
                                  Traceability for Large-Scale
                                  Cyber-Physical Systems . . . . . . . . . 15:1--15:25
              Edward Tremel and   
                 Ken Birman and   
           Robert Kleinberg and   
           Márk Jelasity   Anonymous, Fault-Tolerant Distributed
                                  Queries for Smart Devices  . . . . . . . 16:1--16:29
         Srinivasan Iyengar and   
              Sandeep Kalra and   
             Anushree Ghosh and   
                David Irwin and   
            Prashant Shenoy and   
                Benjamin Marlin   Inferring Smart Schedules for Dumb
                                  Thermostats  . . . . . . . . . . . . . . 17:1--17:29
          Andrea Ceccarelli and   
              Tommaso Zoppi and   
           Alexandr Vasenev and   
                 Marco Mori and   
                 Dan Ionita and   
             Lorena Montoya and   
              Andrea Bondavalli   Threat Analysis in Systems-of-Systems:
                                  an Emergence-Oriented Approach . . . . . 18:1--18:24
                Marco Biagi and   
            Laura Carnevali and   
               Fabio Tarani and   
                 Enrico Vicario   Model-Based Quantitative Evaluation of
                                  Repair Procedures in Gas Distribution
                                  Networks . . . . . . . . . . . . . . . . 19:1--19:26
             C. W. Badenhop and   
               S. R. Graham and   
              B. E. Mullins and   
                 L. O. Mailloux   Looking Under the Hood of Z-Wave:
                                  Volatile Memory Introspection for the
                                  ZW0301 Transceiver . . . . . . . . . . . 20:1--20:24
              Desheng Zhang and   
                    Tian He and   
                      Fan Zhang   National-scale Traffic Model Calibration
                                  in Real Time with Multi-source
                                  Incomplete Data  . . . . . . . . . . . . 21:1--21:26
               William Koch and   
             Renato Mancuso and   
               Richard West and   
                 Azer Bestavros   Reinforcement Learning for UAV Attitude
                                  Control  . . . . . . . . . . . . . . . . 22:1--22:21
                Sean Barker and   
              Sandeep Kalra and   
                David Irwin and   
                Prashant Shenoy   Building Virtual Power Meters for Online
                                  Load Tracking  . . . . . . . . . . . . . 23:1--23:24

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 3, Number 3, October, 2019

               Luis Almeida and   
            Bjorn Andersson and   
              Jen-Wei Hsieh and   
               Li-Pin Chang and   
               Xiaobo Sharon Hu   Introduction to the Special Issue on
                                  Real-Time aspects in Cyber-Physical
                                  Systems  . . . . . . . . . . . . . . . . 24:1--24:2
              Shunsuke Aoki and   
      Ragunathan (Raj) Rajkumar   CSIP: a Synchronous Protocol for
                                  Automated Vehicles at Road Intersections 25:1--25:25
              Philip Parsch and   
               Alejandro Masrur   Accounting for Reliability in
                                  Unacknowledged Time-Constrained WSNs . . 26:1--26:28
       João Loureiro and   
      Raghuraman Rangarajan and   
           Borislav Nikolic and   
   Leandro Soares Indrusiak and   
                  Eduardo Tovar   Extensive Analysis of a Real-Time Dense
                                  Wired Sensor Network Based on Traffic
                                  Shaping  . . . . . . . . . . . . . . . . 27:1--27:27
                Baekgyu Kim and   
                    Lu Feng and   
              Oleg Sokolsky and   
                      Insup Lee   Determining Timing Parameters for the
                                  Code Generation from
                                  Platform-Independent Timed Models  . . . 28:1--28:32
                  Chao Wang and   
           Christopher Gill and   
                    Chenyang Lu   Real-Time Middleware for Cyber-Physical
                                  Event Processing . . . . . . . . . . . . 29:1--29:25
              Hendrik Roehm and   
            Jens Oehlerking and   
           Matthias Woehrle and   
               Matthias Althoff   Model Conformance for Cyber-Physical
                                  Systems: a Survey  . . . . . . . . . . . 30:1--30:26
                Dima Rabadi and   
                    Rui Tan and   
            David K. Y. Yau and   
       Sreejaya Viswanathan and   
                  Hao Zheng and   
                     Peng Cheng   Resilient Clock Synchronization Using
                                  Power Grid Voltage . . . . . . . . . . . 31:1--31:26
                   Chen Pan and   
                   Mimi Xie and   
                   Song Han and   
               Zhi-Hong Mao and   
                    Jingtong Hu   Modeling and Optimization for
                                  Self-powered Non-volatile IoT Edge
                                  Devices with Ultra-low Harvesting Power  32:1--32:26
     Róbinson Medina and   
              Juan Valencia and   
              Sander Stuijk and   
                Dip Goswami and   
                    Twan Basten   Designing a Controller with Image-based
                                  Pipelined Sensing and Additive
                                  Uncertainties  . . . . . . . . . . . . . 33:1--33:26
              Junia Valente and   
            Kanchan Bahirat and   
           Kelly Venechanos and   
         Alvaro A. Cardenas and   
       Prabhakaran Balakrishnan   Improving the Security of Visual
                                  Challenges . . . . . . . . . . . . . . . 34:1--34:26

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 3, Number 4, October, 2019

               Tongquan Wei and   
               Junlong Zhou and   
               Rajiv Ranjan and   
             Isaac Triguero and   
                 Huafeng Yu and   
             Chun Jason Xue and   
               Schahram Dustdar   Introduction to the Special Issue on
                                  Human-interaction-aware Data Analytics
                                  for Cyber-physical Systems . . . . . . . 35e:1--35e:2
              Xiaokang Wang and   
           Laurence T. Yang and   
                 Yihao Wang and   
                Xingang Liu and   
              Qingxia Zhang and   
                  M. Jamal Deen   A Distributed Tensor-Train Decomposition
                                  Method for Cyber-Physical-Social
                                  Services . . . . . . . . . . . . . . . . 35:1--35:15
                 Tingmin Wu and   
                Lihong Tang and   
          Rongjunchen Zhang and   
                  Sheng Wen and   
               Cecile Paris and   
                Surya Nepal and   
            Marthie Grobler and   
                     Yang Xiang   Catering to Your Concerns: Automatic
                                  Generation of Personalised
                                  Security-Centric Descriptions for
                                  Android Apps . . . . . . . . . . . . . . 36:1--36:21
                     Wei Li and   
              Xiaomin Chang and   
                 Junwei Cao and   
                  Ting Yang and   
                 Yaojie Sun and   
               Albert Y. Zomaya   A Sustainable and User-Behavior-Aware
                                  Cyber-Physical System for Home Energy
                                  Management . . . . . . . . . . . . . . . 37:1--37:24
                    Fu Xiao and   
                  Jing Chen and   
                  Zhetao Li and   
              Haiping Huang and   
                     Lijuan Sun   Improved LDA Dimension Reduction Based
                                  Behavior Learning with Commodity WiFi
                                  for Cyber-Physical Systems . . . . . . . 38:1--38:19
                  Guoqi Xie and   
                   Yang Bai and   
                     Wei Wu and   
                  Yanwen Li and   
                   Renfa Li and   
                       Keqin Li   Human-Interaction-aware Adaptive
                                  Functional Safety Processing for
                                  Multi-Functional Automotive
                                  Cyber-Physical Systems . . . . . . . . . 39:1--39:25
                  Hui Huang and   
                  Shiyan Hu and   
                         Ye Sun   Energy-Efficient ECG Signal Compression
                                  for User Data Input in Cyber-Physical
                                  Systems by Leveraging Empirical Mode
                                  Decomposition  . . . . . . . . . . . . . 40:1--40:19
             Hyung-Jin Yoon and   
      Christopher Widdowson and   
             Thiago Marinho and   
       Ranxiao Frances Wang and   
               Naira Hovakimyan   Socially Aware Path Planning for a
                                  Flying Robot in Close Proximity of
                                  Humans . . . . . . . . . . . . . . . . . 41:1--41:24
               Chaoqun Yang and   
                    Li Feng and   
                 Zhiguo Shi and   
                Rongxing Lu and   
         Kim-Kwang Raymond Choo   A Crowdsensing-based Cyber-physical
                                  System for Drone Surveillance Using
                                  Random Finite Set Theory . . . . . . . . 42:1--42:22


ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 4, Number 1, January, 2020

       Samarjit Chakraborty and   
                        Tian He   Introduction to the Special Issue on
                                  Transportation Cyber-Physical Systems    1:1--1:3
          Mostafa Gilanifar and   
                   Hui Wang and   
         Eren Erman Ozguven and   
                 Yuxun Zhou and   
                 Reza Arghandeh   Bayesian Spatiotemporal Gaussian Process
                                  for Short-term Load Forecasting Using
                                  Combined Transportation and Electricity
                                  Data . . . . . . . . . . . . . . . . . . 2:1--2:25
                Bowen Zheng and   
              Chung-Wei Lin and   
         Shinichi Shiraishi and   
                         Qi Zhu   Design and Analysis of Delay-Tolerant
                                  Intelligent Intersection Management  . . 3:1--3:27
        Subhojeet Mukherjee and   
       Jeffrey C. Van Etten and   
      Namburi Rani Samyukta and   
               Jacob Walker and   
              Indrakshi Ray and   
                   Indrajit Ray   TruckSTM: Runtime Realization of
                                  Operational State Transitions for Medium
                                  and Heavy Duty Vehicles  . . . . . . . . 4:1--4:25
      Sebastian Van De Hoef and   
     Jonas Mårtensson and   
       Dimos V. Dimarogonas and   
          Karl Henrik Johansson   A Predictive Framework for Dynamic
                                  Heavy-Duty Vehicle Platoon Coordination  5:1--5:25
                   Yue Guan and   
      Anuradha M. Annaswamy and   
                  H. Eric Tseng   A Dynamic Routing Framework for Shared
                                  Mobility Services  . . . . . . . . . . . 6:1--6:28
               Hoon Wei Lim and   
          William G. Temple and   
            Bao Anh N. Tran and   
                Binbin Chen and   
        Zbigniew Kalbarczyk and   
                  Jianying Zhou   Data Integrity Threats and
                                  Countermeasures in Railway Spot
                                  Transmission Systems . . . . . . . . . . 7:1--7:26
                Baekgyu Kim and   
              Takato Masuda and   
             Shinichi Shiraishi   Test Specification and Generation for
                                  Connected and Autonomous Vehicle in
                                  Virtual Environments . . . . . . . . . . 8:1--8:26
          Rajesh P. Barnwal and   
               Nirnay Ghosh and   
            Soumya K. Ghosh and   
                   Sajal K. Das   Publish or Drop Traffic Event Alerts?
                                  Quality-aware Decision Making in
                                  Participatory Sensing-based Vehicular
                                  CPS  . . . . . . . . . . . . . . . . . . 9:1--9:28
                 Mikael Asplund   Combining Detection and Verification for
                                  Secure Vehicular Cooperation Groups  . . 10:1--10:31
                Carmen Cheh and   
                Binbin Chen and   
          William G. Temple and   
             William H. Sanders   Modeling Adversarial Physical Movement
                                  in a Railway Station: Classification and
                                  Metrics  . . . . . . . . . . . . . . . . 11:1--11:25
                Woo-Hyun Ko and   
   Bharadwaj Satchidanandan and   
                    P. R. Kumar   Dynamic Watermarking-based Defense of
                                  Transportation Cyber-physical Systems    12:1--12:21
              Chongguang Bi and   
                  Jun Huang and   
              Guoliang Xing and   
                Landu Jiang and   
                    Xue Liu and   
                   Minghua Chen   SafeWatch: a Wearable Hand Motion
                                  Tracking System for Improving Driving
                                  Safety . . . . . . . . . . . . . . . . . 13:1--13:21

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 4, Number 2, February, 2020

                   Meiyi Ma and   
             Sarah M. Preum and   
            Mohsin Y. Ahmed and   
     William Tärneberg and   
         Abdeltawab Hendawi and   
              John A. Stankovic   Data Sets, Modeling, and Decision Making
                                  in Smart Cities: a Survey  . . . . . . . 14:1--14:28
              Sirajum Munir and   
             Hao-Tsung Yang and   
                   Shan Lin and   
      S. M. Shahriar Nirjon and   
                   Chen Lin and   
               Enamul Hoque and   
          John A. Stankovic and   
               Kamin Whitehouse   Reliable Communication and Latency Bound
                                  Generation in Wireless Cyber-Physical
                                  Systems  . . . . . . . . . . . . . . . . 15:1--15:26
             Leonardo Babun and   
               Hidayet Aksu and   
              A. Selcuk Uluagac   A System-level Behavioral Detection
                                  Framework for Compromised CPS Devices:
                                  Smart-Grid Case  . . . . . . . . . . . . 16:1--16:28
                     Li Yan and   
                   Haiying Shen   TOP: Optimizing Vehicle Driving Speed
                                  with Vehicle Trajectories for Travel
                                  Time Minimization and Road Congestion
                                  Avoidance  . . . . . . . . . . . . . . . 17:1--17:25
            Dominik Baumann and   
               Fabian Mager and   
               Romain Jacob and   
              Lothar Thiele and   
           Marco Zimmerling and   
               Sebastian Trimpe   Fast Feedback Control over Multi-hop
                                  Wireless Networks with Mode Changes and
                                  Stability Guarantees . . . . . . . . . . 18:1--18:32
                  J. Harbin and   
                   A. Burns and   
                R. I. Davis and   
            L. S. Indrusiak and   
                    I. Bate and   
                     D. Griffin   The AirTight Protocol for Mixed
                                  Criticality Wireless CPS . . . . . . . . 19:1--19:28
         Mohammad Khayatian and   
                Yingyan Lou and   
     Mohammadreza Mehrabian and   
             Aviral Shirvastava   Crossroads+: a Time-aware Approach for
                                  Intersection Management of Connected
                                  Autonomous Vehicles  . . . . . . . . . . 20:1--20:28
        Christopher Pereyda and   
            Nisha Raghunath and   
                Bryan Minor and   
             Garrett Wilson and   
Maureen Schmitter-Edgecombe and   
                  Diane J. Cook   Cyber-physical Support of Daily
                                  Activities: a Robot/Smart Home
                                  Partnership  . . . . . . . . . . . . . . 21:1--21:24
                     Kai Li and   
                     Wei Ni and   
               Yousef Emami and   
                 Yiran Shen and   
           Ricardo Severino and   
              David Pereira and   
                  Eduardo Tovar   Design and Implementation of Secret Key
                                  Agreement for Platoon-based Vehicular
                                  Cyber-physical Systems . . . . . . . . . 22:1--22:20
             Voica Gavrilut and   
                       Paul Pop   Traffic-type Assignment for TSN-based
                                  Mixed-criticality Cyber-physical Systems 23:1--23:27

