


default search action
ACM Transactions on Cyber-Physical Systems, Volume 4
Volume 4, Number 1, January 2020
- Samarjit Chakraborty

, Tian He:
Introduction to the Special Issue on Transportation Cyber-Physical Systems. 1:1-1:3 - Mostafa Gilanifar

, Hui Wang, Eren Erman Ozguven, Yuxun Zhou, Reza Arghandeh
:
Bayesian Spatiotemporal Gaussian Process for Short-term Load Forecasting Using Combined Transportation and Electricity Data. 2:1-2:25 - Bowen Zheng, Chung-Wei Lin, Shinichi Shiraishi, Qi Zhu:

Design and Analysis of Delay-Tolerant Intelligent Intersection Management. 3:1-3:27 - Subhojeet Mukherjee, Jeffrey C. Van Etten, Namburi Rani Samyukta, Jacob Walker, Indrakshi Ray, Indrajit Ray:

TruckSTM: Runtime Realization of Operational State Transitions for Medium and Heavy Duty Vehicles. 4:1-4:25 - Sebastian van de Hoef

, Jonas Mårtensson
, Dimos V. Dimarogonas, Karl Henrik Johansson
:
A Predictive Framework for Dynamic Heavy-Duty Vehicle Platoon Coordination. 5:1-5:25 - Yue Guan, Anuradha M. Annaswamy, H. Eric Tseng:

A Dynamic Routing Framework for Shared Mobility Services. 6:1-6:28 - Hoon Wei Lim, William G. Temple, Bao Anh N. Tran, Binbin Chen

, Zbigniew Kalbarczyk, Jianying Zhou
:
Data Integrity Threats and Countermeasures in Railway Spot Transmission Systems. 7:1-7:26 - BaekGyu Kim

, Takato Masuda, Shinichi Shiraishi:
Test Specification and Generation for Connected and Autonomous Vehicle in Virtual Environments. 8:1-8:26 - Rajesh P. Barnwal

, Nirnay Ghosh, Soumya K. Ghosh, Sajal K. Das:
Publish or Drop Traffic Event Alerts? Quality-aware Decision Making in Participatory Sensing-based Vehicular CPS. 9:1-9:28 - Mikael Asplund

:
Combining Detection and Verification for Secure Vehicular Cooperation Groups. 10:1-10:31 - Carmen Cheh

, Binbin Chen
, William G. Temple, William H. Sanders:
Modeling Adversarial Physical Movement in a Railway Station: Classification and Metrics. 11:1-11:25 - Woo-Hyun Ko, Bharadwaj Satchidanandan

, P. R. Kumar:
Dynamic Watermarking-based Defense of Transportation Cyber-physical Systems. 12:1-12:21 - Chongguang Bi, Jun Huang

, Guoliang Xing, Landu Jiang, Xue Liu, Minghua Chen
:
SafeWatch: A Wearable Hand Motion Tracking System for Improving Driving Safety. 13:1-13:21
Volume 4, Number 2, February 2020
- Meiyi Ma, Sarah Masud Preum, Mohsin Y. Ahmed, William Tärneberg

, Abdeltawab M. Hendawi, John A. Stankovic:
Data Sets, Modeling, and Decision Making in Smart Cities: A Survey. 14:1-14:28 - Sirajum Munir, Hao-Tsung Yang

, Shan Lin, S. M. Shahriar Nirjon, Lin Chen, Enamul Hoque
, John A. Stankovic, Kamin Whitehouse:
Reliable Communication and Latency Bound Generation in Wireless Cyber-Physical Systems. 15:1-15:26 - Leonardo Babun

, Hidayet Aksu, A. Selcuk Uluagac
:
A System-level Behavioral Detection Framework for Compromised CPS Devices: Smart-Grid Case. 16:1-16:28 - Li Yan, Haiying Shen:

TOP: Optimizing Vehicle Driving Speed with Vehicle Trajectories for Travel Time Minimization and Road Congestion Avoidance. 17:1-17:25 - Dominik Baumann

, Fabian Mager
, Romain Jacob, Lothar Thiele, Marco Zimmerling, Sebastian Trimpe
:
Fast Feedback Control over Multi-hop Wireless Networks with Mode Changes and Stability Guarantees. 18:1-18:32 - James Harbin, Alan Burns

, Robert I. Davis, Leandro Soares Indrusiak
, Iain Bate, David Griffin
:
The AirTight Protocol for Mixed Criticality Wireless CPS. 19:1-19:28 - Mohammad Khayatian

, Yingyan Lou, Mohammadreza Mehrabian
, Aviral Shrivastava:
Crossroads+: A Time-aware Approach for Intersection Management of Connected Autonomous Vehicles. 20:1-20:28 - Christopher Pereyda, Nisha Raghunath

, Bryan David Minor, Garrett Wilson
, Maureen Schmitter-Edgecombe, Diane J. Cook
:
Cyber-physical Support of Daily Activities: A Robot/Smart Home Partnership. 21:1-21:24 - Kai Li

, Wei Ni, Yousef Emami
, Yiran Shen, Ricardo Severino
, David Pereira
, Eduardo Tovar
:
Design and Implementation of Secret Key Agreement for Platoon-based Vehicular Cyber-physical Systems. 22:1-22:20 - Voica Gavrilut, Paul Pop

:
Traffic-type Assignment for TSN-based Mixed-criticality Cyber-physical Systems. 23:1-23:27
Volume 4, Number 3, May 2020
- Zhicheng Fu

, Chunhui Guo
, Zhenyu Zhang, Shangping Ren, Lui Sha:
UACFinder: Mining Syntactic Carriers of Unspecified Assumptions in Medical Cyber-Physical System Design Models. 24:1-24:25 - Zhenyong Zhang, Ruilong Deng

