Last update: Tue Aug 20 09:24:21 MDT 2024
Volume 1, Number 1, February, 2017Tei Kuo Introduction . . . . . . . . . . . . . . 1e:1--1e:1 John A. Stankovic Research Directions for Cyber Physical Systems in Wireless and Mobile Healthcare . . . . . . . . . . . . . . . 1:1--1:12 Jianjia Wu and Wei Zhao Design and Realization of WInternet: From Net of Things to Internet of Things 2:1--2:12 Edward A. Lee Fundamental Limits of Cyber-Physical Systems Modeling . . . . . . . . . . . . 3:1--3:26 Desheng Zhang and Juanjuan Zhao and Fan Zhang and Tian He and Haengju Lee and Sang H. Son Heterogeneous Model Integration for Multi-Source Urban Infrastructure Data 4:1--4:26
Zhichuan Huang and Ting Zhu and David Irwin and Aditya Mishra and Daniel Menasche and Prashant Shenoy Minimizing Transmission Loss in Smart Microgrids by Sharing Renewable Energy 5:1--5:22 Desheng Zhang and Juanjuan Zhao and Fan Zhang and Ruobing Jiang and Tian He and Nikos Papanikolopoulos Last-Mile Transit Service with Urban Infrastructure Data . . . . . . . . . . 6:1--6:26 Riham Altawy and Amr M. Youssef Security, Privacy, and Safety Aspects of Civilian Drones: A Survey . . . . . . . 7:1--7:25 Rui Tan and Hoang Hai Nguyen and David K. Y. Yau Collaborative Load Management with Safety Assurance in Smart Grids . . . . 12:1--12:27 Liang He and Eugene Kim and Kang G. Shin A Case Study on Improving Capacity Delivery of Battery Packs via Reconfiguration . . . . . . . . . . . . 11:1--11:23 David Irwin and Srinivasan Iyengar and Stephen Lee and Aditya Mishra and Prashant Shenoy and Ye Xu Enabling Distributed Energy Storage by Incentivizing Small Load Shifts . . . . 10:1--10:30 Jian-Min Jiang and Huibiao Zhu and Qin Li and Yongxin Zhao and Lin Zhao and Shi Zhang and Ping Gong and Zhong Hong and Donghuo Chen Event-Based Mobility Modeling and Analysis . . . . . . . . . . . . . . . . 9:1--9:32 Marco Zimmerling and Luca Mottola and Pratyush Kumar and Federico Ferrari and Lothar Thiele Adaptive Real-Time Communication for Wireless Cyber-Physical Systems . . . . 8:1--8:29
Ilias Gerostathopoulos and Tomas Bures and Petr Hnetynka and Adam Hujecek and Frantisek Plasil and Dominik Skoda Strengthening Adaptation in Cyber-Physical Systems via Meta-Adaptation Strategies . . . . . . . 13:1--13:25 Kedar Khandeparkar and Krithi Ramamritham and Rajeev Gupta QoS-Driven Data Processing Algorithms for Smart Electric Grids . . . . . . . . 14:1--14:24 Junkil Park and Radoslav Ivanov and James Weimer and Miroslav Pajic and Sang Hyuk Son and Insup Lee Security of Cyber-Physical Systems in the Presence of Transient Sensor Faults 15:1--15:23 Hongwei Wang and Yunlong Gao and Shaohan Hu and Shiguang Wang and Renato Mancuso and Minje Kim and Poliang Wu and Lu Su and Lui Sha and Tarek Abdelzaher On Exploiting Structured Human Interactions to Enhance Sensing Accuracy in Cyber-physical Systems . . . . . . . 16:1--16:19
Wei Zhao and Tarek Abdelzaher Preface to the Special Issue: Toward an Efficient and Effective Internet of Things for Cyber-Physical Systems . . . 7:1--7:2 Roy Dong and Lillian J. Ratliff and Alvaro A. Cárdenas and Henrik Ohlsson and S. Shankar Sastry Quantifying the Utility--Privacy Tradeoff in the Internet of Things . . . 8:1--8:28 Sze Zheng Yong and Minghui Zhu and Emilio Frazzoli Switching and Data Injection Attacks on Stochastic Cyber-Physical Systems: Modeling, Resilient Estimation, and Attack Mitigation . . . . . . . . . . . 9:1--9:2 Qiang Wu and T. John Koo and Yoshihiko Susuki Dynamic Security Analysis of Power Systems by a Sampling-Based Algorithm 10:1--10:26 Guanjun Liu and Changjun Jiang and Mengchu Zhou Time-Soundness of Time Petri Nets Modelling Time-Critical Systems . . . . 11:1--11:27 Gerry Siegemund and Volker Turau A Self-Stabilizing Publish/Subscribe Middleware for IoT Applications . . . . 12:1--12:26 Alessandro A. Nacci and Vincenzo Rana and Bharathan Balaji and Paola Spoletini and Rajesh Gupta and Donatella Sciuto and Yuvraj Agarwal BuildingRules: a Trigger--Action-Based System to Manage Complex Commercial Buildings . . . . . . . . . . . . . . . 13:1--13:22 Ping Wang and Meng Ma and Chao-Hsien Chu Long-Term Event Processing over Data Streams in Cyber-Physical Systems . . . 14:1--14:23
Wei Zhao and Tarek Abdelzaher Preface to the Special Issue: Toward an Efficient and Effective Internet of Things for Cyber-Physical Systems (Part II) . . . . . . . . . . . . . . . . . . 15:1--15:2 Subhav Pradhan and Abhishek Dubey and Shweta Khare and Saideep Nannapaneni and Aniruddha Gokhale and Sankaran Mahadevan and Douglas C. Schmidt and Martin Lehofer CHARIOT: Goal-Driven Orchestration Middleware for Resilient IoT Systems . . 16:1--16:37 Farzad Samie and Vasileios Tsoutsouras and Lars Bauer and Sotirios Xydis and Dimitrios Soudris and Jörg Henkel Distributed Trade-Based Edge Device Management in Multi-Gateway IoT . . . . 17:1--17:25 Jinwei Liu and Haiying Shen and Husnu S. Narman and Wingyan Chung and Zongfang Lin A Survey of Mobile Crowdsensing Techniques: a Critical Component for The Internet of Things . . . . . . . . . . . 18:1--18:26 Paul Martin and Andrew Symington and Mani Srivastava SLATS: Simultaneous Localization and Time Synchronization . . . . . . . . . . 19:1--19:25 Qianyi Huang and Yan Mei and Wei Wang and Qian Zhang Toward Battery-Free Wearable Devices: The Synergy between Two Feet . . . . . . 20:1--20:18 Amel Bennaceur and Thein Than Tun and Arosha K. Bandara and Yijun Yu and Bashar Nuseibeh Feature-Driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things . . . . . . . . . . . 21:1--21:25 Lei Bu and Wen Xiong and Chieh-Jan Mike Liang and Shi Han and Dongmei Zhang and Shan Lin and Xuandong Li Systematically Ensuring the Confidence of Real-Time Home Automation IoT Systems 22:1--22:23