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 4, Number 3, March, 2020

                Zhicheng Fu and   
                Chunhui Guo and   
               Zhenyu Zhang and   
              Shangping Ren and   
                        Lui Sha   UACFinder: Mining Syntactic Carriers of
                                  Unspecified Assumptions in Medical
                                  Cyber-Physical System Design Models  . . 24:1--24:25
             Zhenyong Zhang and   
               Ruilong Deng and   
            David K. Y. Yau and   
                 Peng Cheng and   
                    Jiming Chen   On Hiddenness of Moving Target Defense
                                  against False Data Injection Attacks on
                                  Power Grid . . . . . . . . . . . . . . . 25:1--25:29
                 Ali Tamimi and   
                  Adam Hahn and   
                     Sandip Roy   Cyber Threat Impact Analysis to Air
                                  Traffic Flows Through Dynamic Queue
                                  Networks . . . . . . . . . . . . . . . . 26:1--26:22
                      Di Wu and   
                 Hanlin Zhu and   
                Yongxin Zhu and   
               Victor Chang and   
                    Cong He and   
            Ching-Hsien Hsu and   
                   Hui Wang and   
               Songlin Feng and   
                    Li Tian and   
                   Zunkai Huang   Anomaly Detection Based on RBM-LSTM
                                  Neural Network for CPS in Advanced
                                  Driver Assistance System . . . . . . . . 27:1--27:17
                   Vuk Lesi and   
              Ilija Jovanov and   
                 Miroslav Pajic   Integrating Security in
                                  Resource-Constrained Cyber-Physical
                                  Systems  . . . . . . . . . . . . . . . . 28:1--28:27
             Neetesh Saxena and   
         Alvaro A. Cardenas and   
               Raheem Beyah and   
                Rongxing Lu and   
     Kim-Kwang Raymond Choo and   
                     Yiran Chen   Introduction to the Special Issue on
                                  User-Centric Security and Safety for CPS 29:1--29:2
                  Ding Wang and   
                  Ping Wang and   
                    Chenyu Wang   Efficient Multi-Factor User
                                  Authentication Protocol with Forward
                                  Secrecy for Real-Time Data Access in
                                  WSNs . . . . . . . . . . . . . . . . . . 30:1--30:26
      Mohammadhadi Alaeiyan and   
           Ali Dehghantanha and   
             Tooska Dargahi and   
                Mauro Conti and   
                    Saeed Parsa   A Multilabel Fuzzy Relevance Clustering
                                  System for Malware Attack Attribution in
                                  the Edge Layer of Cyber-Physical
                                  Networks . . . . . . . . . . . . . . . . 31:1--31:22
              Deepak Puthal and   
           Laurence T. Yang and   
           Schahram Dustdar and   
                 Zhenyu Wen and   
                   Song Jun and   
            Aad van Moorsel and   
                   Rajiv Ranjan   A User-centric Security Solution for
                                  Internet of Things and Edge Convergence  32:1--32:19
        George Hatzivasilis and   
          Othonas Soultatos and   
          Sotiris Ioannidis and   
         George Spanoudakis and   
             Vasilios Katos and   
              Giorgos Demetriou   MobileTrust: Secure Knowledge
                                  Integration in VANETs  . . . . . . . . . 33:1--33:25
              Meriem Guerar and   
             Luca Verderame and   
              Alessio Merlo and   
         Francesco Palmieri and   
            Mauro Migliardi and   
                 Luca Vallerini   CirclePIN: a Novel Authentication
                                  Mechanism for Smartwatches to Prevent
                                  Unauthorized Access to IoT Devices . . . 34:1--34:19
                   Ke Huang and   
             Xiaosong Zhang and   
               Xiaofen Wang and   
                      Yi Mu and   
        Fatemeh Rezaeibagha and   
               Guangquan Xu and   
                   Hao Wang and   
                   Xi Zheng and   
                Guomin Yang and   
                     Qi Xia and   
                   Xiaojiang Du   HUCDO: a Hybrid User-centric Data
                                  Outsourcing Scheme . . . . . . . . . . . 35:1--35:23
         Mohammadreza Arani and   
                   Deepa Kundur   A User-centric Approach toward Resilient
                                  Frequency-regulating Wind Generators . . 36:1--36:23

