


default search action
ACM Transactions on Cyber-Physical Systems, Volume 3
Volume 3, Number 1, January 2019
- Md. Zakirul Alam Bhuiyan, Sy-Yen Kuo, Damian M. Lyons, Zili Shao:
Dependability in Cyber-Physical Systems and Applications. 1:1-1:4 - Feng Tan, Liansheng Liu, Stefan Winter, Qixin Wang
, Neeraj Suri
, Lei Bu
, Yu Peng, Xue Liu, Xiyuan Peng:
Cross-Domain Noise Impact Evaluation for Black Box Two-Level Control CPS. 2:1-2:25 - Yehan Ma, Dolvara Gunatilaka, Bo Li, Humberto González, Chenyang Lu:
Holistic Cyber-Physical Management for Dependable Wireless Control Systems. 3:1-3:25 - Guoqi Xie
, Gang Zeng, Jiyao An, Renfa Li, Keqin Li:
Resource-Cost-Aware Fault-Tolerant Design Methodology for End-to-End Functional Safety Computation on Automotive Cyber-Physical Systems. 4:1-4:27 - Yang Liu, Xiaoming Chen, Dileep Kadambi, Ajinkya Bari, Xin Li, Shiyan Hu, Pingqiang Zhou:
Dependable Visual Light-Based Indoor Localization with Automatic Anomaly Detection for Location-Based Service of Mobile Cyber-Physical Systems. 5:1-5:17 - Tian Wang
, Wenhua Wang, Anfeng Liu, Shaobin Cai, Jiannong Cao:
Improve the Localization Dependability for Cyber-Physical Applications. 6:1-6:21 - Chang Wang, Yongxin Zhu, Weiwei Shi, Victor Chang
, Pandi Vijayakumar
, Bin Liu, Yishu Mao, Jiabao Wang, Yiping Fan:
A Dependable Time Series Analytic Framework for Cyber-Physical Systems of IoT-based Smart Grid. 7:1-7:18 - Jiahui Yu, Kun Wang
, Deze Zeng, Chunsheng Zhu, Song Guo:
Privacy-preserving Data Aggregation Computing in Cyber-Physical Social Systems. 8:1-8:23 - Ning Li, Zheng Yan
, Mingjun Wang, Laurence T. Yang
:
Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE. 9:1-9:23 - Beibei Li
, Rongxing Lu, Kim-Kwang Raymond Choo, Wei Wang, Sheng Luo:
On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach. 10:1-10:25 - Qingchen Zhang, Laurence T. Yang
, Zhikui Chen, Peng Li
:
Dependable Deep Computation Model for Feature Learning on Big Data in Cyber-Physical Systems. 11:1-11:17 - Yu Jiang, Houbing Song
, Yixiao Yang, Han Liu, Ming Gu, Yong Guan, Jiaguang Sun, Lui Sha:
Dependable Model-driven Development of CPS: From Stateflow Simulation to Verified Implementation. 12:1-12:31
Volume 3, Number 2, March 2019
- Jiang Wan, Anthony Bahadir Lopez, Mohammad Abdullah Al Faruque
:
Physical Layer Key Generation: Securing Wireless Communication in Automotive Cyber-Physical Systems. 13:1-13:26 - Pei-Chi Huang, Luis Sentis, Joel Lehman, Chien-Liang Fok, Aloysius K. Mok, Risto Miikkulainen:
Tradeoffs in Neuroevolutionary Learning-Based Real-Time Robotic Task Design in the Imprecise Computation Framework. 14:1-14:29 - Roopak Sinha
, Barry Dowdeswell
, Gulnara Zhabelova, Valeriy Vyatkin:
TORUS: Scalable Requirements Traceability for Large-Scale Cyber-Physical Systems. 15:1-15:25 - Edward Tremel
, Ken Birman
, Robert Kleinberg, Márk Jelasity
:
Anonymous, Fault-Tolerant Distributed Queries for Smart Devices. 16:1-16:29 - Srinivasan Iyengar, Sandeep Kalra, Anushree Ghosh, David E. Irwin, Prashant J. Shenoy
, Benjamin M. Marlin
:
Inferring Smart Schedules for Dumb Thermostats. 17:1-17:29 - Andrea Ceccarelli
, Tommaso Zoppi
, Alexandr Vasenev, Marco Mori, Dan Ionita
, Lorena Montoya
, Andrea Bondavalli
:
Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach. 18:1-18:24 - Marco Biagi, Laura Carnevali, Fabio Tarani, Enrico Vicario:
Model-Based Quantitative Evaluation of Repair Procedures in Gas Distribution Networks. 19:1-19:26 - Christopher W. Badenhop, Scott R. Graham
, Barry E. Mullins, Logan O. Mailloux:
Looking Under the Hood of Z-Wave: Volatile Memory Introspection for the ZW0301 Transceiver. 20:1-20:24 - Desheng Zhang, Tian He, Fan Zhang:
National-scale Traffic Model Calibration in Real Time with Multi-source Incomplete Data. 21:1-21:26 - William Koch