Luan V. Nguyen and Khaza Anuarul Hoque and Stanley Bak and Steven Drager and Taylor T. Johnson Cyber-Physical Specification Mismatches 23:1--23:26 Rajrup Ghosh and Yogesh Simmhan Distributed Scheduling of Event Analytics across Edge and Cloud . . . . 24:1--24:28 Mischa Schmidt and Anett Schülke and Alberto Venturi and Roman Kurpatov and Enrique Blanco Henríquez Cyber-Physical System for Energy-Efficient Stadium Operation: Methodology and Experimental Validation 25:1--25:26 Wanli Chang and Dip Goswami and Samarjit Chakraborty and Arne Hamann OS-Aware Automotive Controller Design Using Non-Uniform Sampling . . . . . . . 26:1--26:22 Xiaofeng Wang and Naira Hovakimyan and Lui Sha RSimplex: a Robust Control Architecture for Cyber And Physical Failures . . . . 27:1--27:26 Subhash Lakshminarayana and Teo Zhan Teng and Rui Tan and David K. Y. Yau Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems . . . . . . . . . 28:1--28:29 Insup Lee and Miroslav Pajic Guest Editorial: Special Issue on Medical Cyber-Physical Systems . . . . . 29:1--29:2 Pasquale Buonocunto and Andrea Giantomassi and Mauro Marinoni and Davide Calvaresi and Giorgio Buttazzo A Limb Tracking Platform for Tele-Rehabilitation . . . . . . . . . . 30:1--30:23 D. De Venuto and V. F. Annese and G. Mezzina and F. Scioscia and M. Ruta and E. Di Sciascio and A. Sangiovanni Vincentelli A Mobile Health System for Neurocognitive Impairment Evaluation Based on P300 Detection . . . . . . . . 31:1--31:21 Eugene Yip and Sidharta Andalam and Partha S. Roop and Avinash Malik and Mark L. Trew and Weiwei Ai and Nitish Patel Towards the Emulation of the Cardiac Conduction System for Pacemaker Validation . . . . . . . . . . . . . . . 32:1--32:26 Nicola Paoletti and Andrea Patan\`e and Marta Kwiatkowska Closed-Loop Quantitative Verification of Rate-Adaptive Pacemakers . . . . . . . . 33:1--33:31 Guillaume Joerger and Juliette Rambourg and Helene Gaspard-Boulinc and Stephane Conversy and Barbara L. Bass and Brian J. Dunkin and Marc Garbey A Cyber-Physical System to Improve the Management of a Large Suite of Operating Rooms . . . . . . . . . . . . . . . . . 34:1--34:24 André A. Geraldes and Luca Geretti and Davide Bresolin and Riccardo Muradore and Paolo Fiorini and Leonardo S. Mattos and Tiziano Villa Formal Verification of Medical CPS: a Laser Incision Case Study . . . . . . . 35:1--35:29
Md Zakirul Alam Bhuiyan and Sy-yen Kuo and Damian Lyons and Zili Shao Dependability in Cyber-Physical Systems and Applications . . . . . . . . . . . . 1:1--1:4 Feng Tan and Liansheng Liu and Stefan Winter and Qixin Wang and Neeraj Suri and Lei Bu and Yu Peng and Xue Liu and Xiyuan Peng Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS . . . . 2:1--2:25 Yehan Ma and Dolvara Gunatilaka and Bo Li and Humberto Gonzalez and Chenyang Lu Holistic Cyber-Physical Management for Dependable Wireless Control Systems . . 3:1--3:25 Guoqi Xie and Gang Zeng and Jiyao An and Renfa Li and Keqin Li Resource-Cost-Aware Fault-Tolerant Design Methodology for End-to-End Functional Safety Computation on Automotive Cyber-Physical Systems . . . 4:1--4:27 Yang Liu and Xiaoming Chen and Dileep Kadambi and Ajinkya Bari and Xin Li and Shiyan Hu and Pingqiang Zhou Dependable Visual Light-Based Indoor Localization with Automatic Anomaly Detection for Location-Based Service of Mobile Cyber-Physical Systems . . . . . 5:1--5:17 Tian Wang and Wenhua Wang and Anfeng Liu and Shaobin Cai and Jiannong Cao Improve the Localization Dependability for Cyber-Physical Applications . . . . 6:1--6:21 Chang Wang and Yongxin Zhu and Weiwei Shi and Victor Chang and P. Vijayakumar and Bin Liu and Yishu Mao and Jiabao Wang and Yiping Fan A Dependable Time Series Analytic Framework for Cyber-Physical Systems of IoT-based Smart Grid . . . . . . . . . . 7:1--7:18 Jiahui Yu and Kun Wang and Deze Zeng and Chunsheng Zhu and Song Guo Privacy-preserving Data Aggregation Computing in Cyber-Physical Social Systems . . . . . . . . . . . . . . . . 8:1--8:23 Ning Li and Zheng Yan and Mingjun Wang and Laurence T. Yang Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE . . . . . . . . . . . . . . . . . 9:1--9:23 Beibei Li and Rongxing Lu and Kim-Kwang Raymond Choo and Wei Wang and Sheng Luo On Reliability Analysis of Smart Grids under Topology Attacks: a Stochastic Petri Net Approach . . . . . . . . . . . 10:1--10:25 Qingchen Zhang and Laurence T. Yang and Zhikui Chen and Peng Li Dependable Deep Computation Model for Feature Learning on Big Data in Cyber-Physical Systems . . . . . . . . . 11:1--11:17 Yu Jiang and Houbing Song and Yixiao Yang and Han Liu and Ming Gu and Yong Guan and Jiaguang Sun and Lui Sha Dependable Model-driven Development of CPS: From Stateflow Simulation to Verified Implementation . . . . . . . . 12:1--12:31
Jiang Wan and Anthony Lopez and Mohammad Abdullah Al Faruque Physical Layer Key Generation: Securing Wireless Communication in Automotive Cyber-Physical Systems . . . . . . . . . 13:1--13:26 Pei-Chi Huang and Luis Sentis and Joel Lehman and Chien-Liang Fok and Aloysius K. Mok and Risto Miikkulainen Tradeoffs in Neuroevolutionary Learning-Based Real-Time Robotic Task Design in the Imprecise Computation Framework . . . . . . . . . . . . . . . 14:1--14:29 Roopak Sinha and Barry Dowdeswell and Gulnara Zhabelova and Valeriy Vyatkin TORUS: Scalable Requirements Traceability for Large-Scale Cyber-Physical Systems . . . . . . . . . 15:1--15:25 Edward Tremel and Ken Birman and Robert Kleinberg and Márk Jelasity Anonymous, Fault-Tolerant Distributed Queries for Smart Devices . . . . . . . 16:1--16:29 Srinivasan Iyengar and Sandeep Kalra and Anushree Ghosh and David Irwin and Prashant Shenoy and Benjamin Marlin Inferring Smart Schedules for Dumb Thermostats . . . . . . . . . . . . . . 17:1--17:29 Andrea Ceccarelli and Tommaso Zoppi and Alexandr Vasenev and Marco Mori and Dan Ionita and Lorena Montoya and Andrea Bondavalli Threat Analysis in Systems-of-Systems: an Emergence-Oriented Approach . . . . . 18:1--18:24 Marco Biagi and Laura Carnevali and Fabio Tarani and Enrico Vicario Model-Based Quantitative Evaluation of Repair Procedures in Gas Distribution Networks . . . . . . . . . . . . . . . . 19:1--19:26 C. W. Badenhop and S. R. Graham and B. E. Mullins and L. O. Mailloux Looking Under the Hood of Z-Wave: Volatile Memory Introspection for the ZW0301 Transceiver . . . . . . . . . . . 20:1--20:24 Desheng Zhang and Tian He and Fan Zhang National-scale Traffic Model Calibration in Real Time with Multi-source Incomplete Data . . . . . . . . . . . . 21:1--21:26 William Koch and Renato Mancuso and Richard West and Azer Bestavros Reinforcement Learning for UAV Attitude Control . . . . . . . . . . . . . . . . 22:1--22:21 Sean Barker and Sandeep Kalra and David Irwin and Prashant Shenoy Building Virtual Power Meters for Online Load Tracking . . . . . . . . . . . . . 23:1--23:24