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 4, Number 4, August, 2020

               Axel Jantsch and   
             Peter R. Lewis and   
                     Nikil Dutt   Introduction to the Special Issue on
                                  Self-Aware Cyber-physical Systems  . . . 37:1--37:2
                 K. Bellman and   
                C. Landauer and   
                    N. Dutt and   
                 L. Esterle and   
             A. Herkersdorf and   
                 A. Jantsch and   
             N. TaheriNejad and   
                P. R. Lewis and   
                M. Platzner and   
               K. Tammemäe   Self-aware Cyber-Physical Systems  . . . 38:1--38:26
              Lukas Esterle and   
               John N. A. Brown   I Think Therefore You Are: Models for
                                  Interaction in Collectives of Self-aware
                                  Cyber-physical Systems . . . . . . . . . 39:1--39:25
               Adrian Sapio and   
    Shuvra S. Bhattacharyya and   
                   Marilyn Wolf   Runtime Adaptation in Wireless Sensor
                                  Nodes Using Structured Learning  . . . . 40:1--40:28
                   Yehan Ma and   
                Chenyang Lu and   
                     Yebin Wang   Efficient Holistic Control:
                                  Self-awareness across Controllers and
                                  Wireless Networks  . . . . . . . . . . . 41:1--41:27
                Ruizhi Chai and   
                 Ying Zhang and   
                   Geng Sun and   
                   Hongsheng Li   Self-aware Power Management for
                                  Maintaining Event Detection Probability
                                  of Supercapacitor-powered Cyber-physical
                                  Systems  . . . . . . . . . . . . . . . . 42:1--42:19
              Matthew Weber and   
                Baihong Jin and   
               Gil Lederman and   
             Yasser Shoukry and   
              Edward A. Lee and   
              Sanjit Seshia and   
Alberto Sangiovanni-Vincentelli   Gordian: Formal Reasoning-based Outlier
                                  Detection for Secure Localization  . . . 43:1--43:27
                    Hong Lu and   
                    Tao Yue and   
                    Shaukat Ali   Pattern-based Interactive Configuration
                                  Derivation for Cyber-physical System
                                  Product Lines  . . . . . . . . . . . . . 44:1--44:24
               Craig Bakker and   
         Arnab Bhattacharya and   
          Samrat Chatterjee and   
              Draguna L. Vrabie   Hypergames and Cyber-Physical Security
                                  for Control Systems  . . . . . . . . . . 45:1--45:41
                 Yunhao Bai and   
              Kuangyu Zheng and   
               Zejiang Wang and   
               Xiaorui Wang and   
                    Junmin Wang   MC-Safe: Multi-channel Real-time V2V
                                  Communication for Enhancing Driving
                                  Safety . . . . . . . . . . . . . . . . . 46:1--46:27
             Pushpak Jagtap and   
                Fardin Abdi and   
           Matthias Rungger and   
               Majid Zamani and   
                  Marco Caccamo   Software Fault Tolerance for
                                  Cyber-Physical Systems via Full System
                                  Restart  . . . . . . . . . . . . . . . . 47:1--47:20
         Mohammad Khayatian and   
     Mohammadreza Mehrabian and   
              Edward Andert and   
            Rachel Dedinsky and   
         Sarthake Choudhary and   
                Yingyan Lou and   
             Aviral Shirvastava   A Survey on Intersection Management of
                                  Connected Autonomous Vehicles  . . . . . 48:1--48:27


ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 5, Number 1, January, 2021

            Moreno Ambrosin and   
                Mauro Conti and   
        Riccardo Lazzeretti and   
                     Chia-Mu Yu   Introduction to the Special Issue on
                                  Security and Privacy for Connected
                                  Cyber-physical Systems . . . . . . . . . 1:1--1:2
              Kaushal Kafle and   
                Kevin Moran and   
            Sunil Manandhar and   
            Adwait Nadkarni and   
               Denys Poshyvanyk   Security in Centralized Data Store-based
                                  Home Automation Platforms: a Systematic
                                  Analysis of Nest and Hue . . . . . . . . 2:1--2:27
               Nisha Panwar and   
            Shantanu Sharma and   
                 Guoxi Wang and   
            Sharad Mehrotra and   
      Nalini Venkatasubramanian   CANOPY: a Verifiable Privacy-Preserving
                                  Token Ring-Based Communication Protocol
                                  for Smart Homes  . . . . . . . . . . . . 3:1--3:34
        Muhammad Ajmal Azad and   
             Charith Perera and   
                Samiran Bag and   
           Mahmoud Barhamgi and   
                       Feng Hao   Privacy-preserving Crowd-sensed Trust
                                  Aggregation in the User-centeric
                                  Internet of People Networks  . . . . . . 4:1--4:24
           Gabriela Suntaxi and   
   Aboubakr Achraf El Ghazi and   
              Klemens Böhm   Preserving Secrecy in Mobile Social
                                  Networks . . . . . . . . . . . . . . . . 5:1--5:29
              Heena Rathore and   
               Abhay Samant and   
              Murtuza Jadliwala   TangleCV: a Distributed Ledger Technique
                                  for Secure Message Sharing in Connected
                                  Vehicles . . . . . . . . . . . . . . . . 6:1--6:25
            Abhimanyu Rawat and   
           Mohammad Khodari and   
             Mikael Asplund and   
                  Andrei Gurtov   Decentralized Firmware Attestation for
                                  In-Vehicle Networks  . . . . . . . . . . 7:1--7:23
               Scott Eisele and   
              Taha Eghtesad and   
          Keegan Campanelli and   
            Prakhar Agrawal and   
                Aron Laszka and   
                 Abhishek Dubey   Safe and Private Forward-trading
                                  Platform for Transactive Microgrids  . . 8:1--8:29
      Venkata Reddy Palleti and   
       Vishrut Kumar Mishra and   
      Chuadhry Mujeeb Ahmed and   
                  Aditya Mathur   Can Replay Attacks Designed to Steal
                                  Water from Water Distribution Systems
                                  Remain Undetected? . . . . . . . . . . . 9:1--9:19
           Abdelaziz Khaled and   
              Samir Ouchani and   
                 Zahir Tari and   
                   Khalil Drira   Assessing the Severity of Smart Attacks
                                  in Industrial Cyber-Physical Systems . . 10:1--10:28
         Claudio A. Ardagna and   
                Rasool Asal and   
            Ernesto Damiani and   
             Nabil El Ioini and   
                Mehdi Elahi and   
                     Claus Pahl   From Trustworthy Data to Trustworthy
                                  IoT: a Data Collection Methodology Based
                                  on Blockchain  . . . . . . . . . . . . . 11:1--11:26

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 5, Number 2, January, 2021

         Aviral Shrivastava and   
                Patricia Derler   Introduction to the Special Issue on
                                  Time for CPS (TCPS)  . . . . . . . . . . 12:1--12:2
             Rafael Rosales and   
              Michael Paulitsch   Composable Finite State Machine-based
                                  Modeling for
                                  Quality-of-Information-aware
                                  Cyber-physical Systems . . . . . . . . . 13:1--13:27
      Kai-Björn Gemlau and   
         Leonie KÖHLER and   
                 Rolf Ernst and   
                 Sophie Quinton   System-level Logical Execution Time:
                                  Augmenting the Logical Execution Time
                                  Paradigm for Distributed Real-time
                                  Automotive Software  . . . . . . . . . . 14:1--14:27
         João Bastos and   
              Jeroen Voeten and   
              Sander Stuijk and   
          Ramon Schiffelers and   
                 Henk Corporaal   Taming the State-space Explosion in the
                                  Makespan Optimization of Flexible
                                  Manufacturing Systems  . . . . . . . . . 15:1--15:26
             Bingzhuo Zhong and   
            Claudius Jordan and   
                 Julien Provost   Extending Signal Temporal Logic with
                                  Quantitative Semantics by Intervals for
                                  Robust Monitoring of Cyber-physical
                                  Systems  . . . . . . . . . . . . . . . . 16:1--16:25
                   Fei Miao and   
                  Sihong He and   
                 Lynn Pepin and   
                   Shuo Han and   
         Abdeltawab Hendawi and   
         Mohamed E. Khalefa and   
          John A. Stankovic and   
                  George Pappas   Data-driven Distributionally Robust
                                  Optimization For Vehicle Balancing of
                                  Mobility-on-Demand Systems . . . . . . . 17:1--17:27
               Laksh Bhatia and   
              Ivana Tomi\'c and   
                    Anqi Fu and   
              Michael Breza and   
                Julie A. Mccann   Control Communication Co-Design for Wide
                                  Area Cyber-Physical Systems  . . . . . . 18:1--18:27
                     Li Yan and   
                   Haiying Shen   Utilizing Game Theory to Optimize
                                  In-motion Wireless Charging Service
                                  Efficiency for Electric Vehicles . . . . 19:1--19:26
                  Luyao Niu and   
                   Andrew Clark   A Differentially Private Incentive
                                  Design for Traffic Offload to Public
                                  Transportation . . . . . . . . . . . . . 20:1--20:27
   Srinarayana Nagarathinam and   
          Arunchandar Vasan and   
         Venkatesh Sarangan and   
         Rajesh Jayaprakash and   
          Anand Sivasubramaniam   User Placement and Optimal Cooling
                                  Energy for Co-working Building Spaces    21:1--21:24

