CPS & CIS Publications

Publications

 

2023

  • Zhiang Li, Daisuke Mashima, Wenshei Ong, Ertem Esiner, Zbigniew Kalbarczyk, and Ee-Chien Chang
    On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers
    To appear at the ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS’24)
  • Aneeqa Mumrez, Muhammad Roomi, Heng Chuan Tan, Daisuke Mashima, Ghada Elbez, and Veit Hagenmeyer
    Comparative Study on Smart Grid Security Testbeds using MITRE ATT&CK Matrix
    To appear at the IEEE International Conference on Smart Grid Communications (SmartGridComm’23)
  • Muhammad Roomi, Isaac Lim, and Daisuke Mashima
    On Design and Implementation of Real-time High-fidelity Virtual Power System for Smart Grid Cyber Range
    To appear at the IEEE International Conference on Smart Grid Communications (SmartGridComm’23)
  • Vanessa Tay, Xinran Li, Daisuke Mashima, Bennet Ng, Phuong Cao, Zbigniew Kalbarczyk, and Ravishankar K. Iyer
    Taxonomy of Fingerprinting Techniques for Evaluation of Smart Grid Honeypot Realism
    To appear at the IEEE International Conference on Smart Grid Communications (SmartGridComm’23)
  • Daisuke Mashima, Yao Chen, Muhammad M. Roomi, Subhash Lakshminarayana, and Deming Chen
    Cybersecurity for Modern Smart Grid Against Emerging Threats
    Book Chapter in Foundations and Trends® in Privacy and Security
    Vol. 5: No. 4, pp 189-285 [DOI 10.1561/3300000035] [pdf]
  • Utku Tefek, Ertem Esiner, Carmen Cheh, and Daisuke Mashima
    A Smart Grid Ontology: Vulnerabilities, Attacks and Security Policies
    In Proceedings of the IEEE Conference on Communications and Network Security (CNS’23)
    Florida, USA, Oct 2023 [DOI 10.1109/CNS59707.2023.10289085]
  • M. Suhail Hussain, Chen Yaohao, Muhammad M. Roomi, Daisuke Mashima, and Ee-chien Chang
    An Open-Source Framework for Publishing/Subscribing IEC 61850 R-GOOSE and R-SV
    Elsevier SoftwareX
    Jul 2023 [DOI 10.1016/j.softx.2023.101415]
  • Ertem Esiner, Utku Tefek, Daisuke Mashima, Binbin Chen, Zbigniew Kalbarczyk, and David Nicol
    Message Authentication and Provenance Verification for Industrial Control Systems
    ACM Transactions on Cyber-Physical Systems
    Jul 2023 [DOI 10.1145/3607194]
  • Yuting Wu, Pengfei Zhou, Xin Lou, Rui Tan, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    Susceptibility of Autonomous Driving Agents to Learning-Based Action-Space Attacks
    In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W’23)
    Porto, Portugal, June 2023 [DOI 10.1109/DSN-W58399.2023.00034]
  • Jiahui Lim, Wenshei Ong, Utku Tefek, and Ertem Esiner
    A Security Policy Engine for Building Energy Management Systems
    In Proceedings of the International Workshop on Artificial Intelligence and Industrial Internet-of-Things Security (AIoTS’23)
    Kyoto, Japan, Jun 2023 [DOI 10.1007/978-3-031-41181-6_13]
  • Daisuke Mashima, Muhammad M. Roomi, Bennet Ng, Zbigniew Kalbarczyk, Suhail Hussain, and Ee-chien Chang
    Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training
    In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’23)
    Porto, Portugal, Jun 2023 [DOI 10.1109/DSN-S58398.2023.00024]
  • Yuting Wu, Pengfei Zhou, Xin Lou, Rui Tan, Zbigniew K., and Ravishankar Iyer
    Effects of Learning-Based Action-Space Attacks on Autonomous Driving Agents
    In Proceedings of the ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS’23)
    Texas, USA, May 2023 [DOI 10.1145/3576841.3589615]
  • Partha Biswas, Vyshnavi Mohanraj, Carmen Cheh, Binbin Chen, and Daisuke Mashima
    Machine Learning Assisted Bad Data Detection for High-throughput Substation Communication
    In Proceedings of the IEEE Conference on Communications (ICC’23)
    Rome, Italy, May 2023 [arxiv-2302.05949]
  • Xiaohong Chen, Minh-Thai Trinh, and Grigore Rosu
    Generating Proof Certificates for a Language-Agnostic Deductive Program Verifier
    In Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA’23)
    Cascais, Portugal, Apr 2023 [DOI 10.1109/ISGT51731.2023.10066414]
  • S.M. Suhail Hussain, Muhammad Roomi, Daisuke Mashima, and Ee-chien Chang
    End-to-End Performance Evaluation of R-SV / R-GOOSE Messages for Wide Area Protection and Control Applications
    In Proceedings of the IEEE PES Conference on Innovative Smart Grid Technologies, North America 2023 (ISGT NA’23)
    Washington D.C., USA, Mar 2023 [DOI 10.1109/ISGT51731.2023.10066414]
  • Yuqing Zhu, Sridhar Adepu, Ying Yang, Kushagra Dixit and Xin Lou
    Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles
    In Proceedings of the International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS’22)
    Copenhagen, Denmark, Feb 2023 [DOI 10.1007/978-3-031-25460-4_3]
  • Muhammad Roomi, Suhail Hussain, Daisuke Mashima, Ee-chien Chang, Taha Selim Ustun
    Analysis of False Data Injection Attacks against Automated Control for Parallel Generators in IEC61850 Based Smart Grid Systems
    IEEE Systems Journal
    Jan 2023 [DOI 10.1109/JSYST.2023.3236951]
  • Beatrice Cassottana, Muhammad M. Roomi, Daisuke Mashima, Giovanni Sansavini
    Resilience Analysis of Cyber-Physical Systems: A Review of Models and Methods
    Wiley Risk Analysis Journal
    Jan 2023 [DOI 10.1111/risa.14089]

