Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICCPS
ICCPS 2024
Generate Citations
2024 ACM/IEEE 15th International Conference on Cyber-Physical Systems (ICCPS)
May 13 2024 to May 16 2024
Hong Kong, Hong Kong
ISBN: 979-8-3503-6927-4
Table of Contents
Title Page i
Freely available from IEEE.
pp. 1-1
Title Page iii
Freely available from IEEE.
pp. 3-3
Copyright Page
Freely available from IEEE.
pp. 4-4
Table of Contents
Freely available from IEEE.
pp. 5-9
Message from the ICCPS 2024 Program Chairs
Freely available from IEEE.
pp. 10-11
ICCPS 2024 Organizers
Freely available from IEEE.
pp. 12-15
Repairing Learning-Enabled Controllers While Preserving What Works
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Pengyuan Lu
,
Matthew Cleaveland
,
Oleg Sokolsky
,
Insup Lee
,
Ivan Ruchkin
Zero-One Attack: Degrading Closed-Loop Neural Network Control Systems using State-Time Perturbations
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-22
by
Stanley Bak
,
Sergiy Bogomolov
,
Abdelrahman Hekal
,
Veena Krish
,
Andrew Mata
,
Amir Rahmati
Attention-Based Real-Time Defenses for Physical Adversarial Attacks in Vision Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-32
by
Giulio Rossolini
,
Alessandro Biondi
,
Giorgio Buttazzo
Thinking Beyond Bus-off: Targeted Control Falsification in CAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-44
by
Ipsita Koley
,
Sunandan Adhikary
,
Soumyajit Dey
Rampo: A CEGAR-based Integration of Binary Code Analysis and System Falsification for Cyber-Kinetic Vulnerability Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-54
by
Kohei Tsujio
,
Mohammad Abdullah Al Faruque
,
Yasser Shoukry
Enhancing power grid resilience to cyber-physical attacks using distributed retail electricity markets
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-66
by
Vineet Jagadeesan Nair
,
Priyank Srivastava
,
Anuradha Annaswamy
Optimal Runtime Assurance via Reinforcement Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-76
by
Kristina Miller
,
Christopher K. Zeitler
,
William Shen
,
Kerianne Hobbs
,
John Schierman
,
Mahesh Viswanathan
,
Sayan Mitra
Vulnerability Analysis for Safe Reinforcement Learning in Cyber-Physical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-86
by
Shixiong Jiang
,
Mengyu Liu
,
Fanxin Kong
FAIRO: Fairness-aware Sequential Decision Making for Human-in-the-Loop CPS
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-98
by
Tianyu Zhao
,
Mojtaba Taherisadr
,
Salma Elmalaki
Quantitative Safety-Driven Co-Synthesis of Cyber-Physical System Implementations
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-110
by
Clara Hobbs
,
Shengjie Xu
,
Bineet Ghosh
,
Enrico Fraccaroli
,
Parasara Sridhar Duggirala
,
Samarjit Chakraborty
Playground: A Safe Building Operating System
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-122
by
Xiaohan Fu
,
Yihao Liu
,
Jason Koh
,
Dezhi Hong
,
Rajesh Gupta
,
Gabe Fierro
Formally Verified C Code Generation from Hybrid Communicating Sequential Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-134
by
Shuling Wang
,
Zekun Ji
,
Xiong Xu
,
Bohua Zhan
,
Qiang Gao
,
Naijun Zhan
Sensor Data Transplantation for Redundant Hardware Switchover in Micro Autonomous Vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-146
by
Cailani Lemieux-Mack
,
Kevin Leach
,
Kevin Angstadt
A Middle Way to Traffic Enlightenment
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-156
by
Matthew W. Nice
,
George Gunter
,
Junyi Ji
,
Yuhang Zhang
,
Matthew Bunting
,
Will Barbour
,
Jonathan Sprinkle
,
Daniel B. Work
An Online Approach to Solving Public Transit Stationing and Dispatch Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-168
by
Jose Paolo Talusan
,
Chaeeun Han
,
Ayan Mukhopadhyay
,
Aron Laszka
,
Dan Freudberg
,
Abhishek Dubey