Luis Almeida and Bjorn Andersson and Jen-Wei Hsieh and Li-Pin Chang and Xiaobo Sharon Hu Introduction to the Special Issue on Real-Time aspects in Cyber-Physical Systems . . . . . . . . . . . . . . . . 24:1--24:2 Shunsuke Aoki and Ragunathan (Raj) Rajkumar CSIP: a Synchronous Protocol for Automated Vehicles at Road Intersections 25:1--25:25 Philip Parsch and Alejandro Masrur Accounting for Reliability in Unacknowledged Time-Constrained WSNs . . 26:1--26:28 João Loureiro and Raghuraman Rangarajan and Borislav Nikolic and Leandro Soares Indrusiak and Eduardo Tovar Extensive Analysis of a Real-Time Dense Wired Sensor Network Based on Traffic Shaping . . . . . . . . . . . . . . . . 27:1--27:27 Baekgyu Kim and Lu Feng and Oleg Sokolsky and Insup Lee Determining Timing Parameters for the Code Generation from Platform-Independent Timed Models . . . 28:1--28:32 Chao Wang and Christopher Gill and Chenyang Lu Real-Time Middleware for Cyber-Physical Event Processing . . . . . . . . . . . . 29:1--29:25 Hendrik Roehm and Jens Oehlerking and Matthias Woehrle and Matthias Althoff Model Conformance for Cyber-Physical Systems: a Survey . . . . . . . . . . . 30:1--30:26 Dima Rabadi and Rui Tan and David K. Y. Yau and Sreejaya Viswanathan and Hao Zheng and Peng Cheng Resilient Clock Synchronization Using Power Grid Voltage . . . . . . . . . . . 31:1--31:26 Chen Pan and Mimi Xie and Song Han and Zhi-Hong Mao and Jingtong Hu Modeling and Optimization for Self-powered Non-volatile IoT Edge Devices with Ultra-low Harvesting Power 32:1--32:26 Róbinson Medina and Juan Valencia and Sander Stuijk and Dip Goswami and Twan Basten Designing a Controller with Image-based Pipelined Sensing and Additive Uncertainties . . . . . . . . . . . . . 33:1--33:26 Junia Valente and Kanchan Bahirat and Kelly Venechanos and Alvaro A. Cardenas and Prabhakaran Balakrishnan Improving the Security of Visual Challenges . . . . . . . . . . . . . . . 34:1--34:26
Tongquan Wei and Junlong Zhou and Rajiv Ranjan and Isaac Triguero and Huafeng Yu and Chun Jason Xue and Schahram Dustdar Introduction to the Special Issue on Human-interaction-aware Data Analytics for Cyber-physical Systems . . . . . . . 35e:1--35e:2 Xiaokang Wang and Laurence T. Yang and Yihao Wang and Xingang Liu and Qingxia Zhang and M. Jamal Deen A Distributed Tensor-Train Decomposition Method for Cyber-Physical-Social Services . . . . . . . . . . . . . . . . 35:1--35:15 Tingmin Wu and Lihong Tang and Rongjunchen Zhang and Sheng Wen and Cecile Paris and Surya Nepal and Marthie Grobler and Yang Xiang Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps . . . . . . . . . . . . . . 36:1--36:21 Wei Li and Xiaomin Chang and Junwei Cao and Ting Yang and Yaojie Sun and Albert Y. Zomaya A Sustainable and User-Behavior-Aware Cyber-Physical System for Home Energy Management . . . . . . . . . . . . . . . 37:1--37:24 Fu Xiao and Jing Chen and Zhetao Li and Haiping Huang and Lijuan Sun Improved LDA Dimension Reduction Based Behavior Learning with Commodity WiFi for Cyber-Physical Systems . . . . . . . 38:1--38:19 Guoqi Xie and Yang Bai and Wei Wu and Yanwen Li and Renfa Li and Keqin Li Human-Interaction-aware Adaptive Functional Safety Processing for Multi-Functional Automotive Cyber-Physical Systems . . . . . . . . . 39:1--39:25 Hui Huang and Shiyan Hu and Ye Sun Energy-Efficient ECG Signal Compression for User Data Input in Cyber-Physical Systems by Leveraging Empirical Mode Decomposition . . . . . . . . . . . . . 40:1--40:19 Hyung-Jin Yoon and Christopher Widdowson and Thiago Marinho and Ranxiao Frances Wang and Naira Hovakimyan Socially Aware Path Planning for a Flying Robot in Close Proximity of Humans . . . . . . . . . . . . . . . . . 41:1--41:24 Chaoqun Yang and Li Feng and Zhiguo Shi and Rongxing Lu and Kim-Kwang Raymond Choo A Crowdsensing-based Cyber-physical System for Drone Surveillance Using Random Finite Set Theory . . . . . . . . 42:1--42:22
Samarjit Chakraborty and Tian He Introduction to the Special Issue on Transportation Cyber-Physical Systems 1:1--1:3 Mostafa Gilanifar and Hui Wang and Eren Erman Ozguven and Yuxun Zhou and Reza Arghandeh Bayesian Spatiotemporal Gaussian Process for Short-term Load Forecasting Using Combined Transportation and Electricity Data . . . . . . . . . . . . . . . . . . 2:1--2:25 Bowen Zheng and Chung-Wei Lin and Shinichi Shiraishi and Qi Zhu Design and Analysis of Delay-Tolerant Intelligent Intersection Management . . 3:1--3:27 Subhojeet Mukherjee and Jeffrey C. Van Etten and Namburi Rani Samyukta and Jacob Walker and Indrakshi Ray and Indrajit Ray TruckSTM: Runtime Realization of Operational State Transitions for Medium and Heavy Duty Vehicles . . . . . . . . 4:1--4:25 Sebastian Van De Hoef and Jonas Mårtensson and Dimos V. Dimarogonas and Karl Henrik Johansson A Predictive Framework for Dynamic Heavy-Duty Vehicle Platoon Coordination 5:1--5:25 Yue Guan and Anuradha M. Annaswamy and H. Eric Tseng A Dynamic Routing Framework for Shared Mobility Services . . . . . . . . . . . 6:1--6:28 Hoon Wei Lim and William G. Temple and Bao Anh N. Tran and Binbin Chen and Zbigniew Kalbarczyk and Jianying Zhou Data Integrity Threats and Countermeasures in Railway Spot Transmission Systems . . . . . . . . . . 7:1--7:26 Baekgyu Kim and Takato Masuda and Shinichi Shiraishi Test Specification and Generation for Connected and Autonomous Vehicle in Virtual Environments . . . . . . . . . . 8:1--8:26 Rajesh P. Barnwal and Nirnay Ghosh and Soumya K. Ghosh and Sajal K. Das Publish or Drop Traffic Event Alerts? Quality-aware Decision Making in Participatory Sensing-based Vehicular CPS . . . . . . . . . . . . . . . . . . 9:1--9:28 Mikael Asplund Combining Detection and Verification for Secure Vehicular Cooperation Groups . . 10:1--10:31 Carmen Cheh and Binbin Chen and William G. Temple and William H. Sanders Modeling Adversarial Physical Movement in a Railway Station: Classification and Metrics . . . . . . . . . . . . . . . . 11:1--11:25 Woo-Hyun Ko and Bharadwaj Satchidanandan and P. R. Kumar Dynamic Watermarking-based Defense of Transportation Cyber-physical Systems 12:1--12:21 Chongguang Bi and Jun Huang and Guoliang Xing and Landu Jiang and Xue Liu and Minghua Chen SafeWatch: a Wearable Hand Motion Tracking System for Improving Driving Safety . . . . . . . . . . . . . . . . . 13:1--13:21
Meiyi Ma and Sarah M. Preum and Mohsin Y. Ahmed and William Tärneberg and Abdeltawab Hendawi and John A. Stankovic Data Sets, Modeling, and Decision Making in Smart Cities: a Survey . . . . . . . 14:1--14:28 Sirajum Munir and Hao-Tsung Yang and Shan Lin and S. M. Shahriar Nirjon and Chen Lin and Enamul Hoque and John A. Stankovic and Kamin Whitehouse Reliable Communication and Latency Bound Generation in Wireless Cyber-Physical Systems . . . . . . . . . . . . . . . . 15:1--15:26 Leonardo Babun and Hidayet Aksu and A. Selcuk Uluagac A System-level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case . . . . . . . . . . . . 16:1--16:28 Li Yan and Haiying Shen TOP: Optimizing Vehicle Driving Speed with Vehicle Trajectories for Travel Time Minimization and Road Congestion Avoidance . . . . . . . . . . . . . . . 17:1--17:25 Dominik Baumann and Fabian Mager and Romain Jacob and Lothar Thiele and Marco Zimmerling and Sebastian Trimpe Fast Feedback Control over Multi-hop Wireless Networks with Mode Changes and Stability Guarantees . . . . . . . . . . 18:1--18:32 J. Harbin and A. Burns and R. I. Davis and L. S. Indrusiak and I. Bate and D. Griffin The AirTight Protocol for Mixed Criticality Wireless CPS . . . . . . . . 19:1--19:28 Mohammad Khayatian and Yingyan Lou and Mohammadreza Mehrabian and Aviral Shirvastava Crossroads+: a Time-aware Approach for Intersection Management of Connected Autonomous Vehicles . . . . . . . . . . 20:1--20:28 Christopher Pereyda and Nisha Raghunath and Bryan Minor and Garrett Wilson and Maureen Schmitter-Edgecombe and Diane J. Cook Cyber-physical Support of Daily Activities: a Robot/Smart Home Partnership . . . . . . . . . . . . . . 21:1--21:24 Kai Li and Wei Ni and Yousef Emami and Yiran Shen and Ricardo Severino and David Pereira and Eduardo Tovar Design and Implementation of Secret Key Agreement for Platoon-based Vehicular Cyber-physical Systems . . . . . . . . . 22:1--22:20 Voica Gavrilut and Paul Pop Traffic-type Assignment for TSN-based Mixed-criticality Cyber-physical Systems 23:1--23:27