2022

  • Hanyu Zheng, Zhenwei Ng, Pengfei Zhou, Xin Lou, David Yau and Marianne Winslett
    Detecting Cyber Attacks in Smart Grids with Massive Unlabeled Sensing Data
    In Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm’22)
    Singapore, Dec 2022 [DOI 10.1109/SmartGridComm52983.2022.9961017]
  • Jia Wei Teo, Sean Gunawan, Partha Biswas and Daisuke Mashima
    Evaluating Synthetic Datasets for Training Machine Learning Models to Detect Malicious Commands
    In Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm’22)
    Singapore, Dec 2022 [DOI 10.1109/SmartGridComm52983.2022.9961001]
  • Utku Tefek, Ertem Esiner and Daisuke Mashima
    Analysis of Message Authentication Solutions for IEC 61850 in Substation Automation Systems
    In Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm’22)
    Singapore, Dec 2022 [DOI 10.1109/SmartGridComm52983.2022.9961052]
  • Suman Sourav, Partha Biswas, Binbin Chen and Daisuke Mashima
    Detecting Hidden Attackers in Photovoltaic Systems using Machine Learning
    In Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm’22)
    Singapore, Dec 2022 [DOI 10.1109/SmartGridComm52983.2022.9960965]
  • Beatrice Cassottana, Partha Biswas, Bennet Ng, Srijith Balakrishnan, Daisuke Mashima. And Giovanni Sansavini
    Predicting Resilience of Interconnected Urban Infrastructure Systems
    IEEE Access
    Oct 2022 [DOI 10.1109/ACCESS.2022.3217903]
  • Balachandar Gowrisankar, Daisuke Mashima, Wen Shei Ong, Quanqi Ye, Ertem Esiner, Binbin Chen, and Zbigniew Kalbarczyk
    GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone
    In Proceedings of the IEEE International Conference on Communications and Network Security (CNS’22)
    Austin, Texas, Oct 2022 [DOI 10.1109/CNS56114.2022.9947233]
  • Utku Tefek, Ertem Esiner, Lin Wei and Yih-Chun Hu
    TASC: Transparent, Agnostic, Secure Channel for CBTC under Failure or Cyberattack
    In Proceedings of the International Conference on Reliability, Safety and Security of Railway Systems (RSSRail’22)
    Paris, France, Jun 2022 [DOI 10.1007/978-3-031-05814-1_16]
  • Heng Chuan Tan, Carmen Cheh and Binbin Chen
    CoToRu: Automatic Generation of Network Intrusion Detection Rules from Code
    In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’22)
    Virtual Conference, May 2022 [DOI 10.1109/INFOCOM48880.2022.9796697]
  • Utku Tefek, Ertem Esiner, Daisuke Mashima, Binbin Chen and Yih-Chun Hu
    Caching-based Multicast Message Authentication in Industrial Control Systems
    In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’22)
    Virtual Conference, May 2022 [DOI 10.1109/INFOCOM48880.2022.9796767]
  • Ertem Esiner, Utku Tefek, Daisuke Mashima, Binbin Chen, Yih-Chun Hu, Zbigniew Kalbarczyk and David Nicol
    LoMoS: Less-online/More-offline Signatures for Extremely Time-Critical Systems
    IEEE Transaction on Smart Grid
    Mar 2022 [pdf]
  • Xinyu Chen, Feng Cheng, Hongshi Tan, Yao Chen, Bingsheng He, Weng-Fai Wong and Deming Chen
    ThunderGP: HLS-based Graph Processing Framework on HBM-enabled FPGAs
    ACM Transactions on Reconfigurable Technology and Systems (TRETS)
    Feb 2022 [pdf]
  • Muhammad M. Roomi, Wen Shei Ong, S. M. Suhail Hussain and Daisuke Mashima
    IEC 61850 Compatible OpenPLC for Cyber Attack Case Studies on Smart Substation Systems
    IEEE Access
    Jan 2022 [pdf]
  • Muhammad M. Roomi, Wen Shei Ong, Daisuke Mashima and S.M. Suhail Hussain
    OpenPLC61850: An IEC 61850 Compatible OpenPLC for Smart Grid Research
    Elsevier SoftwareX
    Jan 2022 [pdf]
  • Xinheng Liu, Yao Chen, Junhao Pan, Jinjun Xiong and Deming Chen
    HiKonv: High Throughput Quantized Convolution With Novel Bit-wise Management And Computation
    In Proceedings of the Asia and South Pacific Design Automation Conference(ASP-DAC’22)
    Virtual Conference, Jan 2022 [DOI 10.1109/ASP-DAC52403.2022.9712553]

