


default search action
ACM Transactions on Cyber-Physical Systems, Volume 6
Volume 6, Number 1, January 2022
- Chao Chen, Abdelsalam (Sumi) Helal, Zhi Jin, Mingyue Zhang, Choonhwa Lee:
IoTranx: Transactions for Safer Smart Spaces. 1:1-1:26 - Anshul Agarwal
, Krithi Ramamritham:
A Novel Approach for Deploying Minimum Sensors in Smart Buildings. 2:1-2:29 - Debayan Roy, Licong Zhang, Wanli Chang, Dip Goswami, Birgit Vogel-Heuser, Samarjit Chakraborty
:
Tool Integration for Automated Synthesis of Distributed Embedded Controllers. 3:1-3:31 - Matteo Trobinger, Gabriel de Albuquerque Gleizer, Timofei Istomin, Manuel Mazo, Amy L. Murphy, Gian Pietro Picco:
The Wireless Control Bus: Enabling Efficient Multi-Hop Event-Triggered Control with Concurrent Transmissions. 4:1-4:29 - Michael I.-C. Wang
, Charles H.-P. Wen
, H. Jonathan Chao:
Roadrunner+: An Autonomous Intersection Management Cooperating with Connected Autonomous Vehicles and Pedestrians with Spillback Considered. 5:1-5:29 - Junjie Yan
, Kevin Huang, Kyle Lindgren, Tamara Bonaci, Howard Jay Chizeck:
Continuous Operator Authentication for Teleoperated Systems Using Hidden Markov Models. 6:1-6:25 - Rongrong Wang
, Duc Van Le
, Rui Tan
, Yew-Wah Wong
:
Real-Time Cooling Power Attribution for Co-Located Data Center Rooms with Distinct Temperatures and Humidities. 7:1-7:28 - Fang-Chieh Chou, Alben Rome Bagabaldo
, Alexandre M. Bayen:
The Lord of the Ring Road: A Review and Evaluation of Autonomous Control Policies for Traffic in a Ring Road. 8:1-8:25 - Liuwang Kang
, Haiying Shen:
Detection and Mitigation of Sensor and CAN Bus Attacks in Vehicle Anti-Lock Braking Systems. 9:1-9:24
Volume 6, Number 2, April 2022
- Jingtong Hu, Qi Zhu, Susmit Jha:
Introduction to the Special Issue on Artificial Intelligence and Cyber-Physical Systems - Part 2. 10:1-10:3 - Kazumune Hashimoto
, Natsuko Tsumagari, Toshimitsu Ushio:
Collaborative Rover-copter Path Planning and Exploration with Temporal Logic Specifications Based on Bayesian Update Under Uncertain Environments. 11:1-11:24 - Elham Khodabandehloo, Abbas Alimohammadi
, Daniele Riboni
:
FreeSia: A Cyber-physical System for Cognitive Assessment through Frequency-domain Indoor Locomotion Analysis. 12:1-12:31 - Xiaodong Yang
, Omar Ali Beg
, Matthew Kenigsberg
, Taylor T. Johnson
:
A Framework for Identification and Validation of Affine Hybrid Automata from Input-Output Traces. 13:1-13:24 - Bouziane Brik
, Mourad Messaadia, M'hammed Sahnoun
, Belgacem Bettayeb, Mohamed Amin Benatia:
Fog-supported Low-latency Monitoring of System Disruptions in Industry 4.0: A Federated Learning Approach. 14:1-14:23 - Shreyas Ramakrishna
, Zahra RahimiNasab
, Gabor Karsai
, Arvind Easwaran
, Abhishek Dubey
:
Efficient Out-of-Distribution Detection Using Latent Space of β-VAE for Cyber-Physical Systems. 15:1-15:34 - Jackson Codispoti
, Atieh Rajabi Khamesi
, Nelson Penn, Simone Silvestri, Eura Shin:
Learning from Non-experts: An Interactive and Adaptive Learning Approach for Appliance Recognition in Smart Homes. 16:1-16:22 - Maxim Shcherbakov, Sai Van Cuong:
A Hybrid Deep Learning Framework for Intelligent Predictive Maintenance of Cyber-physical Systems. 17:1-17:22 - Samar Abbas, Ahmed Ehsan, Saad Ahmed
, Sheraz Ali Khan, Tariq M. Jadoon, Muhammad Hamad Alizai
:
ASHRAY: Enhancing Water-usage Comfort in Developing Regions using Data-driven IoT Retrofits. 18:1-18:28 - Oliver Biggar