Zhicheng Fu and Chunhui Guo and Zhenyu Zhang and Shangping Ren and Lui Sha UACFinder: Mining Syntactic Carriers of Unspecified Assumptions in Medical Cyber-Physical System Design Models . . 24:1--24:25 Zhenyong Zhang and Ruilong Deng and David K. Y. Yau and Peng Cheng and Jiming Chen On Hiddenness of Moving Target Defense against False Data Injection Attacks on Power Grid . . . . . . . . . . . . . . . 25:1--25:29 Ali Tamimi and Adam Hahn and Sandip Roy Cyber Threat Impact Analysis to Air Traffic Flows Through Dynamic Queue Networks . . . . . . . . . . . . . . . . 26:1--26:22 Di Wu and Hanlin Zhu and Yongxin Zhu and Victor Chang and Cong He and Ching-Hsien Hsu and Hui Wang and Songlin Feng and Li Tian and Zunkai Huang Anomaly Detection Based on RBM-LSTM Neural Network for CPS in Advanced Driver Assistance System . . . . . . . . 27:1--27:17 Vuk Lesi and Ilija Jovanov and Miroslav Pajic Integrating Security in Resource-Constrained Cyber-Physical Systems . . . . . . . . . . . . . . . . 28:1--28:27 Neetesh Saxena and Alvaro A. Cardenas and Raheem Beyah and Rongxing Lu and Kim-Kwang Raymond Choo and Yiran Chen Introduction to the Special Issue on User-Centric Security and Safety for CPS 29:1--29:2 Ding Wang and Ping Wang and Chenyu Wang Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs . . . . . . . . . . . . . . . . . . 30:1--30:26 Mohammadhadi Alaeiyan and Ali Dehghantanha and Tooska Dargahi and Mauro Conti and Saeed Parsa A Multilabel Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks . . . . . . . . . . . . . . . . 31:1--31:22 Deepak Puthal and Laurence T. Yang and Schahram Dustdar and Zhenyu Wen and Song Jun and Aad van Moorsel and Rajiv Ranjan A User-centric Security Solution for Internet of Things and Edge Convergence 32:1--32:19 George Hatzivasilis and Othonas Soultatos and Sotiris Ioannidis and George Spanoudakis and Vasilios Katos and Giorgos Demetriou MobileTrust: Secure Knowledge Integration in VANETs . . . . . . . . . 33:1--33:25 Meriem Guerar and Luca Verderame and Alessio Merlo and Francesco Palmieri and Mauro Migliardi and Luca Vallerini CirclePIN: a Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices . . . 34:1--34:19 Ke Huang and Xiaosong Zhang and Xiaofen Wang and Yi Mu and Fatemeh Rezaeibagha and Guangquan Xu and Hao Wang and Xi Zheng and Guomin Yang and Qi Xia and Xiaojiang Du HUCDO: a Hybrid User-centric Data Outsourcing Scheme . . . . . . . . . . . 35:1--35:23 Mohammadreza Arani and Deepa Kundur A User-centric Approach toward Resilient Frequency-regulating Wind Generators . . 36:1--36:23
Axel Jantsch and Peter R. Lewis and Nikil Dutt Introduction to the Special Issue on Self-Aware Cyber-physical Systems . . . 37:1--37:2 K. Bellman and C. Landauer and N. Dutt and L. Esterle and A. Herkersdorf and A. Jantsch and N. TaheriNejad and P. R. Lewis and M. Platzner and K. Tammemäe Self-aware Cyber-Physical Systems . . . 38:1--38:26 Lukas Esterle and John N. A. Brown I Think Therefore You Are: Models for Interaction in Collectives of Self-aware Cyber-physical Systems . . . . . . . . . 39:1--39:25 Adrian Sapio and Shuvra S. Bhattacharyya and Marilyn Wolf Runtime Adaptation in Wireless Sensor Nodes Using Structured Learning . . . . 40:1--40:28 Yehan Ma and Chenyang Lu and Yebin Wang Efficient Holistic Control: Self-awareness across Controllers and Wireless Networks . . . . . . . . . . . 41:1--41:27 Ruizhi Chai and Ying Zhang and Geng Sun and Hongsheng Li Self-aware Power Management for Maintaining Event Detection Probability of Supercapacitor-powered Cyber-physical Systems . . . . . . . . . . . . . . . . 42:1--42:19 Matthew Weber and Baihong Jin and Gil Lederman and Yasser Shoukry and Edward A. Lee and Sanjit Seshia and Alberto Sangiovanni-Vincentelli Gordian: Formal Reasoning-based Outlier Detection for Secure Localization . . . 43:1--43:27 Hong Lu and Tao Yue and Shaukat Ali Pattern-based Interactive Configuration Derivation for Cyber-physical System Product Lines . . . . . . . . . . . . . 44:1--44:24 Craig Bakker and Arnab Bhattacharya and Samrat Chatterjee and Draguna L. Vrabie Hypergames and Cyber-Physical Security for Control Systems . . . . . . . . . . 45:1--45:41 Yunhao Bai and Kuangyu Zheng and Zejiang Wang and Xiaorui Wang and Junmin Wang MC-Safe: Multi-channel Real-time V2V Communication for Enhancing Driving Safety . . . . . . . . . . . . . . . . . 46:1--46:27 Pushpak Jagtap and Fardin Abdi and Matthias Rungger and Majid Zamani and Marco Caccamo Software Fault Tolerance for Cyber-Physical Systems via Full System Restart . . . . . . . . . . . . . . . . 47:1--47:20 Mohammad Khayatian and Mohammadreza Mehrabian and Edward Andert and Rachel Dedinsky and Sarthake Choudhary and Yingyan Lou and Aviral Shirvastava A Survey on Intersection Management of Connected Autonomous Vehicles . . . . . 48:1--48:27