Robust Conformal Prediction for STL Runtime Verification under Distribution Shift
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-179
by
Yiqi Zhao
,
Bardh Hoxha
,
Georgios Fainekos
,
Jyotirmoy V. Deshmukh
,
Lars Lindemann
An Online Planning Framework for Multi-Robot Systems with LTL Specification
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-191
by
Rohit Singh
,
Indranil Saha
Control over Low-Power Wide-Area Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-201
by
Aakriti Jain
,
Prashant Modekurthy
,
Abusayeed Saifullah
FinA: Fairness of Adverse Effects in Decision-Making of Human-Cyber-Physical-System
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-211
by
Tianyu Zhao
,
Salma Elmalaki
Curating Naturally Adversarial Datasets for Learning-Enabled Medical Cyber-Physical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-223
by
Sydney Pugh
,
Ivan Ruchkin
,
James Weimer
,
Insup Lee
ϵ-Neural Thompson Sampling of Deep Brain Stimulation for Parkinson Disease Treatment
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-234
by
Hao-Lun Hsu
,
Qitong Gao
,
Miroslav Pajic
Towards Deterministic End-to-end Latency for Medical AI Systems in NVIDIA Holoscan
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-246
by
Soham Sinha
,
Shekhar Dwivedi
,
Mahdi Azizian
Control Corruption without Firmware Infection: Stealthy Supply Chain Attacks via PLC Hardware Implants (MalTag)
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-258
by
Mingbo Zhang
,
Saman Zonouz
Unsafe Events Detection in Smart Water Meter Infrastructure via Noise-Resilient Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-270
by
Ayanfeoluwa Oluyomi
,
Sahar Abedzadeh
,
Shameek Bhattacharjee
,
Sajal K. Das
Demo Abstract: Playground, A Safe Building Operating System
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-272
by
Xiaohan Fu
,
Yihao Liu
,
Jason Koh
,
Dezhi Hong
,
Rajesh Gupta
,
Gabe Fierro
Iterative Model Checking for Safety-Critical Problems in Cyber-Physical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-274
by
Guangyao Chen
,
Zhihao Jiang
Poster Abstract of Digital-twin-based Decision Support During Personalized Robotic Rehabilitation
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-276
by
Yilun Chen
,
Zhuo Jian
,
Yixi Wang
,
Zhihao Jiang
Multi-Agent System for Optimizing Victim Tagging in Human/Autonomous Responder Teams
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-278
by
Maria A. Cardei
,
Afsaneh Doryab
Achieving Real-time Visual Tracking with Low-Cost Edge AI
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-280
by
Van Minh Do
,
Meiqing Wu
,
Siew-Kei Lam
,
Thambipillai Srikanthan
Poster Abstract: Landing-Type Aware Multi-Drone Route Generation for Last-Mile Delivery Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-282
by
JiHyun Kwon
,
BaekGyu Kim
,
Yi-Ying Chen
,
Chung-Wei Lin
Poster Abstract: Signal Temporal Logic Compliant Motion Planning using Reinforcement Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-284
by
Tushar Dilip Kurne
,
Manas Sashank Juvvi
,
Vaishnavi J
,
Pushpak Jagtap
Adaptive Protection of Power Grids against Stealthy Load Alterations
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-286
by
Anjana Balabhaskara
,
Sunandan Adhikary
,
Ipsita Koley
,
Soumyajit Dey
,
Ashish R. Hota
Poster Abstract: Assuring LLM-Enabled Cyber-Physical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-288
by
Weizhe Xu
,
Mengyu Liu
,
Steven Drager
,
Matthew Anderson
,
Fanxin Kong
Poster Abstract: Neural Architecture Sizing for Autonomous Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-290
by
Shengjie Xu
,
Clara Hobbs
,
Yukai Song
,
Bineet Ghosh
,
Sharmin Aktar
,
Lei Yang
,
Yi Sheng
,
Weiwen Jiang
,
Jingtong Hu
,
Parasara Sridhar Duggirala
,
Samarjit Chakraborty
Author Index
Freely available from IEEE.
pp. 291-292
Showing 41 out of 41