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 5, Number 3, July, 2021

                    Chenyang Lu   Toward a Scientific and Engineering
                                  Discipline of Cyber-Physical Systems . . 22e:1--22e:2
           Giuseppe Bombara and   
                    Calin Belta   Offline and Online Learning of Signal
                                  Temporal Logic Formulae Using Decision
                                  Trees  . . . . . . . . . . . . . . . . . 22:1--22:23
               Craig Bakker and   
         Arnab Bhattacharya and   
          Samrat Chatterjee and   
              Draguna L. Vrabie   Metagames and Hypergames for
                                  Deception-Robust Control . . . . . . . . 23:1--23:25
Pierre-François Gimenez and   
              Jonathan Roux and   
                 Eric Alata and   
           Guillaume Auriol and   
           Mohamed Kaaniche and   
              Vincent Nicomette   \pkgRIDS: Radio Intrusion Detection and
                                  Diagnosis System for Wireless
                                  Communications in Smart Environment  . . 24:1--24:1
               Shrey Baheti and   
            Shreyas Badiger and   
                 Yogesh Simmhan   \pkgVIoLET: an Emulation Environment for
                                  Validating IoT Deployments at Large
                                  Scales . . . . . . . . . . . . . . . . . 25:1--25:39
                Jiachen Mao and   
               Huanrui Yang and   
                     Ang Li and   
                     Hai Li and   
                     Yiran Chen   \pkgTPrune: Efficient Transformer
                                  Pruning for Mobile Devices . . . . . . . 26:1--26:22
                     Kai Li and   
                    Ning Lu and   
             Jingjing Zheng and   
                  Pei Zhang and   
                     Wei Ni and   
                  Eduardo Tovar   \pkgBloothAir: a Secure Aerial Relay
                                  System Using Bluetooth Connected
                                  Autonomous Drones  . . . . . . . . . . . 27:1--27:22
                Jianjun Wen and   
              Waltenegus Dargie   Characterization of Link Quality
                                  Fluctuation in Mobile Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 28:1--28:24
       Gonçalo Jesus and   
    António Casimiro and   
               Anabela Oliveira   Using Machine Learning for Dependable
                                  Outlier Detection in Environmental
                                  Monitoring Systems . . . . . . . . . . . 29:1--29:30
    Martín Barr\`ere and   
                   Chris Hankin   Analysing Mission-critical
                                  Cyber-physical Systems with AND/OR
                                  Graphs and MaxSAT  . . . . . . . . . . . 30:1--30:29
             Hamza Bourbouh and   
     Pierre-Lo\"\ic Garoche and   
          Christophe Garion and   
                Xavier Thirioux   From Lustre to Simulink: Reverse
                                  Compilation for Embedded Systems
                                  Applications . . . . . . . . . . . . . . 31:1--31:20
         Georgios Bakirtzis and   
            Cody H. Fleming and   
       Christina Vasilakopoulou   Categorical Semantics of Cyber-Physical
                                  Systems Theory . . . . . . . . . . . . . 32:1--32:32

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 5, Number 4, October, 2021

                Jingtong Hu and   
                     Qi Zhu and   
                     Susmit Jha   Introduction to the Special Issue on
                                  Artificial Intelligence and
                                  Cyber-Physical Systems: Part 1 . . . . . 33:1--33:3
               Jianguo Chen and   
                   Kenli Li and   
                   Keqin Li and   
               Philip S. Yu and   
                      Zeng Zeng   Dynamic Bicycle Dispatching of Dockless
                                  Public Bicycle-sharing Systems Using
                                  Multi-objective Reinforcement Learning   34:1--34:24
       Alëna Rodionova and   
          Yash Vardhan Pant and   
               Connor Kurtz and   
                   Kuk Jang and   
              Houssam Abbas and   
                Rahul Mangharam   Learning-`N-Flying: a Learning-Based,
                                  Decentralized Mission-Aware UAS
                                  Collision Avoidance Scheme . . . . . . . 35:1--35:26
           Siddharth Mysore and   
             Bassel Mabsout and   
                Kate Saenko and   
                 Renato Mancuso   How to Train Your Quadrotor: a Framework
                                  for Consistently Smooth and Responsive
                                  Flight Control via Reinforcement
                                  Learning . . . . . . . . . . . . . . . . 36:1--36:24
          Stephanie Abrecht and   
             Lydia Gauerhof and   
         Christoph Gladisch and   
                Konrad Groh and   
       Christian Heinzemann and   
               Matthias Woehrle   Testing Deep Learning-based Visual
                                  Perception for Automated Driving . . . . 37:1--37:28
         Colin Shea-Blymyer and   
                  Houssam Abbas   Algorithmic Ethics: Formalization and
                                  Verification of Autonomous Vehicle
                                  Obligations  . . . . . . . . . . . . . . 38:1--38:25
                  Wei Jiang and   
                 Zhiyuan He and   
                 Jinyu Zhan and   
                 Weijia Pan and   
                Deepak Adhikari   Research Progress and Challenges on
                                  Application-Driven Adversarial Examples:
                                  a Survey . . . . . . . . . . . . . . . . 39:1--39:25
              Menghong Feng and   
               Noman Bashir and   
            Prashant Shenoy and   
                David Irwin and   
                 Beka Kosanovic   Model-driven Per-panel Solar Anomaly
                                  Detection for Residential Arrays . . . . 40:1--40:20
    Md Tahmid Rahman Laskar and   
        Jimmy Xiangji Huang and   
             Vladan Smetana and   
              Chris Stewart and   
                  Kees Pouw and   
                   Aijun An and   
               Stephen Chan and   
                        Lei Liu   Extending Isolation Forest for Anomaly
                                  Detection in Big Data via $K$-Means  . . 41:1--41:26
              Tommaso Zoppi and   
             Mohamad Gharib and   
              Muhammad Atif and   
              Andrea Bondavalli   Meta-Learning to Improve Unsupervised
                                  Intrusion Detection in Cyber-Physical
                                  Systems  . . . . . . . . . . . . . . . . 42:1--42:27
               Chia-Heng Tu and   
                  Qihui Sun and   
              Hsiao-Hsuan Chang   \pkgRAP: a Software Framework of
                                  Developing Convolutional Neural Networks
                                  for Resource-constrained Devices Using
                                  Environmental Monitoring as a Case Study 43:1--43:28
               Saideep Tiku and   
             Prathmesh Kale and   
                Sudeep Pasricha   \pkgQuickLoc: Adaptive Deep-Learning for
                                  Fast Indoor Localization with Mobile
                                  Devices  . . . . . . . . . . . . . . . . 44:1--44:30
              Tieu Long Mai and   
                  Nicolas Navet   Deep Learning to Predict the Feasibility
                                  of Priority-Based Ethernet Network
                                  Configurations . . . . . . . . . . . . . 45:1--45:26


ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 6, Number 1, January, 2022

                  Chao Chen and   
    Abdelsalam (Sumi) Helal and   
                    Zhi Jin and   
              Mingyue Zhang and   
                   Choonhwa Lee   \pkgIoTranx: Transactions for Safer
                                  Smart Spaces . . . . . . . . . . . . . . 1:1--1:26
             Anshul Agarwal and   
             Krithi Ramamritham   A Novel Approach for Deploying Minimum
                                  Sensors in Smart Buildings . . . . . . . 2:1--2:29
                Debayan Roy and   
               Licong Zhang and   
                Wanli Chang and   
                Dip Goswami and   
        Birgit Vogel-Heuser and   
           Samarjit Chakraborty   Tool Integration for Automated Synthesis
                                  of Distributed Embedded Controllers  . . 3:1--3:31
           Matteo Trobinger and   
Gabriel de Albuquerque Gleizer and   
            Timofei Istomin and   
                Manuel Mazo and   
              Amy L. Murphy and   
              Gian Pietro Picco   The Wireless Control Bus: Enabling
                                  Efficient Multi-Hop Event-Triggered
                                  Control with Concurrent Transmissions    4:1--4:29
         Michael I.-C. Wang and   
          Charles H.-P. Wen and   
               H. Jonathan Chao   \pkgRoadrunner+: an Autonomous
                                  Intersection Management Cooperating with
                                  Connected Autonomous Vehicles and
                                  Pedestrians with Spillback Considered    5:1--5:29
                 Junjie Yan and   
                Kevin Huang and   
              Kyle Lindgren and   
              Tamara Bonaci and   
              Howard J. Chizeck   Continuous Operator Authentication for
                                  Teleoperated Systems Using Hidden Markov
                                  Models . . . . . . . . . . . . . . . . . 6:1--6:25
              Rongrong Wang and   
                 Duc Van Le and   
                    Rui Tan and   
                   Yew-Wah Wong   Real-Time Cooling Power Attribution for
                                  Co-Located Data Center Rooms with
                                  Distinct Temperatures and Humidities . . 7:1--7:28
            Fang-Chieh Chou and   
       Alben Rome Bagabaldo and   
             Alexandre M. Bayen   The Lord of the Ring Road: a Review and
                                  Evaluation of Autonomous Control
                                  Policies for Traffic in a Ring Road  . . 8:1--8:25
               Liuwang Kang and   
                   Haiying Shen   Detection and Mitigation of Sensor and
                                  CAN Bus Attacks in Vehicle Anti-Lock
                                  Braking Systems  . . . . . . . . . . . . 9:1--9:24

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 6, Number 2, April, 2022

                Jingtong Hu and   
                     Qi Zhu and   
                     Susmit Jha   Introduction to the Special Issue on
                                  Artificial Intelligence and
                                  Cyber-Physical Systems --- Part 2  . . . 10:1--10:??
         Kazumune Hashimoto and   
          Natsuko Tsumagari and   
               Toshimitsu Ushio   Collaborative Rover-copter Path Planning
                                  and Exploration with Temporal Logic
                                  Specifications Based on Bayesian Update
                                  Under Uncertain Environments . . . . . . 11:1--11:??
       Elham Khodabandehloo and   
         Abbas Alimohammadi and   
                 Daniele Riboni   FreeSia: a Cyber-physical System for
                                  Cognitive Assessment through
                                  Frequency-domain Indoor Locomotion
                                  Analysis . . . . . . . . . . . . . . . . 12:1--12:??
              Xiaodong Yang and   
               Omar Ali Beg and   
         Matthew Kenigsberg and   
              Taylor T. Johnson   A Framework for Identification and
                                  Validation of Affine Hybrid Automata
                                  from Input-Output Traces . . . . . . . . 13:1--13:??
              Bouziane Brik and   
           Mourad Messaadia and   
           M'hammed Sahnoun and   
          Belgacem Bettayeb and   
           Mohamed Amin Benatia   Fog-supported Low-latency Monitoring of
                                  System Disruptions in Industry 4.0: a
                                  Federated Learning Approach  . . . . . . 14:1--14:??
        Shreyas Ramakrishna and   
          Zahra Rahiminasab and   
               Gabor Karsai and   
            Arvind Easwaran and   
                 Abhishek Dubey   Efficient Out-of-Distribution Detection
                                  Using Latent Space of $ \beta $-VAE for
                                  Cyber-Physical Systems . . . . . . . . . 15:1--15:??
          Jackson Codispoti and   
           Atieh R. Khamesi and   
                Nelson Penn and   
           Simone Silvestri and   
                      Eura Shin   Learning from Non-experts: an
                                  Interactive and Adaptive Learning
                                  Approach for Appliance Recognition in
                                  Smart Homes  . . . . . . . . . . . . . . 16:1--16:??
          Maxim Shcherbakov and   
                      Cuong Sai   A Hybrid Deep Learning Framework for
                                  Intelligent Predictive Maintenance of
                                  Cyber-physical Systems . . . . . . . . . 17:1--17:??
                Samar Abbas and   
                Ahmed Ehsan and   
                 Saad Ahmed and   
            Sheraz Ali Khan and   
            Tariq M. Jadoon and   
          Muhammad Hamad Alizai   ASHRAY: Enhancing Water-usage Comfort in
                                  Developing Regions using Data-driven IoT
                                  Retrofits  . . . . . . . . . . . . . . . 18:1--18:??
              Oliver Biggar and   
            Mohammad Zamani and   
                    Iman Shames   On Modularity in Reactive Control
                                  Architectures, with an Application to
                                  Formal Verification  . . . . . . . . . . 19:1--19:??