2021

  • Xinyu Chen, Hongshi Tan, Yao Chen, Weng-Fai Wong, Bingsheng He and Deming Chen
    Skew-Oblivious Data Routing for Data Intensive Applications on FPGAs with HLS
    In Proceedings of the Design Automation Conference (DAC’21)
    Virtual Conference, Dec 2021 [pdf]
  • Linxiang Li, Yao Chen, Pan Li, Zach Zirnheld and Cong Hao
    MELOPPR: Software/Hardware are Co-design for Memory-efficient Low-latency Personalized PageRank
    In Proceedings of the Design Automation Conference (DAC’21)
    Virtual Conference, Dec 2021 [pdf]
  • Suman Sourav and Binbin Chen
    Distort to Detect, not Affect: Detecting Stealthy Sensor Attacks with Micro-distortion
    In Proceedings of the IEEE International Conference on Communications, Control and Computing Technologies for Smart Grid (SmartGridComm’21)
    Aachen, Germany, Dec 2021 [pdf]
  • Heng Chuan Tan, Vyshnavi Mohanraj, Binbin Chen, Daisuke Mashima, Sing Kham Shing Nan and Aobo Yang
    An IEC 61850 MMS Traffic Parser for Customizable and Efficient Intrusion Detection
    In Proceedings of the IEEE International Conference on Communications, Control and Computing Technologies for Smart Grid (SmartGridComm’21)
    Aachen, Germany, Dec 2021 [pdf]
  • Muhammad Ramadan Bin Mohamad Saifuddin, David Yau and Xin Lou
    Reliability-Security Trade-Off for Distributed Reactive Power Control in Transactive Grid
    In Proceedings of the IEEE International Conference on Communications, Control and Computing Technologies for Smart Grid (SmartGridComm’21)
    Aachen, Germany, Dec 2021 [pdf]
  • Weili Yan, Xin Lou, David K.Y. Yau, Ying Yang, Huiwen Koh, Jiyan Wu and Marianne Winslett
    A Stealthier False Data Injection Attack against the Power Grid and Its Detection Using Topological Data Analysis
    To appear at the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grid (SmartGridComm’21)
  • Nils Tippenhauer, Binbin Chen, Daisuke Mashima and David Nicol
    vBump: Securing Ethernet-based Industrial Control System Networks with VLAN-based Traffic Aggregation
    In Proceedings of the 2nd Joint Workshop on CPS & IoT Security and Privacy (CPSIoTSec’21)
    Virtual Conference, Nov 2021 [pdf]
  • Xinheng Liu, Yao Chen, Cong Hao, Ashutosh Dhar and Deming Chen
    WinoCNN: Kernel Sharing Winograd Systolic Array for Efficient Convolutional Neural Network Acceleration on FPGAs
    In Proceedings of the IEEE 32nd International Conference on Applicaiton-specific Systems, Architectures and Processors (ASAP’21)
    Virtual Conference, Jul 2021 [pdf]
  • Xiaohong Chen, Minh-Thai Trinh and Grigore Rosu
    Towards a Trustworthy Semantics-Based Language Framework via Proof Generation
    In Proceedings of the International Conference on Computer-Aided Verification (CAV’21))
    Virtual Conference, Jul 2021 [pdf]
  • Hongshi Tan, Xinyu Chen, Yao Chen, Bingsheng He and Weng-Fai Wong
    ThundeRiNG: Generating Multiple Independent Random Number Sequences on FPGAs
    In Proceedings of the ACM International Conference on Supercomputing
    Virtual Conference, Jun 2021 [pdf]
  • Prakhar Ganesh, Yao Chen, Xin Lou, Mohammad Ali Khan, Yin Yang, Hassan Sajjad, Preslav Nakov, Deming Chen and Marianne Winslett
    Compressing Large-Scale Transformer-Based Models: A Case Study on BERT
    Transaction of the Association for Computational Linguistics
    Jun 2021 [pdf]
  • Muhammad Musthafa Roomi Sheik Fareed, Daisuke Mashima, Nandha Kumar and Partha Biswas
    Cyber-attack Case Studies on Dynamic Voltage Restorer in Smart Grid with Distributed Energy
    In Proceedings of the 3rd International Workshop on Artificial Intelligence and Industrial Internet-of-Things Security (AIoTS’21)
    Virtual Conference, Jun 2021 [pdf]
  • Prakhar Ganesh, Xin Lou, Yao Chen, Rui Tan, David Yau, Deming Chen and Marianne Winslett
    Learning-based Simultaneous Detection and Characterization of Time Delay Attack in Cyber-Physical Systems
    IEEE Transaction on Smart Grid
    Jan 2021 [pdf]