, Mohammad Zamani
, Iman Shames
:
On Modularity in Reactive Control Architectures, with an Application to Formal Verification. 19:1-19:36
Volume 6, Number 3, July 2022
- Fabian Mager
, Dominik Baumann
, Carsten Herrmann
, Sebastian Trimpe
, Marco Zimmerling
:
Scaling beyond Bandwidth Limitations: Wireless Control with Stability Guarantees under Overload. 20:1-20:30 - Mohammad Khayatian
, Mohammadreza Mehrabian
, Edward Andert, Reese Grimsley, Kyle Liang, Yi Hu
, Ian McCormack, Carlee Joe-Wong, Jonathan Aldrich
, Bob Iannucci, Aviral Shrivastava:
Plan B: Design Methodology for Cyber-Physical Systems Robust to Timing Failures. 21:1-21:39 - Monowar Hasan
, Sibin Mohan
, Rakesh B. Bobba
, Rodolfo Pellizzoni:
Beyond Just Safety: Delay-aware Security Monitoring for Real-time Control Systems. 22:1-22:25 - Mohsen Ghafouri
, Mohammad Ekramul Kabir
, Bassam Moussa
, Chadi Assi
:
Coordinated Charging and Discharging of Electric Vehicles: A New Class of Switching Attacks. 23:1-23:26 - Dharshan Krishna Murthy
, Alejandro Masrur:
A Cyber-physical Approach for Emergency Braking in Close-Distance Driving Arrangements. 24:1-24:26 - Georgios Bakirtzis
, Fabrizio Genovese
, Cody H. Fleming
:
Yoneda Hacking: The Algebra of Attacker Actions. 25:1-25:27 - José Manuel Gaspar Sánchez
, Nils Jörgensen
, Martin Törngren
, Rafia Inam
, Andrii Berezovskyi
, Lei Feng
, Elena Fersman
, Muhammad Rusyadi Ramli
, Kaige Tan
:
Edge Computing for Cyber-physical Systems: A Systematic Mapping Study Emphasizing Trustworthiness. 26:1-26:28 - Ping Yu
, Wei Ni
, Ren Ping Liu
, Zhaoxin Zhang
, Hua Zhang
, Qiaoyan Wen
:
Efficient Encrypted Range Query on Cloud Platforms. 27:1-27:23 - Abubakar Sadiq Mohammed
, Philipp Reinecke
, Pete Burnap
, Omer F. Rana
, Eirini Anthi
:
Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective. 28:1-28:27
Volume 6, Number 4, October 2022
- Mohammad Abdullah Al Faruque
, Meeko Mitsuko Oishi
:
Introduction to the Special Section on Selected Papers from ICCPS 2021. 29e:1-29e:3 - Yukun Yuan
, Meiyi Ma
, Songyang Han
, Desheng Zhang
, Fei Miao
, John A. Stankovic
, Shan Lin
:
DeResolver: A Decentralized Conflict Resolution Framework with Autonomous Negotiation for Smart City Services. 29:1-29:27 - Masaki Waga
, Étienne André
, Ichiro Hasuo:
Model-bounded Monitoring of Hybrid Systems. 30:1-30:26 - Shili Sheng
, Erfan Pakdamanian
, Kyungtae Han
, Ziran Wang
, John Lenneman
, David Parker
, Lu Feng
:
Planning for Automated Vehicles with Human Trust. 31:1-31:21 - Geoffrey Pettet
, Ayan Mukhopadhyay, Mykel J. Kochenderfer
, Abhishek Dubey:
Hierarchical Planning for Dynamic Resource Allocation in Smart and Connected Communities. 32:1-32:26 - Michael Wrana
, Marwa Elsayed
, Karim Lounis
, Ziad Mansour
, Steven H. H. Ding, Mohammad Zulkernine
:
OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation. 33:1-33:27 - Diksha Moolchandani
, Kishore Yadav
, Geesara Kulathunga
, Ilya Afanasyev
, Anshul Kumar
, Manuel Mazzara
, Smruti Sarangi
:
Game Theory-Based Parameter Tuning for Energy-Efficient Path Planning on Modern UAVs. 34:1-34:29 - Ranjan Pal
, Peihan Liu
, Taoan Lu
, Ed Hua
:
How Hard Is Cyber-risk Management in IT/OT Systems? A Theory to Classify and Conquer Hardness of Insuring ICSs. 35:1-35:31

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.