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 6, Number 3, July, 2022

               Fabian Mager and   
            Dominik Baumann and   
           Carsten Herrmann and   
           Sebastian Trimpe and   
               Marco Zimmerling   Scaling beyond Bandwidth Limitations:
                                  Wireless Control with Stability
                                  Guarantees under Overload  . . . . . . . 20:1--20:??
         Mohammad Khayatian and   
     Mohammadreza Mehrabian and   
              Edward Andert and   
             Reese Grimsley and   
                 Kyle Liang and   
                      Yi Hu and   
              Ian McCormack and   
            Carlee Joe-Wong and   
           Jonathan Aldrich and   
               Bob Iannucci and   
             Aviral Shrivastava   Plan B: Design Methodology for
                                  Cyber-Physical Systems Robust to Timing
                                  Failures . . . . . . . . . . . . . . . . 21:1--21:??
              Monowar Hasan and   
                Sibin Mohan and   
            Rakesh B. Bobba and   
             Rodolfo Pellizzoni   Beyond Just Safety: Delay-aware Security
                                  Monitoring for Real-time Control Systems 22:1--22:??
            Mohsen Ghafouri and   
                Ekram Kabir and   
              Bassam Moussa and   
                     Chadi Assi   Coordinated Charging and Discharging of
                                  Electric Vehicles: a New Class of
                                  Switching Attacks  . . . . . . . . . . . 23:1--23:??
    Dharshan Krishna Murthy and   
               Alejandro Masrur   A Cyber-physical Approach for Emergency
                                  Braking in Close-Distance Driving
                                  Arrangements . . . . . . . . . . . . . . 24:1--24:??
         Georgios Bakirtzis and   
          Fabrizio Genovese and   
                Cody H. Fleming   Yoneda Hacking: The Algebra of Attacker
                                  Actions  . . . . . . . . . . . . . . . . 25:1--25:??
José Manuel Gaspar Sánchez and   
        Nils Jörgensen and   
       Martin Törngren and   
                 Rafia Inam and   
         Andrii Berezovskyi and   
                   Lei Feng and   
              Elena Fersman and   
     Muhammad Rusyadi Ramli and   
                      Kaige Tan   Edge Computing for Cyber-physical
                                  Systems: a Systematic Mapping Study
                                  Emphasizing Trustworthiness  . . . . . . 26:1--26:??
                    Ping Yu and   
                     Wei Ni and   
               Ren Ping Liu and   
              Zhaoxin Zhang and   
                  Hua Zhang and   
                    Qiaoyan Wen   Efficient Encrypted Range Query on Cloud
                                  Platforms  . . . . . . . . . . . . . . . 27:1--27:??
    Abubakar Sadiq Mohammed and   
           Philipp Reinecke and   
                Pete Burnap and   
                  Omer Rana and   
                   Eirini Anthi   Cybersecurity Challenges in the Offshore
                                  Oil and Gas Industry: an Industrial
                                  Cyber-Physical Systems (ICPS)
                                  Perspective  . . . . . . . . . . . . . . 28:1--28:??

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 6, Number 4, October, 2022

        Mohammad Al Faruque and   
            Meeko Mitsuko Oishi   Introduction to the Special Section on
                                  Selected Papers from ICCPS 2021  . . . . 29:1--29:??
                 Yukun Yuan and   
                   Meiyi Ma and   
               Songyang Han and   
              Desheng Zhang and   
                   Fei Miao and   
          John A. Stankovic and   
                       Shan Lin   DeResolver: a Decentralized Conflict
                                  Resolution Framework with Autonomous
                                  Negotiation for Smart City Services  . . 29:1--29:??
                Masaki Waga and   
Étienne André and   
                   Ichiro Hasuo   Model-bounded Monitoring of Hybrid
                                  Systems  . . . . . . . . . . . . . . . . 30:1--30:??
                Shili Sheng and   
          Erfan Pakdamanian and   
               Kyungtae Han and   
                 Ziran Wang and   
              John Lenneman and   
               David Parker and   
                        Lu Feng   Planning for Automated Vehicles with
                                  Human Trust  . . . . . . . . . . . . . . 31:1--31:??
            Geoffrey Pettet and   
          Ayan Mukhopadhyay and   
      Mykel J. Kochenderfer and   
                 Abhishek Dubey   Hierarchical Planning for Dynamic
                                  Resource Allocation in Smart and
                                  Connected Communities  . . . . . . . . . 32:1--32:??
   Michael Maximilian Wrana and   
              Marwa Elsayed and   
               Karim Lounis and   
               Ziad Mansour and   
                Steven Ding and   
            Mohammad Zulkernine   OD1NF1ST: True Skip Intrusion Detection
                                  and Avionics Network Cyber-attack
                                  Simulation . . . . . . . . . . . . . . . 33:1--33:??
        Diksha Moolchandani and   
              Kishore Yadav and   
         Geesara Kulathunga and   
             Ilya Afanasyev and   
               Anshul Kumar and   
             Manuel Mazzara and   
                 Smruti Sarangi   Game Theory-Based Parameter Tuning for
                                  Energy-Efficient Path Planning on Modern
                                  UAVs . . . . . . . . . . . . . . . . . . 34:1--34:??
                 Ranjan Pal and   
                 Peihan Liu and   
                   Taoan Lu and   
                         Ed Hua   How Hard Is Cyber-risk Management in
                                  IT/OT Systems? A Theory to Classify and
                                  Conquer Hardness of Insuring ICSs  . . . 35:1--35:??


ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 7, Number 1, January, 2023

       Samarjit Chakraborty and   
                 Somesh Jha and   
               Soheil Samii and   
               Philipp Mundhenk   Introduction to the Special Issue on
                                  Automotive CPS Safety & Security: Part 1  1:1--1:??
                Yanbing Mao and   
                 Yuliang Gu and   
           Naira Hovakimyan and   
                    Lui Sha and   
               Petros Voulgaris   SL$1$-Simplex: Safe Velocity Regulation
                                  of Self-Driving Vehicles in Dynamic and
                                  Unforeseen Environments  . . . . . . . . 2:1--2:??
              Mazen Mohamad and   
                 Rodi Jolak and   
        Örjan Askerdal and   
 Jan-Philipp Steghöfer and   
           Riccardo Scandariato   CASCADE: an Asset-driven Approach to
                                  Build Security Assurance Cases for
                                  Automotive Systems . . . . . . . . . . . 3:1--3:??
                Jarul Mehta and   
          Guillaume Richard and   
              Loren Lugosch and   
                   Derek Yu and   
                 Brett H. Meyer   DT-DS: CAN Intrusion Detection with
                                  Decision Tree Ensembles  . . . . . . . . 4:1--4:??
            Yuri Gil Dantas and   
                    Vivek Nigam   Automating Safety and Security Co-design
                                  through Semantically Rich Architecture
                                  Patterns . . . . . . . . . . . . . . . . 5:1--5:??
                Jiyang Chen and   
               Tomasz Kloda and   
               Rohan Tabish and   
              Ayoosh Bansal and   
            Chien-Ying Chen and   
                     Bo Liu and   
                Sibin Mohan and   
              Marco Caccamo and   
                        Lui Sha   SchedGuard++: Protecting against
                                  Schedule Leaks Using Linux Containers on
                                  Multi-Core Processors  . . . . . . . . . 6:1--6:??
               Ipsita Koley and   
              Soumyajit Dey and   
       Debdeep Mukhopadhyay and   
               Sachin Singh and   
             Lavanya Lokesh and   
Shantaram Vishwanath Ghotgalkar   CAD Support for Security and Robustness
                                  Analysis of Safety-critical Automotive
                                  Software . . . . . . . . . . . . . . . . 7:1--7:??
          Daniel Angermeier and   
              Hannah Wester and   
            Kristian Beilke and   
             Gerhard Hansch and   
              Jörn Eichler   Security Risk Assessments: Modeling and
                                  Risk Level Propagation . . . . . . . . . 8:1--8:??