2020

  • Ying Yang, Xin Lou, Binbin Chen, Zbigniew Kalbarczyk and Marianne Winslett
    Identifying Failing Point Machines from Train System Event Logs
    In Proceedings of the IEEE Conference on Big Data 2020 (BigData’20)
    Virtual Conference, Dec 2020 [pdf]
  • Xiaohong Chen, Minh-Thai Trinh, Nishant Rodrigues, Lucas Pena and Grigore Rosu
    Towards a Unified Proof Framework for Automated Fixpoint Reasoning using Matching Logic
    In Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA’20)
    Virtual Conference, Nov 2020 [pdf]
  • Minh-Thai Trinh, Duc-Hiep Chu, Joxan Jaffar
    Inter-Theory Dependency Analysis for SMT String Solvers
    In Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA’20)
    Virtual Conference, Nov 2020 [pdf]
  • Muhammad M. Roomi, Partha Biswas, Daisuke Mashima, Yuting Fan and Ee-Chien Chang
    False Data Injection Cyber Range of Modernized Substation System
    In Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grid (SmartGridComm’20)
    Virtual Conference, Oct 2020 [pdf]
  • Partha Biswas, Yuan Li, Heng Chuan Tan, Daisuke Mashina and Binbin Chen
    An Attack-Trace Generating Toolchain for Cybersecurity Study of IEC 61850 based Substations
    In Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grid (SmartGridComm’20)
    Virtual Conference, Oct 2020 [pdf]
  • Dianshi Yang, Daisuke Mashima and Zhou Jianying
    DecIED: Scalable k-Anonymous Deception for IEC61850-compliant Smart Grid Systems
    In Proceedings of the 6th ACM Cyber-Physical System Security Workshop (ACM CPSS 2020)
    Virtual Conference, Oct 2020 [pdf]
  • Cheng Gong, Ye Lu, Tao Li, Cong Hao, Deming Chen and Yao Chen
    VecQ: Minimal loss DNN Model Compression with Vectorized Weight Quantization
    IEEE Transactions on Computers
    April 2020 [pdf]
  • Ruichu Cai, Zhihao Liang, Boyan Xu, Zijian Li, Yuexing Hao and Yao Chen
    TAG: Type Auxilliary Guiding for Code Comment Generation
    In Proceedings of the 2020 Annual Conference of the Association for Computational Linguistics (ACL 2020)
    Virtual Conference, July 2020 [pdf]
  • Yao Chen, Xin Long, Jiong He, Yuhang Chen, Hongshi Tan, Zhenxiang Zhang, Marianne Winslett and Deming Chen
    HaoCL: Harnessing Large-scale Heterogeneous Processors Made Easy
    In Proceedings of the International Conference on Distributed Computing System 2020 (ICDCS 2020)
    Virtual Conference, July 2020 [pdf]
  • Yuhong Li, Cong Hao, Xiaofan Zhang, Xinheng Liu, Yao Chen, Jinjun Xiong, Wen-mei Hwu and Deming Chen
    EDD: Efficient Differentiable DNN Architecture and Implementation Co-search for Embedded AI Solutions
    In Proceedings of the Design Automation Conference 2020 (DAC 2020)
    Virtual Conference, July 2020 [pdf]
  • Utku Tefek and Ertem Esiner
    Coverage Analysis of Cooperative Relaying for Urban Transportation Systems in Tunnels
    In Proceedings of the 2020 IEEE International Conference on Communications (IEEE ICC 2020)
    Virtual Conference, June 2020 [pdf]
  • Xin Lou, David Yau, Rui Tan and Peng Cheng
    Cost of Differential Privacy in Demand Reporting for Smart Grid Economic Dispatch
    IEEE Transaction on Network Science and Engineering
    February 2020 [pdf]
  • Xinyu Chen, Yao Chen, Ronak Bajaj, Jiong He, Bingsheng He, Weng-Fai Wong, Deming Chen
    Is FPGA useful for Hash Joins?
    In Proceedings of the 2020 Conference on Innovative Data Systems Research (CIDR’20)
    Amsterdam, Netherlands, January 2020 [pdf]
  • Xin Lou, Cuong Tran, Rui Tan, David K.Y. Yau, Zbigniew K., Ambarish Kumar Banerjee and Prakhar Ganesh
    Assessing and Mitigating Impact of Time Delay Attack: Case Studies for Power Grid Controls
    IEEE Journal on Selected Areas in Communications
    January 2020 [pdf]