, David K. Y. Yau, Peng Cheng, Jiming Chen:
On Hiddenness of Moving Target Defense against False Data Injection Attacks on Power Grid. 25:1-25:29 - Ali Tamimi, Adam Hahn, Sandip Roy:

Cyber Threat Impact Analysis to Air Traffic Flows Through Dynamic Queue Networks. 26:1-26:22
- Di Wu, Hanlin Zhu, Yongxin Zhu

, Victor Chang
, Cong He, Ching-Hsien Hsu, Hui Wang, Songlin Feng, Li Tian, Zunkai Huang:
Anomaly Detection Based on RBM-LSTM Neural Network for CPS in Advanced Driver Assistance System. 27:1-27:17 - Vuk Lesi, Ilija Jovanov, Miroslav Pajic

:
Integrating Security in Resource-Constrained Cyber-Physical Systems. 28:1-28:27 - Neetesh Saxena

, Alvaro A. Cárdenas, Raheem Beyah
, Rongxing Lu, Kim-Kwang Raymond Choo
, Yiran Chen:
Introduction to the Special Issue on User-Centric Security and Safety for CPS. 29:1-29:2 - Ding Wang

, Ping Wang, Chenyu Wang:
Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs. 30:1-30:26 - Mohammad Hadi Alaeiyan

, Ali Dehghantanha, Tooska Dargahi
, Mauro Conti
, Saeed Parsa
:
A Multilabel Fuzzy Relevance Clustering System for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks. 31:1-31:22 - Deepak Puthal, Laurence T. Yang

, Schahram Dustdar
, Zhenyu Wen, Jun Song
, Aad van Moorsel, Rajiv Ranjan:
A User-centric Security Solution for Internet of Things and Edge Convergence. 32:1-32:19 - George Hatzivasilis

, Othonas Soultatos, Sotiris Ioannidis, George Spanoudakis, Vasilios Katos, Giorgos Demetriou
:
MobileTrust: Secure Knowledge Integration in VANETs. 33:1-33:25 - Meriem Guerar

, Luca Verderame
, Alessio Merlo, Francesco Palmieri, Mauro Migliardi
, Luca Vallerini:
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices. 34:1-34:19 - Ke Huang

, Xiaosong Zhang, Xiaofen Wang, Yi Mu, Fatemeh Rezaeibagha
, Guangquan Xu, Hao Wang
, Xi Zheng
, Guomin Yang
, Qi Xia, Xiaojiang Du:
HUCDO: A Hybrid User-centric Data Outsourcing Scheme. 35:1-35:23 - Mohammadreza Fakhari Moghaddam Arani

, Deepa Kundur:
A User-centric Approach toward Resilient Frequency-regulating Wind Generators. 36:1-36:23
Volume 4, Number 4, August 2020
Special Issue on Self-Awareness in Resource Constrained CPS
- Axel Jantsch

, Peter R. Lewis, Nikil D. Dutt
:
Introduction to the Special Issue on Self-Aware Cyber-physical Systems. 37:1-37:2 - Kirstie L. Bellman, Christopher Landauer, Nikil D. Dutt

, Lukas Esterle
, Andreas Herkersdorf, Axel Jantsch
, Nima Taherinejad
, Peter R. Lewis, Marco Platzner, Kalle Tammemäe:
Self-aware Cyber-Physical Systems. 38:1-38:26 - Lukas Esterle

, John N. A. Brown
:
I Think Therefore You Are: Models for Interaction in Collectives of Self-aware Cyber-physical Systems. 39:1-39:25 - Adrian E. Sapio, Shuvra S. Bhattacharyya

, Marilyn Wolf:
Runtime Adaptation in Wireless Sensor Nodes Using Structured Learning. 40:1-40:28 - Yehan Ma, Chenyang Lu, Yebin Wang:

Efficient Holistic Control: Self-awareness across Controllers and Wireless Networks. 41:1-41:27 - Ruizhi Chai, Ying Zhang, Geng Sun, Hongsheng Li:

Self-aware Power Management for Maintaining Event Detection Probability of Supercapacitor-powered Cyber-physical Systems. 42:1-42:19
- Matthew Weber

, Baihong Jin, Gil Lederman, Yasser Shoukry
, Edward A. Lee, Sanjit A. Seshia, Alberto L. Sangiovanni-Vincentelli:
Gordian: Formal Reasoning-based Outlier Detection for Secure Localization. 43:1-43:27 - Hong Lu, Tao Yue

, Shaukat Ali:
Pattern-based Interactive Configuration Derivation for Cyber-physical System Product Lines. 44:1-44:24 - Craig Bakker

, Arnab Bhattacharya, Samrat Chatterjee, Draguna L. Vrabie
:
Hypergames and Cyber-Physical Security for Control Systems. 45:1-45:41 - Yunhao Bai

, Kuangyu Zheng, Zejiang Wang
, Xiaorui Wang, Junmin Wang:
MC-Safe: Multi-channel Real-time V2V Communication for Enhancing Driving Safety. 46:1-46:27 - Pushpak Jagtap

, Fardin Abdi, Matthias Rungger, Majid Zamani, Marco Caccamo:
Software Fault Tolerance for Cyber-Physical Systems via Full System Restart. 47:1-47:20 - Mohammad Khayatian

, Mohammadreza Mehrabian
, Edward Andert, Rachel Dedinsky, Sarthake Choudhary, Yingyan Lou, Aviral Shrivastava:
A Survey on Intersection Management of Connected Autonomous Vehicles. 48:1-48:27

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