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 7, Number 2, April, 2023

                   Handi Yu and   
                         Xin Li   Data-Driven Parameterized Corner
                                  Synthesis for Efficient Validation of
                                  Perception Systems for Autonomous
                                  Driving  . . . . . . . . . . . . . . . . 9:1--9:??
             Daniel Markert and   
               Alejandro Masrur   A Two-Speed Synchronous Traffic Protocol
                                  for Intelligent Intersections: From
                                  Single-Vehicle to Platoon Crossing . . . 10:1--10:??
             Nitasha Sahani and   
                  Ruoxi Zhu and   
                Jin-Hee Cho and   
                 Chen-Ching Liu   Machine Learning-based Intrusion
                                  Detection for Smart Grid Computing: a
                                  Survey . . . . . . . . . . . . . . . . . 11:1--11:??
             Anas Alsoliman and   
              Giulio Rigoni and   
           Davide Callegaro and   
             Marco Levorato and   
        Cristina M. Pinotti and   
                    Mauro Conti   Intrusion Detection Framework for
                                  Invasive FPV Drones Using Video
                                  Streaming Characteristics  . . . . . . . 12:1--12:??
            Eugene Vinitsky and   
      Nathan Lichtlé and   
             Kanaad Parvate and   
                Alexandre Bayen   Optimizing Mixed Autonomy Traffic Flow
                                  with Decentralized Autonomous Vehicles
                                  and Multi-Agent Reinforcement Learning   13:1--13:??
          Abdulrahman Fahim and   
      Evangelos Papalexakis and   
  Srikanth V. Krishnamurthy and   
      Amit K. Roy Chowdhury and   
               Lance Kaplan and   
               Tarek Abdelzaher   AcTrak: Controlling a Steerable
                                  Surveillance Camera using Reinforcement
                                  Learning . . . . . . . . . . . . . . . . 14:1--14:??
             Mohammed Asiri and   
             Neetesh Saxena and   
              Rigel Gjomemo and   
                    Pete Burnap   Understanding Indicators of Compromise
                                  against Cyber-attacks in Industrial
                                  Control Systems: a Security Perspective  15:1--15:??

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 7, Number 3, July, 2023

              Adnan Mahmood and   
              Quan Z. Sheng and   
             Wei Emma Zhang and   
                   Yan Wang and   
                  Subhash Sagar   Toward a Distributed Trust Management
                                  System for Misbehavior Detection in the
                                  Internet of Vehicles . . . . . . . . . . 16:1--16:??
          Théo Serru and   
                 Nga Nguyen and   
             Michel Batteux and   
                  Antoine Rauzy   Minimal Critical Sequences in
                                  Model-based Safety and Security
                                  Analyses: Commonalities and Differences  17:1--17:??
              Sandeep Banik and   
   Thiagarajan Ramachandran and   
         Arnab Bhattacharya and   
          Shaunak D. Bopardikar   Automated Adversary-in-the-Loop
                                  Cyber-Physical Defense Planning  . . . . 18:1--18:??
          Abdullah Al Maruf and   
                  Luyao Niu and   
               Andrew Clark and   
       J. Sukarno Mertoguno and   
               Radha Poovendran   A Timing-Based Framework for Designing
                                  Resilient Cyber-Physical Systems under
                                  Safety Constraint  . . . . . . . . . . . 19:1--19:??
             Naomi Stricker and   
              Yingzhao Lian and   
               Yuning Jiang and   
             Colin N. Jones and   
                  Lothar Thiele   Self-triggered Control with Energy
                                  Harvesting Sensor Nodes  . . . . . . . . 20:1--20:??
              Yi-Ting Hsieh and   
              Tzu-Tao Chang and   
              Chen-Jun Tsai and   
                Shih-Lun Wu and   
             Ching-Yuan Bai and   
            Kai-Chieh Chang and   
              Chung-Wei Lin and   
                Eunsuk Kang and   
                 Chao Huang and   
                         Qi Zhu   System Verification and Runtime
                                  Monitoring with Multiple Weakly-Hard
                                  Constraints  . . . . . . . . . . . . . . 21:1--21:??

ACM Transactions on Cyber-Physical Systems (TCPS)
Volume 7, Number 4, October, 2023

             Hassan Mousavi and   
              Ali Ebnenasir and   
             Elham Mahmoudzadeh   Formal Specification, Verification and
                                  Repair of Contiki's Scheduler  . . . . . 22:1--22:??
                  Xueli Fan and   
                 Qixin Wang and   
                        Jie Liu   A Reliable Wireless Protocol for Highway
                                  and Metered-Ramp CAV Collaborative
                                  Merging with Constant-Time-Headway
                                  Safety Guarantee . . . . . . . . . . . . 23:1--23:??
               Ertem Esiner and   
                 Utku Tefek and   
            Daisuke Mashima and   
                Binbin Chen and   
        Zbigniew Kalbarczyk and   
                 David M. Nicol   Message Authentication and Provenance
                                  Verification for Industrial Control
                                  Systems  . . . . . . . . . . . . . . . . 24:1--24:??
              Tommaso Zoppi and   
        Innocenzo Mungiello and   
          Andrea Ceccarelli and   
            Alberto Cirillo and   
              Lorenzo Sarti and   
           Lorenzo Esposito and   
         Giuseppe Scaglione and   
             Sergio Repetto and   
              Andrea Bondavalli   Safe Maintenance of Railways using COTS
                                  Mobile Devices: The Remote Worker
                                  Dashboard  . . . . . . . . . . . . . . . 25:1--25:??
          Khaled Sarieddine and   
         Mohammad Ali Sayed and   
              Sadegh Torabi and   
              Ribal Atallah and   
                     Chadi Assi   Investigating the Security of EV
                                  Charging Mobile Applications as an
                                  Attack Surface . . . . . . . . . . . . . 26:1--26:??
            Francis Tiausas and   
           Keiichi Yasumoto and   
         Jose Paolo Talusan and   
              Hayato Yamana and   
         Hirozumi Yamaguchi and   
      Shameek Bhattacharjee and   
             Abhishek Dubey and   
                   Sajal K. Das   HPRoP: Hierarchical Privacy-preserving
                                  Route Planning for Smart Cities  . . . . 27:1--27:??
                    Anqi Fu and   
                 Sijia Chen and   
                Junfei Qiao and   
                     Chengpu Yu   Periodic Event-Triggered CACC and
                                  Communication Co-design for Vehicle
                                  Platooning . . . . . . . . . . . . . . . 28:1--28:??
        Mohammad H. Mamduhi and   
                  Ehsan Hashemi   Event-Triggered Control with
                                  Intermittent Communications over Erasure
                                  Channels for Leader-Follower Problems
                                  with the Combined-Slip Effect  . . . . . 29:1--29:??