2019

  • Partha Biswas, Hongyun Cai, Bin Zhou, Binbin Chen, Daisuke Mashima and Vincent Zheng
    Electricity Theft Pinpointing through Correlation Analysis of Master and Individual Meter Readings
    IEEE Transactions on Smart Grid
    December 2019 [pdf]
  • Daisuke Mashima, Yuan Li and Binbin Chen
    Who’s Scanning Our Smart Grid? Empirical Study on Honeypot Data
    In Proceedings of the IEEE Global Communications Conference (GLOBECOM’19)
    Waikoloa Village, USA, December 2019 [pdf]
  • Hongyun Cai, Thanh Tung Nguyen, Yan Li, Wenchen Zheng, Binbin Chen, Gao Cong and Xiaoli Li
    Modeling Marked Temporal Point Process Using Multi-relation Structure RNN
    Cognitive Computation
    November 2019 [pdf]
  • Xin Lou, Cuong Tran, David Yau, Rui Tan, Hongwei Ng, Tom Z.J. Fu and Marianne Winslett
    Learning-Based Time Delay Attack Characterization for Cyber-Physical Systems
    In Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grid (SmartGridComm’19)
    Beijing, China, October 2019 [pdf]
  • Ertem Esiner, Daisuke Mashima, Binbin Chen, Zbigniew Kalbarczyk and David Nicol
    F-Pro: a Fast and Flexible Provenance-Aware Message Authentication Scheme for Smart Grid
    In Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm’19)
    Beijing, China, October 2019 [pdf]
  • Partha Biswas, Heng Chuan Tan, Qingbo Zhu, Yuan Li, Daisuke Mashima and Binbin Chen
    A Synthesized Dataset for Cybersecurity Study of IEC 61850 based Substation
    In Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm’19)
    Beijing, China, October 2019 [pdf]
  • Walid Aljoby, Xin Wang, Tom Z. J. Fu and Richard Ma
    On SDN-Enabled Online and Dynamic Bandwidth Allocation for Stream Analytics (Extended version)
    IEEE Journal on Selected Areas in Communications
    August 2019 [pdf]
  • Yan Li, Zilong Wang, Yingjiu Li, Robert Deng, Binbin Chen, Weizhi Meng and Hui Li
    A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication
    In Proceedings of the ACM Asia Conference on Computer & Communications Security (AsiaCCS’19)
    Aukland, New Zealand, July 2019 [pdf]
  • Cheng Gong, Ye Lu, Tao Li, Xiaofan Zhang, Deming Chen and Yao Chen
    μL2Q: An Ultra-Low Loss Quantization Method for DNN Compression
    In Proceedings of the 2019 International Joint Conference on Neural Networks (IJCNN’19)
    Budapest, Hungary, July 2019 [pdf]
  • Yan Yang, Xia Yin, Xingang Shi, Zhiliang Wang, He Jiong, Tom Z.J. Fu and Marianne Winslett
    Inter-domain Routing Bottlenecks and Their Aggravation
    Elsevier Journal of Computer Networks
    June 2019 [pdf]
  • Daisuke Mashima, Ramkumar Rajendran, Bin Zhou, Binbin Chen, and Biplab Sikdar
    On Optimization of Command-Delaying for Advanced Command Authentication in Smart Grid Systems
    In Proceedings of the IEEE Power and Energy Society Innovative Smart Grid Technologies Asia (ISGT Asia’19)
    Chengdu, China, May 2019 [pdf]
  • Heng Chuan Tan, Carmen Cheh, Binbin Chen, and Daisuke Mashima
    Tabulating Cybersecurity Solutions for Substations: Towards Pragmatic Design and Planning
    In Proceedings of the IEEE Power and Energy Society Innovative Smart Grid Technologies Asia (ISGT Asia’19)
    Chengdu, China, May 2019 [pdf]
  • Xin Lou, Cuong Tran, Rui Tan, David Yau, and Zbigniew Kalbarczyk
    Assessing and Mitigating Impact of Time Delay Attack: A Case Study for Power Grid Frequency Control
    In Proceedings the 10th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS’19)
    Montreal, Canada, April 2019 [pdf]
  • Steffen Bondorf, Binbin Chen, Jonathan Scarlett, Haifeng Yu, Yuda Zhao
    Cross-Sender Bit-Mixing Coding
    In Proceedings the International Conference on Information Processing in Sensor Networks (IPSN’19)
    Montreal, Canada, April 2019 [pdf]
  • Yao Chen, Jiong He, Xiaofan Zhang, Cong Hao, Deming Chen
    Cloud-DNN: An Open Framework for Mapping DNN Models to Cloud FPGAs
    In Proceedings of 27th ACM/SIGDA International Symposium on Field-Programmable Gate Arrays (FPGA’19)
    Seaside, USA, February 2019 [pdf]

2018

  • Carmen Cheh, Ahmed Fawaz, Mohammad A. Noureddine, Binbin Chen, William Temple and William H. Sanders
    Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems
    In Proceedings of the IEEE Pacific Rim International Symposium on Dependable Computing (PRDC’18)
    Taipei, Taiwan, December 2018 [pdf]
  • Daisuke Mashima, Binbin Chen, Toby Zhou, Ramkumar Rajendran, and Biplab Sikdar
    Securing Substations through Command Authentication Using On-the-fly Simulation of Power System Dynamics
    In Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm’18)
    Aalborg, Denmark, October 2018 [pdf]
  • Walid Aljoby, Xin Wang, Tom Z. J. Fu and Richard Ma
    On SDN-Enabled Online and Dynamic Bandwidth Allocation for Stream Analytics
    In Proceedings of the IEEE International Conference on Network Protocols (ICNP’18)
    Cambridge, UK, September 2018 [pdf]
  • Jiong He, Yao Chen, Tom Z. J. Fu, Xin Long, Marianne Winslett, Liang You and Zhenjie Zhang
    HaaS: Cloud-based Real-time Data Analytics with heterogeneity-aware Scheduling
    In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS’18)
    Vienna, Austria, July 2018 [pdf]
  • Yuming Li, Rong Zhang, Xiaoyan Yang, Zhenjie Zhang and Aoying Zhou
    Touchstone: Generating Enormous Query-Aware Test Databases
    In Proceedings of the USENIX Annual Technical Conference (USENIX ATC’18)
    Boston, USA, July 2018 [pdf]
  • Ruichu Cai, Boyan Xu, Zhenjie Zhang, Xiaoyan Yang, Zijian Li and Zhihao Liang
    An Encoder-Decoder Framework Translating Natural Language to Structural Query Language
    In Proceedings of the International Joint Conference on Artificial Intelligence and European Conference on Artificial Intelligence
    (IJCAI-ECAI’18)
    Stockholm, Sweden, July 2018 [pdf]
  • Subhash Lakshminarayana and David KY Yau
    Cost-benefit analysis of moving-target defense in power grids
    In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’18)
    Luxembourg, Luxembourg, June 2018 [pdf]
  • Subhash Lakshminarayana, Jabir Shabbir Karachiwala, Sang-Yoon Chang, Girish Revadigar, Sristi Lakshmi Sravana Kumar, David KY Yau, Yih-Chun Hu
    Signal jamming attacks against communication-based train control: Attack impact and countermeasure
    In Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’18)
    Stockholm, Sweden, June 2018 [pdf]
  • Chuadhry Mujeeb Ahmed, Martin Ochoa, Jianying Zhou, Rizwan Qadeer, Carlos Murguia, Justin Ruths, and Aditya Mathur
    NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems
    In Proceedings of the ACM Asia Conference on Computer & Communications Security (AsiaCCS’18)
    Incheon, Korea, June 2018 [pdf]
  • Ahnaf Siddiqi, Nils Ole Tippenhauer, Daisuke Mashima, and Binbin Chen
    On Practical Threat Scenario Testing in an Electric Power ICS Testbed
    In Proceedings of the ACM Cyber-Physical System Security Workshop, held in conjunction with AsiaCCS (CPSS’18)
    Incheon, Korea, June 2018 [pdf]
  • Junhua Fang, Rong Zhang, Tom Z. J. Fu, Zhenjie Zhang, Aoying Zhou and Xiaofang Zhou
    Distributed Stream Rebalance for Stateful Operator Under Workload Variance
    IEEE Transactions on Parallel and Distributed Systems
    April 2018 [pdf]
  • Subhash Lakshminarayana, Fuxi Wen, David K. Y. Yau
    Trade-offs in Data-Driven False Data Injection Attacks Against the Power Grid
    In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’18)
    Calgary, Canada, April 2018 [pdf]
  • Li Wang, Ruichu Cai, Tom Z. J. Fu, Joing He, Zijie Lu, Marianne Winslett and Zhenjie Zhang
    Waterwheel: Realtime Indexing and Temporal Range Query Processing over Massive Data Streams
    In Proceedings of the IEEE International Conference on Data Engineering (ICDE’18)
    Paris, France, April 2018 [pdf]
  • Daisuke Mashima, Aidana Serikova, Yao Cheng, and Binbin Chen
    Towards Quantitative Evaluation of Privacy Protection Schemes for Electricity Usage Data Sharing
    ICT Express (Special Issue on CI & Smart Grid Cyber Security)
    January 2018 [pdf]