Moreno Ambrosin and Mauro Conti and Riccardo Lazzeretti and Chia-Mu Yu Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems . . . . . . . . . 1:1--1:2 Kaushal Kafle and Kevin Moran and Sunil Manandhar and Adwait Nadkarni and Denys Poshyvanyk Security in Centralized Data Store-based Home Automation Platforms: a Systematic Analysis of Nest and Hue . . . . . . . . 2:1--2:27 Nisha Panwar and Shantanu Sharma and Guoxi Wang and Sharad Mehrotra and Nalini Venkatasubramanian CANOPY: a Verifiable Privacy-Preserving Token Ring-Based Communication Protocol for Smart Homes . . . . . . . . . . . . 3:1--3:34 Muhammad Ajmal Azad and Charith Perera and Samiran Bag and Mahmoud Barhamgi and Feng Hao Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks . . . . . . 4:1--4:24 Gabriela Suntaxi and Aboubakr Achraf El Ghazi and Klemens Böhm Preserving Secrecy in Mobile Social Networks . . . . . . . . . . . . . . . . 5:1--5:29 Heena Rathore and Abhay Samant and Murtuza Jadliwala TangleCV: a Distributed Ledger Technique for Secure Message Sharing in Connected Vehicles . . . . . . . . . . . . . . . . 6:1--6:25 Abhimanyu Rawat and Mohammad Khodari and Mikael Asplund and Andrei Gurtov Decentralized Firmware Attestation for In-Vehicle Networks . . . . . . . . . . 7:1--7:23 Scott Eisele and Taha Eghtesad and Keegan Campanelli and Prakhar Agrawal and Aron Laszka and Abhishek Dubey Safe and Private Forward-trading Platform for Transactive Microgrids . . 8:1--8:29 Venkata Reddy Palleti and Vishrut Kumar Mishra and Chuadhry Mujeeb Ahmed and Aditya Mathur Can Replay Attacks Designed to Steal Water from Water Distribution Systems Remain Undetected? . . . . . . . . . . . 9:1--9:19 Abdelaziz Khaled and Samir Ouchani and Zahir Tari and Khalil Drira Assessing the Severity of Smart Attacks in Industrial Cyber-Physical Systems . . 10:1--10:28 Claudio A. Ardagna and Rasool Asal and Ernesto Damiani and Nabil El Ioini and Mehdi Elahi and Claus Pahl From Trustworthy Data to Trustworthy IoT: a Data Collection Methodology Based on Blockchain . . . . . . . . . . . . . 11:1--11:26
Aviral Shrivastava and Patricia Derler Introduction to the Special Issue on Time for CPS (TCPS) . . . . . . . . . . 12:1--12:2 Rafael Rosales and Michael Paulitsch Composable Finite State Machine-based Modeling for Quality-of-Information-aware Cyber-physical Systems . . . . . . . . . 13:1--13:27 Kai-Björn Gemlau and Leonie KÖHLER and Rolf Ernst and Sophie Quinton System-level Logical Execution Time: Augmenting the Logical Execution Time Paradigm for Distributed Real-time Automotive Software . . . . . . . . . . 14:1--14:27 João Bastos and Jeroen Voeten and Sander Stuijk and Ramon Schiffelers and Henk Corporaal Taming the State-space Explosion in the Makespan Optimization of Flexible Manufacturing Systems . . . . . . . . . 15:1--15:26 Bingzhuo Zhong and Claudius Jordan and Julien Provost Extending Signal Temporal Logic with Quantitative Semantics by Intervals for Robust Monitoring of Cyber-physical Systems . . . . . . . . . . . . . . . . 16:1--16:25 Fei Miao and Sihong He and Lynn Pepin and Shuo Han and Abdeltawab Hendawi and Mohamed E. Khalefa and John A. Stankovic and George Pappas Data-driven Distributionally Robust Optimization For Vehicle Balancing of Mobility-on-Demand Systems . . . . . . . 17:1--17:27 Laksh Bhatia and Ivana Tomi\'c and Anqi Fu and Michael Breza and Julie A. Mccann Control Communication Co-Design for Wide Area Cyber-Physical Systems . . . . . . 18:1--18:27 Li Yan and Haiying Shen Utilizing Game Theory to Optimize In-motion Wireless Charging Service Efficiency for Electric Vehicles . . . . 19:1--19:26 Luyao Niu and Andrew Clark A Differentially Private Incentive Design for Traffic Offload to Public Transportation . . . . . . . . . . . . . 20:1--20:27 Srinarayana Nagarathinam and Arunchandar Vasan and Venkatesh Sarangan and Rajesh Jayaprakash and Anand Sivasubramaniam User Placement and Optimal Cooling Energy for Co-working Building Spaces 21:1--21:24
Chenyang Lu Toward a Scientific and Engineering Discipline of Cyber-Physical Systems . . 22e:1--22e:2 Giuseppe Bombara and Calin Belta Offline and Online Learning of Signal Temporal Logic Formulae Using Decision Trees . . . . . . . . . . . . . . . . . 22:1--22:23 Craig Bakker and Arnab Bhattacharya and Samrat Chatterjee and Draguna L. Vrabie Metagames and Hypergames for Deception-Robust Control . . . . . . . . 23:1--23:25 Pierre-François Gimenez and Jonathan Roux and Eric Alata and Guillaume Auriol and Mohamed Kaaniche and Vincent Nicomette \pkgRIDS: Radio Intrusion Detection and Diagnosis System for Wireless Communications in Smart Environment . . 24:1--24:1 Shrey Baheti and Shreyas Badiger and Yogesh Simmhan \pkgVIoLET: an Emulation Environment for Validating IoT Deployments at Large Scales . . . . . . . . . . . . . . . . . 25:1--25:39 Jiachen Mao and Huanrui Yang and Ang Li and Hai Li and Yiran Chen \pkgTPrune: Efficient Transformer Pruning for Mobile Devices . . . . . . . 26:1--26:22 Kai Li and Ning Lu and Jingjing Zheng and Pei Zhang and Wei Ni and Eduardo Tovar \pkgBloothAir: a Secure Aerial Relay System Using Bluetooth Connected Autonomous Drones . . . . . . . . . . . 27:1--27:22 Jianjun Wen and Waltenegus Dargie Characterization of Link Quality Fluctuation in Mobile Wireless Sensor Networks . . . . . . . . . . . . . . . . 28:1--28:24 Gonçalo Jesus and António Casimiro and Anabela Oliveira Using Machine Learning for Dependable Outlier Detection in Environmental Monitoring Systems . . . . . . . . . . . 29:1--29:30 Martín Barr\`ere and Chris Hankin Analysing Mission-critical Cyber-physical Systems with AND/OR Graphs and MaxSAT . . . . . . . . . . . 30:1--30:29 Hamza Bourbouh and Pierre-Lo\"\ic Garoche and Christophe Garion and Xavier Thirioux From Lustre to Simulink: Reverse Compilation for Embedded Systems Applications . . . . . . . . . . . . . . 31:1--31:20 Georgios Bakirtzis and Cody H. Fleming and Christina Vasilakopoulou Categorical Semantics of Cyber-Physical Systems Theory . . . . . . . . . . . . . 32:1--32:32
Jingtong Hu and Qi Zhu and Susmit Jha Introduction to the Special Issue on Artificial Intelligence and Cyber-Physical Systems: Part 1 . . . . . 33:1--33:3 Jianguo Chen and Kenli Li and Keqin Li and Philip S. Yu and Zeng Zeng Dynamic Bicycle Dispatching of Dockless Public Bicycle-sharing Systems Using Multi-objective Reinforcement Learning 34:1--34:24 Alëna Rodionova and Yash Vardhan Pant and Connor Kurtz and Kuk Jang and Houssam Abbas and Rahul Mangharam Learning-`N-Flying: a Learning-Based, Decentralized Mission-Aware UAS Collision Avoidance Scheme . . . . . . . 35:1--35:26 Siddharth Mysore and Bassel Mabsout and Kate Saenko and Renato Mancuso How to Train Your Quadrotor: a Framework for Consistently Smooth and Responsive Flight Control via Reinforcement Learning . . . . . . . . . . . . . . . . 36:1--36:24 Stephanie Abrecht and Lydia Gauerhof and Christoph Gladisch and Konrad Groh and Christian Heinzemann and Matthias Woehrle Testing Deep Learning-based Visual Perception for Automated Driving . . . . 37:1--37:28 Colin Shea-Blymyer and Houssam Abbas Algorithmic Ethics: Formalization and Verification of Autonomous Vehicle Obligations . . . . . . . . . . . . . . 38:1--38:25 Wei Jiang and Zhiyuan He and Jinyu Zhan and Weijia Pan and Deepak Adhikari Research Progress and Challenges on Application-Driven Adversarial Examples: a Survey . . . . . . . . . . . . . . . . 39:1--39:25 Menghong Feng and Noman Bashir and Prashant Shenoy and David Irwin and Beka Kosanovic Model-driven Per-panel Solar Anomaly Detection for Residential Arrays . . . . 40:1--40:20 Md Tahmid Rahman Laskar and Jimmy Xiangji Huang and Vladan Smetana and Chris Stewart and Kees Pouw and Aijun An and Stephen Chan and Lei Liu Extending Isolation Forest for Anomaly Detection in Big Data via $K$-Means . . 41:1--41:26 Tommaso Zoppi and Mohamad Gharib and Muhammad Atif and Andrea Bondavalli Meta-Learning to Improve Unsupervised Intrusion Detection in Cyber-Physical Systems . . . . . . . . . . . . . . . . 42:1--42:27 Chia-Heng Tu and Qihui Sun and Hsiao-Hsuan Chang \pkgRAP: a Software Framework of Developing Convolutional Neural Networks for Resource-constrained Devices Using Environmental Monitoring as a Case Study 43:1--43:28 Saideep Tiku and Prathmesh Kale and Sudeep Pasricha \pkgQuickLoc: Adaptive Deep-Learning for Fast Indoor Localization with Mobile Devices . . . . . . . . . . . . . . . . 44:1--44:30 Tieu Long Mai and Nicolas Navet Deep Learning to Predict the Feasibility of Priority-Based Ethernet Network Configurations . . . . . . . . . . . . . 45:1--45:26
