default search action
15th ICCPS 2024: Hong Kong
- 15th ACM/IEEE International Conference on Cyber-Physical Systems, ICCPS 2024, Hong Kong, May 13-16, 2024. IEEE 2024, ISBN 979-8-3503-6927-4
- Pengyuan Lu, Matthew Cleaveland, Oleg Sokolsky, Insup Lee, Ivan Ruchkin:
Repairing Learning-Enabled Controllers While Preserving What Works. 1-11 - Stanley Bak, Sergiy Bogomolov, Abdelrahman Hekal, Veena Krish, Andrew Mata, Amir Rahmati:
Zero-One Attack: Degrading Closed-Loop Neural Network Control Systems using State-Time Perturbations. 12-22 - Giulio Rossolini, Alessandro Biondi, Giorgio C. Buttazzo:
Attention-Based Real-Time Defenses for Physical Adversarial Attacks in Vision Applications. 23-32 - Ipsita Koley, Sunandan Adhikary, Soumyajit Dey:
Thinking Beyond Bus-off: Targeted Control Falsification in CAN. 33-44 - Kohei Tsujio, Mohammad Abdullah Al Faruque, Yasser Shoukry:
Rampo: A CEGAR-based Integration of Binary Code Analysis and System Falsification for Cyber-Kinetic Vulnerability Detection. 45-54 - Vineet Jagadeesan Nair, Priyank Srivastava, Anuradha Annaswamy:
Enhancing power grid resilience to cyber-physical attacks using distributed retail electricity markets. 55-66 - Kristina Miller, Christopher K. Zeitler, William Shen, Kerianne Hobbs, John Schierman, Mahesh Viswanathan, Sayan Mitra:
Optimal Runtime Assurance via Reinforcement Learning. 67-76 - Shixiong Jiang, Mengyu Liu, Fanxin Kong:
Vulnerability Analysis for Safe Reinforcement Learning in Cyber-Physical Systems. 77-86 - Tianyu Zhao, Mojtaba Taherisadr, Salma Elmalaki:
FAIRO: Fairness-aware Sequential Decision Making for Human-in-the-Loop CPS. 87-98 - Clara Hobbs, Shengjie Xu, Bineet Ghosh, Enrico Fraccaroli, Parasara Sridhar Duggirala, Samarjit Chakraborty:
Quantitative Safety-Driven Co-Synthesis of Cyber-Physical System Implementations. 99-110 - Xiaohan Fu, Yihao Liu, Jason Koh, Dezhi Hong, Rajesh Gupta, Gabe Fierro:
Playground: A Safe Building Operating System. 111-122 - Shuling Wang, Zekun Ji, Xiong Xu, Bohua Zhan, Qiang Gao, Naijun Zhan:
Formally Verified C Code Generation from Hybrid Communicating Sequential Processes. 123-134 - Cailani Lemieux Mack, Kevin Leach, Kevin Angstadt:
Sensor Data Transplantation for Redundant Hardware Switchover in Micro Autonomous Vehicles. 135-146 - Matthew Walter Nice, George Gunter, Junyi Ji, Yuhang Zhang, Matthew R. Bunting, William Barbour, Jonathan Sprinkle, Daniel B. Work:
A Middle Way to Traffic Enlightenment. 147-156 - Jose Paolo Talusan, Chaeeun Han, Ayan Mukhopadhyay, Aron Laszka, Daniel Freudberg, Abhishek Dubey:
An Online Approach to Solving Public Transit Stationing and Dispatch Problem. 157-168 - Yiqi Zhao, Bardh Hoxha, Georgios Fainekos, Jyotirmoy V. Deshmukh, Lars Lindemann:
Robust Conformal Prediction for STL Runtime Verification under Distribution Shift. 169-179 - Rohit Singh, Indranil Saha:
An Online Planning Framework for Multi-Robot Systems with LTL Specification. 180-191 - Aakriti Jain, Prashant P. Modekurthy, Abusayeed Saifullah:
Control over Low-Power Wide-Area Networks. 192-201 - Tianyu Zhao, Salma Elmalaki:
FinA: Fairness of Adverse Effects in Decision-Making of Human-Cyber-Physical-System. 202-211 - Sydney Pugh, Ivan Ruchkin, James Weimer, Insup Lee:
Curating Naturally Adversarial Datasets for Learning-Enabled Medical Cyber-Physical Systems. 212-223 - Hao-Lun Hsu, Qitong Gao, Miroslav Pajic:
ϵ-Neural Thompson Sampling of Deep Brain Stimulation for Parkinson Disease Treatment. 224-234 - Soham Sinha, Shekhar Dwivedi, Mahdi Azizian:
Towards Deterministic End-to-end Latency for Medical AI Systems in NVIDIA Holoscan. 235-246 - Mingbo Zhang, Saman A. Zonouz:
Control Corruption without Firmware Infection: Stealthy Supply Chain Attacks via PLC Hardware Implants (MalTag). 247-258 - Ayanfeoluwa Oluyomi, Sahar Abedzadeh, Shameek Bhattacharjee, Sajal K. Das:
Unsafe Events Detection in Smart Water Meter Infrastructure via Noise-Resilient Learning. 259-270 - Xiaohan Fu, Yihao Liu, Jason Koh, Dezhi Hong, Rajesh Gupta, Gabe Fierro:
Demo Abstract: Playground, A Safe Building Operating System. 271-272 - Guangyao Chen, Zhihao Jiang:
Iterative Model Checking for Safety-Critical Problems in Cyber-Physical Systems. 273-274 - Yilun Chen, Zhuo Jian, Yixi Wang, Zhihao Jiang:
Poster Abstract of Digital-twin-based Decision Support During Personalized Robotic Rehabilitation. 275-276 - Maria A. Cardei, Afsaneh Doryab:
Multi-Agent System for Optimizing Victim Tagging in Human/Autonomous Responder Teams. 277-278 - Do Van Minh, Meiqing Wu, Siew-Kei Lam, Thambipillai Srikanthan:
Achieving Real-time Visual Tracking with Low-Cost Edge AI. 279-280 - JiHyun Kwon, BaekGyu Kim, Yi-Ying Chen, Chung-Wei Lin:
Poster Abstract: Landing-Type Aware Multi-Drone Route Generation for Last-Mile Delivery Service. 281-282 - Tushar Dilip Kurne, Manas Sashank Juvvi, Vaishnavi J, Pushpak Jagtap:
Poster Abstract: Signal Temporal Logic Compliant Motion Planning using Reinforcement Learning. 283-284 - Anjana Balabhaskara, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey, Ashish R. Hota:
Adaptive Protection of Power Grids against Stealthy Load Alterations. 285-286 - Weizhe Xu, Mengyu Liu, Steven Drager, Matthew Anderson, Fanxin Kong:
Poster Abstract: Assuring LLM-Enabled Cyber-Physical Systems. 287-288 - Shengjie Xu, Clara Hobbs, Yukai Song, Bineet Ghosh, Sharmin Aktar, Lei Yang, Yi Sheng, Weiwen Jiang, Jingtong Hu, Parasara Sridhar Duggirala, Samarjit Chakraborty:
Poster Abstract: Neural Architecture Sizing for Autonomous Systems. 289-290
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.