2017 (Trustworthy & Secure Cyber-Plexus Programme commenced Sep. 15, 2017)

  • Carmen Cheh, Ken Keefe, Brett Feddersen, Binbin Chen, William G Temple, William H Sanders
    Developing models for physical attacks in cyber-physical systems
    In Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC’17)
    Dallas, USA, November 2017 [pdf]
  • William G. Temple, Yue Wu, Binbin Chen, Zbigniew Kalbarczyk
    Systems-theoretic likelihood and severity analysis for safety and security co-engineering
    In Proceedings of the International Conference on Reliability, Safety and Security of Railway Systems (RSSRail’17)
    Pistoia, Italy, November 2017 [pdf]
  • Yao Cheng, Chang Xu, Daisuke Mashima, Vrizlynn L. L. Thing, and Yongdong Wu
    PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network
    In Proceedings of the 13th International Conference on Advanced Data Mining and Applications (ADMA’17)
    Singapore, Singapore, November 2017 [pdf]
  • Daisuke Mashima, Binbin Chen, Prageeth Gunathilaka, and Edwin Tjiong
    Towards a Grid-wide, High-fidelity Electrical Substation Honeynet
    In Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm’17)
    Dresden, Germany, October 2017 [pdf]
  • William G. Temple, Yue Wu, Binbin Chen, Zbigniew Kalbarczyk
    Reconciling systems-theoretic and component-centric methods for safety and security co-analysis
    In Proceedings of the 5th International Workshop on Assurance Cases for Software-intensive Systems (ASSURE’17)
    Trento, Italy, September 2017 [pdf]
  • Carmen Cheh, Binbin Chen, William G Temple, William H Sanders
    Data-driven model-based detection of malicious insiders via physical access logs
    In Proceedings of the International Conference on Quantitative Evaluation of Systems (QEST’17)
    Berlin, Germany, September 2017 [pdf]
  • Subhash Lakshminarayana, Teo Zhan Teng, David KY Yau, Rui Tan
    Optimal attack against cyber-physical control systems with reactive attack mitigation
    In Proceedings of the ACM International Conference on Future Energy Systems (e-Energy’17)
    Hong Kong, Hong Kong, May 2017 [pdf]
  • William G Temple, Bao Anh N Tran, Binbin Chen, Zbigniew Kalbarczyk, William H Sanders
    On train automatic stop control using balises: Attacks and a software-only countermeasure
    In Proceedings of the IEEE Pacific Rim International Symposium on Dependable Computing (PRDC’17)
    Christchurch, New Zealand, January 2017 [pdf]

