Skip navigation

Resilient Cyber Physical Systems

1. Yi, E. B., Maji, A. K., and Bagchi, S. (2018). How Reliable is my Wearable: A Fuzz Testing-based Study. Other, https://engineering.purdue.edu/dcsl/publications/papers/2018/final_android-wear-robustness_dsn18_submitted.pdf. [ http ]

2. Wang, J., Kim, Y. H., He, X. S., and Peeta, S. (2018). Information Flow Propagation Wave Model Based on an Information Relay Control Strategy Under Congested V2V Communications. Other, . [ http ]

3. Bagchi, S., and Panchal, J. (2018). Living on the Edge Dependably: New Challenges and Solution Directions. Other, . [ http ]

4. Sen, S., Koo, J., and Bagchi, S. (2018). TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices. IEEE Internet Computing, IEEE. Cited by 1. [ http ]

5. Hota, A., Clements, A. A., Bagchi, S., and Sundaram, S. (2017). A Game-Theoretic Framework for Securing Interdependent Assets in Networks.. Other, Sandia National Lab.(SNL-NM), Albuquerque, NM (United States); Sandia National Laboratories, null. [ http ]

6. Wang, J., Kim, Y. H., He, X., and Peeta, S. (2017). Analytical model for information flow propagation wave under an information relay control strategy in a congested vehicle-to-vehicle communication environment. Transportation Research Part C: Emerging Technologies, Pergamon. [ http ]

7. Liu, X., Chen, T., Qian, F., Guo, Z., Lin, F. X., Wang, X., and Chen, K. (2017). Characterizing Smartwatch Usage in the Wild. Other, ACM. Cited by 8. [ http ]

8. Zhang, H., Bagchi, S., and Wang, H. (2017). Integrity of Data in a Mobile Crowdsensing Campaign: A Case Study. Other, . [ http ]

9. Kim, Y. H., and Peeta, S. (2017). Modeling of the dynamic flow propagation of multiple units of information under vehicle-to-vehicle communications based advanced traveler information systems. Journal of Intelligent Transportation Systems, Taylor & Francis. Cited by 2. [ http ]

10. Kim, Y. H., Peeta, S., and He, X. (2017). Modeling the information flow propagation wave under vehicle-to-vehicle communications. Transportation Research Part C: Emerging Technologies, Pergamon. Cited by 1. [ http ]

11. Li, Y., Zhang, L., Zheng, H., He, X., Peeta, S., Zheng, T., and Li, Y. (2017). Nonlane-Discipline-Based Car-Following Model for Electric Vehicles in Transportation-Cyber-Physical Systems. IEEE Transactions on Intelligent Transportation Systems, IEEE. Cited by 11. [ http ]

12. Wang, N., Yi, E. B., and Bagchi, S. (2017). On Reliability of Android Wearable Health Devices. arXiv preprint arXiv:1706.09247, . [ http ]

13. Utterback, R., Agrawal, K., Lee, I., and Kulkarni, M. (2017). Processor-Oblivious Record and Replay. Proceedings of the 22nd ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, ACM. Cited by 1. [ http ]

14. Koo, J., Lin, X., and Bagchi, S. (2017). RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters. Other, IEEE. Cited by 2. [ http ]

15. Zhang, H., Theera-Ampornpunt, N., Wang, H., Bagchi, S., and Panta, R. K. (2017). Sense-Aid: A framework for enabling network as a service for participatory sensing. Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, ACM. [ http ]

16. Lee, C., Michelusi, N., and Scutari, G. (2017). Topology-Agnostic Average Consensus in Sensor Networks with Limited Data Rate. Purdue University, West Lafayette, IN, Tech. Rep, . [ http ]

17. Wood, P., Bagchi, S., and Hussain, A. (2016). Defending against strategic adversaries in dynamic pricing markets for smart grids. 2016 8th International Conference on Communication Systems and Networks (COMSNETS), IEEE. Cited by 2. [ http ]

18. Sundaram, S., and Bagchi, S. (2016). Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets. Decision and Game Theory for Security: 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings, Springer. [ http ]

19. Zhu, S., Zheng, H., Peeta, S., Guo, Y., Cheng, L., and Sun, W. (2016). Optimal Heterogeneous Sensor Deployment Strategy for Dynamic Origin–Destination Demand Estimation. Transportation Research Record: Journal of the Transportation Research Board, Transportation Research Board of the National Academies. Cited by 2. [ http ]

20. Liu, R., Jiang, L., Jiang, N., and Lin, F. X. (2015). Anatomizing System Activities on Interactive Wearable Devices. Proceedings of the 6th Asia-Pacific Workshop on Systems, ACM. Cited by 4. [ http ]

21. Elmahdi, A., Taha, A. F., Sun, D., and Panchal, J. H. (2015). Decentralized control framework and stability analysis for networked control systems. Journal of Dynamic Systems, Measurement, and Control, American Society of Mechanical Engineers. Cited by 19. [ http ]

22. Kim, Y. H., Peeta, S., and He, X. (2015). Macroscopic Modeling of Spatiotemporal Information Flow Propagation Wave under Vehicle-to-Vehicle Communications. 2015 IEEE 18th International Conference on Intelligent Transportation Systems, IEEE. Cited by 1. [ http ]

23. Wood, P., Bagchi, S., and Hussain, A. (2015). Optimizing defensive investments in energy-based cyber-physical systems. Parallel and Distributed Processing Symposium Workshop (IPDPSW), 2015 IEEE International, IEEE. Cited by 2. [ http ]