Chao Chen and Abdelsalam (Sumi) Helal and Zhi Jin and Mingyue Zhang and Choonhwa Lee \pkgIoTranx: Transactions for Safer Smart Spaces . . . . . . . . . . . . . . 1:1--1:26 Anshul Agarwal and Krithi Ramamritham A Novel Approach for Deploying Minimum Sensors in Smart Buildings . . . . . . . 2:1--2:29 Debayan Roy and Licong Zhang and Wanli Chang and Dip Goswami and Birgit Vogel-Heuser and Samarjit Chakraborty Tool Integration for Automated Synthesis of Distributed Embedded Controllers . . 3:1--3:31 Matteo Trobinger and Gabriel de Albuquerque Gleizer and Timofei Istomin and Manuel Mazo and Amy L. Murphy and Gian Pietro Picco The Wireless Control Bus: Enabling Efficient Multi-Hop Event-Triggered Control with Concurrent Transmissions 4:1--4:29 Michael I.-C. Wang and Charles H.-P. Wen and H. Jonathan Chao \pkgRoadrunner+: an Autonomous Intersection Management Cooperating with Connected Autonomous Vehicles and Pedestrians with Spillback Considered 5:1--5:29 Junjie Yan and Kevin Huang and Kyle Lindgren and Tamara Bonaci and Howard J. Chizeck Continuous Operator Authentication for Teleoperated Systems Using Hidden Markov Models . . . . . . . . . . . . . . . . . 6:1--6:25 Rongrong Wang and Duc Van Le and Rui Tan and Yew-Wah Wong Real-Time Cooling Power Attribution for Co-Located Data Center Rooms with Distinct Temperatures and Humidities . . 7:1--7:28 Fang-Chieh Chou and Alben Rome Bagabaldo and Alexandre M. Bayen The Lord of the Ring Road: a Review and Evaluation of Autonomous Control Policies for Traffic in a Ring Road . . 8:1--8:25 Liuwang Kang and Haiying Shen Detection and Mitigation of Sensor and CAN Bus Attacks in Vehicle Anti-Lock Braking Systems . . . . . . . . . . . . 9:1--9:24
Jingtong Hu and Qi Zhu and Susmit Jha Introduction to the Special Issue on Artificial Intelligence and Cyber-Physical Systems --- Part 2 . . . 10:1--10:?? Kazumune Hashimoto and Natsuko Tsumagari and Toshimitsu Ushio Collaborative Rover-copter Path Planning and Exploration with Temporal Logic Specifications Based on Bayesian Update Under Uncertain Environments . . . . . . 11:1--11:?? Elham Khodabandehloo and Abbas Alimohammadi and Daniele Riboni FreeSia: a Cyber-physical System for Cognitive Assessment through Frequency-domain Indoor Locomotion Analysis . . . . . . . . . . . . . . . . 12:1--12:?? Xiaodong Yang and Omar Ali Beg and Matthew Kenigsberg and Taylor T. Johnson A Framework for Identification and Validation of Affine Hybrid Automata from Input-Output Traces . . . . . . . . 13:1--13:?? Bouziane Brik and Mourad Messaadia and M'hammed Sahnoun and Belgacem Bettayeb and Mohamed Amin Benatia Fog-supported Low-latency Monitoring of System Disruptions in Industry 4.0: a Federated Learning Approach . . . . . . 14:1--14:?? Shreyas Ramakrishna and Zahra Rahiminasab and Gabor Karsai and Arvind Easwaran and Abhishek Dubey Efficient Out-of-Distribution Detection Using Latent Space of $ \beta $-VAE for Cyber-Physical Systems . . . . . . . . . 15:1--15:?? Jackson Codispoti and Atieh R. Khamesi and Nelson Penn and Simone Silvestri and Eura Shin Learning from Non-experts: an Interactive and Adaptive Learning Approach for Appliance Recognition in Smart Homes . . . . . . . . . . . . . . 16:1--16:?? Maxim Shcherbakov and Cuong Sai A Hybrid Deep Learning Framework for Intelligent Predictive Maintenance of Cyber-physical Systems . . . . . . . . . 17:1--17:?? Samar Abbas and Ahmed Ehsan and Saad Ahmed and Sheraz Ali Khan and Tariq M. Jadoon and Muhammad Hamad Alizai ASHRAY: Enhancing Water-usage Comfort in Developing Regions using Data-driven IoT Retrofits . . . . . . . . . . . . . . . 18:1--18:?? Oliver Biggar and Mohammad Zamani and Iman Shames On Modularity in Reactive Control Architectures, with an Application to Formal Verification . . . . . . . . . . 19:1--19:??
Fabian Mager and Dominik Baumann and Carsten Herrmann and Sebastian Trimpe and Marco Zimmerling Scaling beyond Bandwidth Limitations: Wireless Control with Stability Guarantees under Overload . . . . . . . 20:1--20:?? Mohammad Khayatian and Mohammadreza Mehrabian and Edward Andert and Reese Grimsley and Kyle Liang and Yi Hu and Ian McCormack and Carlee Joe-Wong and Jonathan Aldrich and Bob Iannucci and Aviral Shrivastava Plan B: Design Methodology for Cyber-Physical Systems Robust to Timing Failures . . . . . . . . . . . . . . . . 21:1--21:?? Monowar Hasan and Sibin Mohan and Rakesh B. Bobba and Rodolfo Pellizzoni Beyond Just Safety: Delay-aware Security Monitoring for Real-time Control Systems 22:1--22:?? Mohsen Ghafouri and Ekram Kabir and Bassam Moussa and Chadi Assi Coordinated Charging and Discharging of Electric Vehicles: a New Class of Switching Attacks . . . . . . . . . . . 23:1--23:?? Dharshan Krishna Murthy and Alejandro Masrur A Cyber-physical Approach for Emergency Braking in Close-Distance Driving Arrangements . . . . . . . . . . . . . . 24:1--24:?? Georgios Bakirtzis and Fabrizio Genovese and Cody H. Fleming Yoneda Hacking: The Algebra of Attacker Actions . . . . . . . . . . . . . . . . 25:1--25:?? José Manuel Gaspar Sánchez and Nils Jörgensen and Martin Törngren and Rafia Inam and Andrii Berezovskyi and Lei Feng and Elena Fersman and Muhammad Rusyadi Ramli and Kaige Tan Edge Computing for Cyber-physical Systems: a Systematic Mapping Study Emphasizing Trustworthiness . . . . . . 26:1--26:?? Ping Yu and Wei Ni and Ren Ping Liu and Zhaoxin Zhang and Hua Zhang and Qiaoyan Wen Efficient Encrypted Range Query on Cloud Platforms . . . . . . . . . . . . . . . 27:1--27:?? Abubakar Sadiq Mohammed and Philipp Reinecke and Pete Burnap and Omer Rana and Eirini Anthi Cybersecurity Challenges in the Offshore Oil and Gas Industry: an Industrial Cyber-Physical Systems (ICPS) Perspective . . . . . . . . . . . . . . 28:1--28:??