2016

  • Prageeth Gunathilaka, Daisuke Mashima, and Binbin Chen
    SoftGrid: A Software-based Smart Grid Testbed for Evaluating Substation Cybersecurity Solutions
    In Proceedings of the 2nd ACM Workshop on Cyber-Physical System Security and Privacy (CPS-SPC)
    Vienna, Austria, October 2016 [pdf]
  • Sang-Yoon Chang, Shaoying Cai, Hwajung Seo, and Yih-Chun Hu
    Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications
    In Proceedings of the 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm)
    Guangzhou, China, October 2016
  • William G. Temple, Yuan Li, Bao Anh N. Tran, Yan Liu, and Binbin Chen
    Railway System Failure Scenario Analysis
    In Proceedings of the 11th International Conference on Critical Information Infrastructures Security (CRITIS)
    Paris, France, October 2016 [pdf]
  • Sristi Lakshmi Sravana Kumar, Sang-Yoon Chang, Sreejaya Viswanathan, and Yih-Chun Hu
    Demo: Free Data Communication Using Wireless Charging
    Demo at ACM International Conference on Mobile Systems, Applications, and Services (MobiSys)
    Singapore, Singapore, June 2016
  • Hitesh Padekar, Younghee Park, Hongxin Hu, and Sang-Yoon Chang
    Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks
    In Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT)
    Shanghai, China, June 2016
  • Xinshu Dong, Sumeet Jauhar, William G. Temple, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders, Nils Ole Tippenhauer, David M. Nicol.
    The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment
    In Proceedings of the 3rd International Workshop on Graphical Models for Security (GraMSec)
    Lisbon, Portugal, June 2016
  • Subhash Lakshminarayana, Zhan-Teng Teo, Rui Tan, David Yau, Pablo Arboleya
    On False Data Injection Attacks against Railway Traction Power Systems
    The 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Toulouse, France, June 28 – July 1, 2016 [pdf]
  • Uttam Ghosh, Xinshu Dong, Rui Tan, Zbigniew Kalbarczyk, David K. Y. Yau, Ravishankar K. Iyer
    A Simulation Study on Smart Grid Resilience under Software-Defined Networking Controller Failures
    The 2nd Cyber-Physical System Security Workshop (CPSS 2016), co-located with AsiaCSS. Xi’an, China, May 2016
  • Rui Tan, Hoang Hai Nguyen, Eddy. Y. S. Foo, Xinshu Dong, David K. Y. Yau, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Hoay Beng Gooi.
    Optimal False Data Injection Attack against Automatic Generation Control in Power Grids
    In Proceedings of The 7th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS)
    Vienna, Austria, April 2016 [pdf]
  • Sang-Yoon Chang, Younghee Park, Akshaya Muralidharan
    Fast Address Hopping at the Switches: Securing Access for Packet Forwarding in SDN
    In Proceedings of IEEE/IFIP Network Operations and Management Symposium (NOMS)
    Istanbul, Turkey, April 2016
  • Quyen Dinh Vu, Rui Tan, David K. Y. Yau
    On Applying Fault Detectors against False Data Injection Attacks in Cyber-Physical Control Systems
    In Proceedings of The 35th Annual IEEE International Conference on Computer Communications (INFOCOM’16)
    San Francisco, CA, USA, April 2016
  • Younghee Park, Sang-Yoon Chang, and Lavanya M. Krishnamurthy
    Watermarking for Detecting Freeloader Misbehavior in Software-Defined Networks
    In Proceedings of  IEEE International Conference on Computing, Networking and Communications (ICNC)
    Hawaii, USA, February 2016
  • Girisha De Silva, Binbin Chen, and Mun Choon Chan
    Collaborative Cellular Tail Energy Reduction: Feasibility and Fairness
    In Proceedings of The 17th International Conference on Distributed Computing and Networking (ICDCN’16)
    Singapore, January 2016

2015

  • Sang-Yoon Chang, Bao Anh N. Tran, Yih-Chun Hu, Douglas L. Jones
    Jamming with Power Boost: Leaky Waveguide Vulnerability in Train Systems
    In Proceedings of IEEE 21st  International Conference on Parallel and Distributed Systems (ICPADS)
    Melbourne, Australia, December 2015
  • Yaoqi Jia, Yue Chen, Xinshu Dong, Prateek Saxena, Jian Mao, Zhenkai Liang
    Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning
    Computers & Security
    Volume: 55, November 2015
  • Sumeet Jauhar, Binbin Chen, William G. Temple, Xinshu Dong, Zbigniew Kalbarczyk, William H. Sanders and David M. Nicol
    Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios
    In Proceedings of 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015)
    Zhangjiajie, China, November 2015 [pdf]
  • Sang-Yoon Chang, Jemin Lee, and Yih-Chun Hu
    Noah: Keyed Noise Flooding for Wireless Confidentiality
    In Proceedings of ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet)
    Cancun, Mexico, November 2015
  • Hoang Hai Nguyen, Rui Tan, David K. Y. Yau
    Impact of Signal Delay Attack on Voltage Control for Electrified Railways
    In Proceedings of IEEE Region 10 Conference (TENCON)
    Macau,  November 2015
  • Binbin Chen, Christoph Schmittner, Zhendong Ma, William G. Temple, Xinshu Dong, Douglas L. Jones, and William H. Sanders
    Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective
    In Proceedings of the 2nd International workshop on the Integration of Safety and Security Engineering (ISSE’15) co-located with International conference on computer safety, reliability & security (Safecomp’15)
    Delft, Netherlands, September 2015
  • Sang-Yoon Chang, Yih-Chun Hu, and Zhuotao Liu
    Securing Wireless Medium Access Control Against Insider Denial-of-Service Attackers
    In Proceedings of IEEE Conference on Communications and Network Security (CNS)
    Florence, Italy, September 2015
  • Binbin Chen
    Invited Paper: Integrative Security Assessment of Cyber-Physical Systems
    In Proceedings of 12th IEEE Asia Pacific Wireless Communications Symposium (IEEE VTS APWCS’15)
    Singapore, August 2015
  • Yuda Zhao, Haifeng Yu and Binbin Chen
    Near-Optimal Communication-Time Tradeoff in Fault-Tolerant Computation of Aggregate Functions
    Accepted for Publication in Springer Distributed Computing Journal
    2015
  • Rui Tan, Varun Badrinath Krishna, David K. Y. Yau, Zbigniew Kalbarczyk
    Integrity Attacks on Real-Time Pricing in Electric Power Grids
    ACM Transactions on Information and System Security (TISSEC)
    Volume: 18, Issue: 2, July 2015
  • Sheng-Yuan Chiu, Hoang Hai Nguyen, Rui Tan, David K. Y. Yau, Deokwoo Jung
    JICE: Joint Data Compression and Encryption for Wireless Energy Auditing Networks
    In Proceedings of The 12th IEEE International Conference on Sensing, Communication, and Networking (SECON)
    Seattle, USA, June 2015
  • Jongho Won, Chris Y. T. Ma, David K. Y. Yau, and Nageswara S. V. Rao
    Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach
    IEEE / ACM Transactions on Networking (ToN)
    Volume: PP, Issue: 99, May 2015
  • Xinshu Dong, Hui Lin, Rui Tan, Ravishankar K. Iyer, Zbigniew Kalbarczyk
    Software-Defined Networking for Smart Grid Resilience: Opportunities and Challenges
    In Proceedings of The 1st Cyber-Physical System Security Workshop (CPSS)
    Singapore, April 2015
  • William Zegers, Sang-Yoon Chang, Younghee Park, and Jerry Gao
    A Lightweight Encryption and Secure Protocol for Smartphone Cloud
    In Proceedings of IEEE International Workshop on Internet-based Virtual Computing (IVCE)
    San Francisco, US, April 2015
  • Chris Y. T. Ma; David K. Y. Yau
    On Information-theoretic Measures for Quantifying Privacy Protection of Time-series Data
    In Proceedings of 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
    April 2015
  • Nageswara S. V. Rao, Stephen W. Poole, Chris Y. T. Ma, Fei He, Jun Zhuang, and David K. Y. Yau
    Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
    In Proceedings of Risk Analysis
    April 2015
  • Sang-Yoon Chang, Yih-Chun Hu, and Nicola Laurenti
    SimpleMAC: A Simple Wireless MAC-Layer Countermeasure to Intelligent and Insider Jammers
    IEEE/ACM Transactions on Networking
    2015