24. Taha, A. F., Hachem, N. A., and Panchal, J. H. (2014). A Quasi-Feed-In-Tariff policy formulation in micro-grids: A bi-level multi-period approach. Energy Policy, Elsevier. Cited by 19. [ http ]

25. Shawly, T., Liu, J., Burow, N., Bagchi, S., Berthier, R., and Bobba, R. B. (2014). A risk assessment tool for advanced metering infrastructures. Smart Grid Communications (SmartGridComm), 2014 IEEE International Conference on, IEEE. Cited by 5. [ http ]

26. Elmahdi, A., Taha, A. F., Sun, D., and Panchal, J. H. (2014). An optimal general purpose scheduler for networked control systems. Systems, Man and Cybernetics (SMC), 2014 IEEE International Conference on, IEEE. Cited by 4. [ http ]

27. Zhang, P., and Peeta, S. (2014). Dynamic and disequilibrium analysis of interdependent infrastructure systems. Transportation Research Part B: Methodological, Elsevier. Cited by 6. [ http ]

28. Song, D., He, X., and Peeta, S. (2014). Field Deployment to Quantify the Value of Real-time Information by Integrating Driver Routing Decisions and Route Assignment Strategies. Tech Report, . [ http ]

29. Taha, A. F., Elmahdi, A., Panchal, J. H., and Sun, D. (2014). Networked unknown input observer analysis and design for time-delay systems. 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC), IEEE. Cited by 4. [ http ]

30. Elmahdi, A., Taha, A. F., and Sun, D. (2014). Observer-based decentralized control scheme for stability analysis of networked systems. 11th IEEE International Conference on Control \& Automation (ICCA), IEEE. Cited by 8. [ http ]

31. Taha, A. F., Elmahdi, A., Panchal, J. H., and Sun, D. (2014). Pure Time Delay Analysis for Decentralized Networked Control Systems. ASME 2014 Dynamic Systems and Control Conference, American Society of Mechanical Engineers. Cited by 2. [ http ]

32. Taha, A. F., Elmahdi, A., Panchal, J. H., and Sun, D. (2014). Stability analysis of networked control systems with unknown inputs. Communication, Control, and Computing (Allerton), 2014 52nd Annual Allerton Conference on, IEEE. Cited by 2. [ http ]

33. Taha, A. F., Elmahdi, A., Panchal, J. H., and Sun, D. (2014). Time delay analysis for networked control systems with applications to power networks. ASME Journal of Dynamic Systems, Measurement, and Control, . Cited by 4. [ http ]

34. Kulkarni, M., Wadekar, P., and Dagale, H. (2013). Block Division Based CAMShift Algorithm for Real-Time Object Tracking Using Distributed Smart Cameras. Multimedia (ISM), 2013 IEEE International Symposium on, IEEE. Cited by 2. [ http ]

35. Atzeni, I., Ord{\'o}{\~n}ez, L. G., Scutari, G., Palomar, D. P., and Fonollosa, J. R. (2013). Demand-side management via distributed energy generation and storage optimization. IEEE Transactions on Smart Grid, IEEE. Cited by 267. [ http ]

36. Shin, D., Koo, J., Yang, L., Lin, X., Bagchi, S., and Zhang, J. (2013). Low-complexity secure protocols to defend cyber-physical systems against network isolation attacks. Communications and Network Security (CNS), 2013 IEEE Conference on, IEEE. Cited by 2. [ http ]

37. Atzeni, I., Ordóñez, L. G., Scutari, G., Palomar, D. P., and Fonollosa, J. R. (2013). Non-cooperative and Cooperative Optimization of Distributed Energy Generation and Storage in the Demand-Side of the Smart Grid.. IEEE Trans. Signal Processing, . Cited by 95. [ http ]

38. Atzeni, I., Ord{\'o}nez, L. G., Scutari, G., Palomar, D. P., and Fonollosa, J. R. (2012). Day-ahead bidding strategies for demand-side expected cost minimization. Smart Grid Communications (SmartGridComm), 2012 IEEE Third International Conference on, IEEE. Cited by 22. [ http ]

39. Koo, J., Lin, X., and Bagchi, S. (2012). PRIVATUS: Wallet-friendly privacy protection for smart meters. European Symposium on Research in Computer Security, Springer. Cited by 18. [ http ]

40. Tancreti, M., Hossain, M. S., Bagchi, S., and Raghunathan, V. (2011). Aveksha: A hardware-software approach for non-intrusive tracing and profiling of wireless embedded systems. Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems, ACM. Cited by 35. [ http ]

41. Scutari, G., Palomar, D. P., Facchinei, F., and Pang, J. (2011). Distributed dynamic pricing for MIMO interfering multiuser systems: A unified approach. Network Games, Control and Optimization (NetGCooP), 2011 5th International Conference on, IEEE. Cited by 29. [ http ]

42. Hossain, M. S., Islam, A. A. A., Kulkarni, M., and Raghunathan, V. (2011). usetl: A set based programming abstraction for wireless sensor networks. Information Processing in Sensor Networks (IPSN), 2011 10th International Conference on, IEEE. Cited by 16. [ http ]

43. Lin, F. X., Wang, Z., LiKamWa, R., and Zhong, L. (2011). Transparent programming of heterogeneous smartphones for sensing. arXiv preprint arXiv:1103.2348, . Cited by 4. [ http ]

 </