, Renato Mancuso
, Richard West, Azer Bestavros:
Reinforcement Learning for UAV Attitude Control. 22:1-22:21 - Sean Kenneth Barker, Sandeep Kalra, David E. Irwin, Prashant J. Shenoy
:
Building Virtual Power Meters for Online Load Tracking. 23:1-23:24
Volume 3, Number 3, October 2019
- Luís Almeida, Björn Andersson, Jen-Wei Hsieh, Li-Pin Chang, Xiaobo Sharon Hu
:
Introduction to the Special Issue on Real-Time aspects in Cyber-Physical Systems. 24:1-24:2 - Shunsuke Aoki, Ragunathan Raj Rajkumar:
CSIP: A Synchronous Protocol for Automated Vehicles at Road Intersections. 25:1-25:25 - Philip Parsch, Alejandro Masrur:
Accounting for Reliability in Unacknowledged Time-Constrained WSNs. 26:1-26:28 - João Loureiro
, Raghuraman Rangarajan, Borislav Nikolic, Leandro Soares Indrusiak, Eduardo Tovar
:
Extensive Analysis of a Real-Time Dense Wired Sensor Network Based on Traffic Shaping. 27:1-27:27 - BaekGyu Kim
, Lu Feng, Oleg Sokolsky, Insup Lee:
Determining Timing Parameters for the Code Generation from Platform-Independent Timed Models. 28:1-28:32 - Chao Wang
, Christopher D. Gill, Chenyang Lu:
Real-Time Middleware for Cyber-Physical Event Processing. 29:1-29:25
- Hendrik Roehm, Jens Oehlerking, Matthias Woehrle, Matthias Althoff:
Model Conformance for Cyber-Physical Systems: A Survey. 30:1-30:26 - Dima Rabadi
, Rui Tan, David K. Y. Yau, Sreejaya Viswanathan, Hao Zheng, Peng Cheng:
Resilient Clock Synchronization Using Power Grid Voltage. 31:1-31:26 - Chen Pan
, Mimi Xie, Song Han, Zhi-Hong Mao, Jingtong Hu:
Modeling and Optimization for Self-powered Non-volatile IoT Edge Devices with Ultra-low Harvesting Power. 32:1-32:26 - Róbinson Medina Sánchez
, Juan Valencia, Sander Stuijk
, Dip Goswami, Twan Basten:
Designing a Controller with Image-based Pipelined Sensing and Additive Uncertainties. 33:1-33:26 - Junia Valente
, Kanchan Bahirat, Kelly Venechanos, Alvaro A. Cárdenas
, Prabhakaran Balakrishnan
:
Improving the Security of Visual Challenges. 34:1-34:26
Volume 3, Number 4, October 2019
- Tongquan Wei, Junlong Zhou, Rajiv Ranjan, Isaac Triguero
, Huafeng Yu, Chun Jason Xue, Schahram Dustdar
:
Introduction to the Special Issue on Human-interaction-aware Data Analytics for Cyber-physical Systems. - Xiaokang Wang, Laurence T. Yang
, Yihao Wang, Xingang Liu, Qingxia Zhang, M. Jamal Deen
:
A Distributed Tensor-Train Decomposition Method for Cyber-Physical-Social Services. 35:1-35:15 - Tingmin Wu
, Lihong Tang, Rongjunchen Zhang, Sheng Wen, Cécile Paris, Surya Nepal
, Marthie Grobler
, Yang Xiang:
Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps. 36:1-36:21 - Wei Li
, Xiaomin Chang
, Junwei Cao, Ting Yang, Yaojie Sun, Albert Y. Zomaya
:
A Sustainable and User-Behavior-Aware Cyber-Physical System for Home Energy Management. 37:1-37:24 - Fu Xiao, Jing Chen, Zhetao Li, Haiping Huang, Lijuan Sun:
Improved LDA Dimension Reduction Based Behavior Learning with Commodity WiFi for Cyber-Physical Systems. 38:1-38:19 - Guoqi Xie
, Yang Bai, Wei Wu, Yanwen Li, Renfa Li, Keqin Li:
Human-Interaction-aware Adaptive Functional Safety Processing for Multi-Functional Automotive Cyber-Physical Systems. 39:1-39:25 - Hui Huang, Shiyan Hu, Ye Sun
:
Energy-Efficient ECG Signal Compression for User Data Input in Cyber-Physical Systems by Leveraging Empirical Mode Decomposition. 40:1-40:19 - Hyung-Jin Yoon, Christopher Widdowson, Thiago Marinho, Ranxiao Frances Wang, Naira Hovakimyan:
Socially Aware Path Planning for a Flying Robot in Close Proximity of Humans. 41:1-41:24 - Chaoqun Yang, Li Feng, Zhiguo Shi, Rongxing Lu, Kim-Kwang Raymond Choo
:
A Crowdsensing-based Cyber-physical System for Drone Surveillance Using Random Finite Set Theory. 42:1-42:22

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.