Mohammad Al Faruque and Meeko Mitsuko Oishi Introduction to the Special Section on Selected Papers from ICCPS 2021 . . . . 29:1--29:?? Yukun Yuan and Meiyi Ma and Songyang Han and Desheng Zhang and Fei Miao and John A. Stankovic and Shan Lin DeResolver: a Decentralized Conflict Resolution Framework with Autonomous Negotiation for Smart City Services . . 29:1--29:?? Masaki Waga and Étienne André and Ichiro Hasuo Model-bounded Monitoring of Hybrid Systems . . . . . . . . . . . . . . . . 30:1--30:?? Shili Sheng and Erfan Pakdamanian and Kyungtae Han and Ziran Wang and John Lenneman and David Parker and Lu Feng Planning for Automated Vehicles with Human Trust . . . . . . . . . . . . . . 31:1--31:?? Geoffrey Pettet and Ayan Mukhopadhyay and Mykel J. Kochenderfer and Abhishek Dubey Hierarchical Planning for Dynamic Resource Allocation in Smart and Connected Communities . . . . . . . . . 32:1--32:?? Michael Maximilian Wrana and Marwa Elsayed and Karim Lounis and Ziad Mansour and Steven Ding and Mohammad Zulkernine OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation . . . . . . . . . . . . . . . 33:1--33:?? Diksha Moolchandani and Kishore Yadav and Geesara Kulathunga and Ilya Afanasyev and Anshul Kumar and Manuel Mazzara and Smruti Sarangi Game Theory-Based Parameter Tuning for Energy-Efficient Path Planning on Modern UAVs . . . . . . . . . . . . . . . . . . 34:1--34:?? Ranjan Pal and Peihan Liu and Taoan Lu and Ed Hua How Hard Is Cyber-risk Management in IT/OT Systems? A Theory to Classify and Conquer Hardness of Insuring ICSs . . . 35:1--35:??
Samarjit Chakraborty and Somesh Jha and Soheil Samii and Philipp Mundhenk Introduction to the Special Issue on Automotive CPS Safety & Security: Part 1 1:1--1:?? Yanbing Mao and Yuliang Gu and Naira Hovakimyan and Lui Sha and Petros Voulgaris SL$1$-Simplex: Safe Velocity Regulation of Self-Driving Vehicles in Dynamic and Unforeseen Environments . . . . . . . . 2:1--2:?? Mazen Mohamad and Rodi Jolak and Örjan Askerdal and Jan-Philipp Steghöfer and Riccardo Scandariato CASCADE: an Asset-driven Approach to Build Security Assurance Cases for Automotive Systems . . . . . . . . . . . 3:1--3:?? Jarul Mehta and Guillaume Richard and Loren Lugosch and Derek Yu and Brett H. Meyer DT-DS: CAN Intrusion Detection with Decision Tree Ensembles . . . . . . . . 4:1--4:?? Yuri Gil Dantas and Vivek Nigam Automating Safety and Security Co-design through Semantically Rich Architecture Patterns . . . . . . . . . . . . . . . . 5:1--5:?? Jiyang Chen and Tomasz Kloda and Rohan Tabish and Ayoosh Bansal and Chien-Ying Chen and Bo Liu and Sibin Mohan and Marco Caccamo and Lui Sha SchedGuard++: Protecting against Schedule Leaks Using Linux Containers on Multi-Core Processors . . . . . . . . . 6:1--6:?? Ipsita Koley and Soumyajit Dey and Debdeep Mukhopadhyay and Sachin Singh and Lavanya Lokesh and Shantaram Vishwanath Ghotgalkar CAD Support for Security and Robustness Analysis of Safety-critical Automotive Software . . . . . . . . . . . . . . . . 7:1--7:?? Daniel Angermeier and Hannah Wester and Kristian Beilke and Gerhard Hansch and Jörn Eichler Security Risk Assessments: Modeling and Risk Level Propagation . . . . . . . . . 8:1--8:??
Handi Yu and Xin Li Data-Driven Parameterized Corner Synthesis for Efficient Validation of Perception Systems for Autonomous Driving . . . . . . . . . . . . . . . . 9:1--9:?? Daniel Markert and Alejandro Masrur A Two-Speed Synchronous Traffic Protocol for Intelligent Intersections: From Single-Vehicle to Platoon Crossing . . . 10:1--10:?? Nitasha Sahani and Ruoxi Zhu and Jin-Hee Cho and Chen-Ching Liu Machine Learning-based Intrusion Detection for Smart Grid Computing: a Survey . . . . . . . . . . . . . . . . . 11:1--11:?? Anas Alsoliman and Giulio Rigoni and Davide Callegaro and Marco Levorato and Cristina M. Pinotti and Mauro Conti Intrusion Detection Framework for Invasive FPV Drones Using Video Streaming Characteristics . . . . . . . 12:1--12:?? Eugene Vinitsky and Nathan Lichtlé and Kanaad Parvate and Alexandre Bayen Optimizing Mixed Autonomy Traffic Flow with Decentralized Autonomous Vehicles and Multi-Agent Reinforcement Learning 13:1--13:?? Abdulrahman Fahim and Evangelos Papalexakis and Srikanth V. Krishnamurthy and Amit K. Roy Chowdhury and Lance Kaplan and Tarek Abdelzaher AcTrak: Controlling a Steerable Surveillance Camera using Reinforcement Learning . . . . . . . . . . . . . . . . 14:1--14:?? Mohammed Asiri and Neetesh Saxena and Rigel Gjomemo and Pete Burnap Understanding Indicators of Compromise against Cyber-attacks in Industrial Control Systems: a Security Perspective 15:1--15:??
Adnan Mahmood and Quan Z. Sheng and Wei Emma Zhang and Yan Wang and Subhash Sagar Toward a Distributed Trust Management System for Misbehavior Detection in the Internet of Vehicles . . . . . . . . . . 16:1--16:?? Théo Serru and Nga Nguyen and Michel Batteux and Antoine Rauzy Minimal Critical Sequences in Model-based Safety and Security Analyses: Commonalities and Differences 17:1--17:?? Sandeep Banik and Thiagarajan Ramachandran and Arnab Bhattacharya and Shaunak D. Bopardikar Automated Adversary-in-the-Loop Cyber-Physical Defense Planning . . . . 18:1--18:?? Abdullah Al Maruf and Luyao Niu and Andrew Clark and J. Sukarno Mertoguno and Radha Poovendran A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint . . . . . . . . . . . 19:1--19:?? Naomi Stricker and Yingzhao Lian and Yuning Jiang and Colin N. Jones and Lothar Thiele Self-triggered Control with Energy Harvesting Sensor Nodes . . . . . . . . 20:1--20:?? Yi-Ting Hsieh and Tzu-Tao Chang and Chen-Jun Tsai and Shih-Lun Wu and Ching-Yuan Bai and Kai-Chieh Chang and Chung-Wei Lin and Eunsuk Kang and Chao Huang and Qi Zhu System Verification and Runtime Monitoring with Multiple Weakly-Hard Constraints . . . . . . . . . . . . . . 21:1--21:??
