


default search action
15th ICCPS 2024: Hong Kong
- 15th ACM/IEEE International Conference on Cyber-Physical Systems, ICCPS 2024, Hong Kong, May 13-16, 2024. IEEE 2024, ISBN 979-8-3503-6927-4

- Pengyuan Lu, Matthew Cleaveland, Oleg Sokolsky

, Insup Lee, Ivan Ruchkin
:
Repairing Learning-Enabled Controllers While Preserving What Works. 1-11 - Stanley Bak, Sergiy Bogomolov, Abdelrahman Hekal, Veena Krish

, Andrew Mata, Amir Rahmati:
Zero-One Attack: Degrading Closed-Loop Neural Network Control Systems using State-Time Perturbations. 12-22 - Giulio Rossolini, Alessandro Biondi, Giorgio C. Buttazzo:

Attention-Based Real-Time Defenses for Physical Adversarial Attacks in Vision Applications. 23-32 - Ipsita Koley

, Sunandan Adhikary, Soumyajit Dey:
Thinking Beyond Bus-off: Targeted Control Falsification in CAN. 33-44 - Kohei Tsujio, Mohammad Abdullah Al Faruque, Yasser Shoukry

:
Rampo: A CEGAR-based Integration of Binary Code Analysis and System Falsification for Cyber-Kinetic Vulnerability Detection. 45-54 - Vineet Jagadeesan Nair, Priyank Srivastava, Anuradha Annaswamy:

Enhancing power grid resilience to cyber-physical attacks using distributed retail electricity markets. 55-66 - Kristina Miller, Christopher K. Zeitler, William Shen, Kerianne Hobbs, John Schierman, Mahesh Viswanathan, Sayan Mitra:

Optimal Runtime Assurance via Reinforcement Learning. 67-76 - Shixiong Jiang, Mengyu Liu

, Fanxin Kong:
Vulnerability Analysis for Safe Reinforcement Learning in Cyber-Physical Systems. 77-86 - Tianyu Zhao, Mojtaba Taherisadr, Salma Elmalaki:

FAIRO: Fairness-aware Sequential Decision Making for Human-in-the-Loop CPS. 87-98 - Clara Hobbs, Shengjie Xu, Bineet Ghosh, Enrico Fraccaroli, Parasara Sridhar Duggirala, Samarjit Chakraborty:

Quantitative Safety-Driven Co-Synthesis of Cyber-Physical System Implementations. 99-110 - Xiaohan Fu, Yihao Liu, Jason Koh, Dezhi Hong, Rajesh Gupta, Gabe Fierro:

Playground: A Safe Building Operating System. 111-122 - Shuling Wang, Zekun Ji, Xiong Xu, Bohua Zhan, Qiang Gao, Naijun Zhan:

Formally Verified C Code Generation from Hybrid Communicating Sequential Processes. 123-134 - Cailani Lemieux Mack, Kevin Leach, Kevin Angstadt:

Sensor Data Transplantation for Redundant Hardware Switchover in Micro Autonomous Vehicles. 135-146 - Matthew Walter Nice, George Gunter, Junyi Ji

, Yuhang Zhang, Matthew R. Bunting, William Barbour, Jonathan Sprinkle, Daniel B. Work:
A Middle Way to Traffic Enlightenment. 147-156 - Jose Paolo Talusan, Chaeeun Han, Ayan Mukhopadhyay, Aron Laszka, Daniel Freudberg, Abhishek Dubey:

An Online Approach to Solving Public Transit Stationing and Dispatch Problem. 157-168 - Yiqi Zhao, Bardh Hoxha, Georgios Fainekos, Jyotirmoy V. Deshmukh, Lars Lindemann:

Robust Conformal Prediction for STL Runtime Verification under Distribution Shift. 169-179 - Rohit Singh, Indranil Saha:

An Online Planning Framework for Multi-Robot Systems with LTL Specification. 180-191 - Aakriti Jain

, Prashant P. Modekurthy, Abusayeed Saifullah:
Control over Low-Power Wide-Area Networks. 192-201 - Tianyu Zhao, Salma Elmalaki:

FinA: Fairness of Adverse Effects in Decision-Making of Human-Cyber-Physical-System. 202-211 - Sydney Pugh

, Ivan Ruchkin
, James Weimer, Insup Lee:
Curating Naturally Adversarial Datasets for Learning-Enabled Medical Cyber-Physical Systems. 212-223 - Hao-Lun Hsu, Qitong Gao, Miroslav Pajic:

ϵ-Neural Thompson Sampling of Deep Brain Stimulation for Parkinson Disease Treatment. 224-234 - Soham Sinha, Shekhar Dwivedi, Mahdi Azizian:

Towards Deterministic End-to-end Latency for Medical AI Systems in NVIDIA Holoscan. 235-246 - Mingbo Zhang, Saman A. Zonouz:

Control Corruption without Firmware Infection: Stealthy Supply Chain Attacks via PLC Hardware Implants (MalTag). 247-258 - Ayanfeoluwa Oluyomi

, Sahar Abedzadeh, Shameek Bhattacharjee, Sajal K. Das:
Unsafe Events Detection in Smart Water Meter Infrastructure via Noise-Resilient Learning. 259-270 - Xiaohan Fu, Yihao Liu, Jason Koh, Dezhi Hong, Rajesh Gupta, Gabe Fierro:

Demo Abstract: Playground, A Safe Building Operating System. 271-272 - Guangyao Chen, Zhihao Jiang

:
Iterative Model Checking for Safety-Critical Problems in Cyber-Physical Systems. 273-274 - Yilun Chen, Zhuo Jian, Yixi Wang, Zhihao Jiang

:
Poster Abstract of Digital-twin-based Decision Support During Personalized Robotic Rehabilitation. 275-276 - Maria A. Cardei

, Afsaneh Doryab:
Multi-Agent System for Optimizing Victim Tagging in Human/Autonomous Responder Teams. 277-278 - Do Van Minh, Meiqing Wu, Siew-Kei Lam, Thambipillai Srikanthan:

Achieving Real-time Visual Tracking with Low-Cost Edge AI. 279-280 - JiHyun Kwon, BaekGyu Kim, Yi-Ying Chen, Chung-Wei Lin:

Poster Abstract: Landing-Type Aware Multi-Drone Route Generation for Last-Mile Delivery Service. 281-282 - Tushar Dilip Kurne, Manas Sashank Juvvi, Vaishnavi J, Pushpak Jagtap:

Poster Abstract: Signal Temporal Logic Compliant Motion Planning using Reinforcement Learning. 283-284 - Anjana Balabhaskara, Sunandan Adhikary, Ipsita Koley

, Soumyajit Dey, Ashish R. Hota:
Adaptive Protection of Power Grids against Stealthy Load Alterations. 285-286 - Weizhe Xu, Mengyu Liu

, Steven Drager, Matthew Anderson, Fanxin Kong:
Poster Abstract: Assuring LLM-Enabled Cyber-Physical Systems. 287-288 - Shengjie Xu, Clara Hobbs, Yukai Song

, Bineet Ghosh, Sharmin Aktar, Lei Yang, Yi Sheng, Weiwen Jiang, Jingtong Hu, Parasara Sridhar Duggirala, Samarjit Chakraborty:
Poster Abstract: Neural Architecture Sizing for Autonomous Systems. 289-290

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