Hassan Mousavi and Ali Ebnenasir and Elham Mahmoudzadeh Formal Specification, Verification and Repair of Contiki's Scheduler . . . . . 22:1--22:?? Xueli Fan and Qixin Wang and Jie Liu A Reliable Wireless Protocol for Highway and Metered-Ramp CAV Collaborative Merging with Constant-Time-Headway Safety Guarantee . . . . . . . . . . . . 23:1--23:?? Ertem Esiner and Utku Tefek and Daisuke Mashima and Binbin Chen and Zbigniew Kalbarczyk and David M. Nicol Message Authentication and Provenance Verification for Industrial Control Systems . . . . . . . . . . . . . . . . 24:1--24:?? Tommaso Zoppi and Innocenzo Mungiello and Andrea Ceccarelli and Alberto Cirillo and Lorenzo Sarti and Lorenzo Esposito and Giuseppe Scaglione and Sergio Repetto and Andrea Bondavalli Safe Maintenance of Railways using COTS Mobile Devices: The Remote Worker Dashboard . . . . . . . . . . . . . . . 25:1--25:?? Khaled Sarieddine and Mohammad Ali Sayed and Sadegh Torabi and Ribal Atallah and Chadi Assi Investigating the Security of EV Charging Mobile Applications as an Attack Surface . . . . . . . . . . . . . 26:1--26:?? Francis Tiausas and Keiichi Yasumoto and Jose Paolo Talusan and Hayato Yamana and Hirozumi Yamaguchi and Shameek Bhattacharjee and Abhishek Dubey and Sajal K. Das HPRoP: Hierarchical Privacy-preserving Route Planning for Smart Cities . . . . 27:1--27:?? Anqi Fu and Sijia Chen and Junfei Qiao and Chengpu Yu Periodic Event-Triggered CACC and Communication Co-design for Vehicle Platooning . . . . . . . . . . . . . . . 28:1--28:?? Mohammad H. Mamduhi and Ehsan Hashemi Event-Triggered Control with Intermittent Communications over Erasure Channels for Leader-Follower Problems with the Combined-Slip Effect . . . . . 29:1--29:??
Qiushi Liang and Shengjie Zhao and Jiangfan Zhang and Hao Deng Unsupervised BLSTM-Based Electricity Theft Detection with Training Data Contaminated . . . . . . . . . . . . . . 1:1--1:?? Werner Damm and David Hess and Mark Schweda and Janos Sztipanovits and Klaus Bengler and Bianca Biebl and Martin Fränzle and Willem Hagemann and Moritz Held and Klas Ihme and Severin Kacianka and Alyssa J. Kerscher and Sebastian Lehnhoff and Andreas Luedtke and Alexander Pretschner and Astrid Rakow and Jochem Rieger and Daniel Sonntag and Maike Schwammberger and Benedikt Austel and Anirudh Unni and Eric Veith A Reference Architecture of Human Cyber-Physical Systems --- Part I: Fundamental Concepts . . . . . . . . . . 2:1--2:?? Klaus Bengler and Werner Damm and Andreas Luedtke and Reiger Jochem and Benedikt Austel and Bianca Biebl and Martin Fränzle and Willem Hagemann and Moritz Held and David Hess and Klas Ihme and Severin Kacianka and Alyssa J. Kerscher and Laine Forrest and Sebastian Lehnhoff and Alexander Pretschner and Astrid Rakow and Daniel Sonntag and Janos Sztipanovits and Maike Schwammberger and Mark Schweda and Anirudh Unni and Eric Veith A References Architecture for Human Cyber Physical Systems, Part II: Fundamental Design Principles for Human-CPS Interaction . . . . . . . . . 3:1--3:?? Werner Damm and Martin Fränzle and Alyssa J. Kerscher and Forrest Laine and Klaus Bengler and Bianca Biebl and Willem Hagemann and Moritz Held and David Hess and Klas Ihme and Severin Kacianka and Sebastian Lehnhoff and Andreas Luedtke and Alexander Pretschner and Astrid Rakow and Jochem Rieger and Daniel Sonntag and Janos Sztipanovits and Maike Schwammberger and Mark Schweda and Alexander Trende and Anirudh Unni and Eric Veith A Reference Architecture of Human Cyber-Physical Systems --- Part III: Semantic Foundations . . . . . . . . . . 4:1--4:?? Levente Csikor and Hoon Wei Lim and Jun Wen Wong and Soundarya Ramesh and Rohini Poolat Parameswarath and Mun Choon Chan RollBack: a New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems . . . . . . . . . 5:1--5:?? Vijay Varadharajan and Uday Tupakula and Kallol Krishna Karmakar Techniques for Enhancing Security in Industrial Control Systems . . . . . . . 6:1--6:?? Ion Matei and Wiktor Piotrowski and Alexandre Perez and Johan de Kleer and Jorge Tierno and Wendy Mungovan and Vance Turnewitsch System Resilience through Health Monitoring and Reconfiguration . . . . . 7:1--7:?? Kejing Zhao and Zhiyong Zhang and Kim-Kwang Raymond Choo and Zhongya Zhang and Tiantian Zhang A Combinatorial Optimization Analysis Method for Detecting Malicious Industrial Internet Attack Behaviors . . 8:1--8:?? Stephen S. Kirkman and Steven Fulton and Jeffrey Hemmes and Christopher Garcia and Justin C. Wilson A Blockchain Architecture to Increase the Resilience of Industrial Control Systems from the Effects of a Ransomware Attack: a Proposal and Initial Results 9:1--9:??
Samarjit Chakraborty and Somesh Jha and Soheil Samii and Philipp Mundhenk Introduction to the Special Issue on Automotive CPS Safety & Security: Part 2 10:1--10:?? Alessandro Brighente and Mauro Conti and Denis Donadel and Federico Turrin EVScout2.0: Electric Vehicle Profiling through Charging Profile . . . . . . . . 11:1--11:?? Vahid Panahi and Mehdi Kargahi and Fathiyeh Faghih Control Performance Analysis of Automotive Cyber-physical Systems: a Study on Efficient Formal Verification 12:1--12:?? Shailja Thakur and Carlos Moreno and Sebastian Fischmeister CANOA: CAN Origin Authentication through Power Side-channel Monitoring . . . . . 13:1--13:?? Yanmao Man and Ming Li and Ryan Gerdes Remote Perception Attacks against Camera-based Object Recognition Systems and Countermeasures . . . . . . . . . . 14:1--14:?? Francesco Pollicino and Dario Stabili and Mirco Marchetti Performance Comparison of Timing-Based Anomaly Detectors for Controller Area Network: a Reproducible Study . . . . . 15:1--15:?? Jiangwei Wang and Lili Su and Songyang Han and Dongjin Song and Fei Miao Towards Safe Autonomy in Hybrid Traffic: Detecting Unpredictable Abnormal Behaviors of Human Drivers via Information Sharing . . . . . . . . . . 16:1--16:?? Kuei-Fang Hsueh and Ayleen Farnood and Isam Al-Darabsah and Mohammad Al Saaideh and Mohammad Al Janaideh and Deepa Kundur A Deep Time Delay Filter for Cooperative Adaptive Cruise Control . . . . . . . . 17:1--17:?? Sayan Mitra and Nalini Venkatasubramanian Introduction to Special Issue for ICCPS 2022 . . . . . . . . . . . . . . . . . . 18:1--18:?? Ruihang Wang and Zhiwei Cao and Xin Zhou and Yonggang Wen and Rui Tan Green Data Center Cooling Control via Physics-guided Safe Reinforcement Learning . . . . . . . . . . . . . . . . 19:1--19:?? Md. Jaminur Islam and Jose Paolo Talusan and Shameek Bhattacharjee and Francis Tiausas and Abhishek Dubey and Keiichi Yasumoto and Sajal K. Das Scalable Pythagorean Mean-based Incident Detection in Smart Transportation Systems . . . . . . . . . . . . . . . . 20:1--20:?? Yahan Yang and Ramneet Kaur and Souradeep Dutta and Insup Lee Memory-based Distribution Shift Detection for Learning Enabled Cyber-Physical Systems with Statistical Guarantees . . . . . . . . . . . . . . . 21:1--21:?? Xin Qin and Yuan Xia and Aditya Zutshi and Chuchu Fan and Jyotirmoy V. Deshmukh Statistical Verification using Surrogate Models and Conformal Inference and a Comparison with Risk-Aware Verification 22:1--22:?? Trier Mortlock and Arnav Malawade and Kohei Tsujio and Mohammad Al Faruque CASTNet: a Context-Aware, Spatio-Temporal Dynamic Motion Prediction Ensemble for Autonomous Driving . . . . . . . . . . . . . . . . 23:1--23:?? Suman Das and Michael Yuhas and Rachel Koh and Arvind Easwaran Interpretable Latent Space for Meteorological Out-of-Distribution Detection via Weak Supervision . . . . . 24:1--24:??