2014

  • Jinzhu Chen, Rui Tan, Guoliang Xing, Xiaorui Wang
    PTEC: A System for Predictive Thermal and Energy Control in Data Centers
    In Proceedings of The 35th IEEE Real-Time Systems Symposium (RTSS), cyber-physical systems track
    Rome, Italy, December 2014
  • Nils Ole Tippenhauer, William G. Temple, An Hoa Vu, Binbin Chen, David M. Nicol, Zbigniew Kalbarczyk, and William H. Sanders
    Automatic Generation of Security Argument Graphs
    In Proceedings of the IEEE Pacific Rim International Symposium on Dependable Computing (PRDC’14)
    Singapore, November 2014
  • Ziling Zhou, Binbin Chen, and Haifeng Yu
    Understanding RFID Counting Protocols
    IEEE/ACM Transactions on Networking (ToN)
    Volume: PP, Issue: 99, October 2014
  • Yuda Zhao, Haifeng Yu and Binbin Chen
    Near-Optimal Communication-Time Tradeoff in Fault-Tolerant Computation of Aggregate Functions
    In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC’14)
    July 2014
  • Binbin Chen, Haifeng Yu, Yuda Zhao, and Phillip Gibbons
    The Cost of Fault Tolerance in Multi-Party Communication Complexity
    In the Journal of the ACM (JACM)
    Volume: 61, Issue: 3, May 2014
  • Hoang Hai Nguyen, Rui Tan, David K. Y. Yau
    Safety-Assured Collaborative Load Management in Smart Grids
    In Proceedings of the 5th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS’14)
    Berlin, Germany, April 2014
  • Jongho Won, Chris Y. T. Ma, David K. Y. Yau, and Nageswara S. V. Rao
    Proactive Fault-Tolerant Aggregation Protocol for Privacy-Assured Smart Metering
    In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’14)
    Toronto, Canada, April 2014
  • An Hoa Vu, Nils Ole Tippenhauer, Binbin Chen, David M. Nicol, and Zbigniew Kalbarczyk
    CyberSAGE: A Tool for Automatic Security Assessment of Cyber-Physical Systems
    In Proceedings of the International Conference on Quantitative Evaluation of SysTems (QEST’14)
    2014

2013

  • Sang-Yoon Chang, Yih-Chun Hu, and Jerry T. Chiang
    Redundancy Offset Narrow Spectrum: Countermeasure for Signal-Cancellation Based Jamming
    In Proceedings of ACM International Symposium on Mobility Management and Wireless Access (MobiWAC)
    Barcelona, Spain, November 2013
  • Rui Tan, Varun Badrinath Krishna, David K. Y. Yau, and Zbigniew Kalbarczyk
    Impact of Integrity Attacks on Real-Time Pricing in Smart Grids
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS’13)
    Berlin, Germany, November 2013
  • William G. Temple, Binbin Chen, and Nils Ole Tippenhauer
    Delay Makes a Difference: Smart Grid Resilience Under Remote Meter Disconnect Attack
    In Proceedings of the IEEE International Conference on Smart Grid Communications (SmartGridComm’13)
    Vancouver, Canada, October 2013 [pdf]
  • Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple,
    Nils Ole Tippenhauer, An Hoa Vu, and David K. Y. Yau
    Go with the Flow: Toward Workflow-Oriented Security Assessment
    In Proceedings of the New Security Paradigms Workshop (NSPW’13)
    Banff, Canada, September 2013 [pdf]
  • Xin Lou, David K. Y. Yau, Hoang Hai Nguyen, and Binbin Chen
    Profit-Optimal and Stability-Aware Load Curtailment in Smart Grids
    IEEE Transactions on Smart Grid
    Volume: 4, Issue: 3, Pages: 1411 – 1420, September 2013 [pdf]
  • Fei He, Jun Zhuang, Nageswara S. V. Rao, Chris Y. T. Ma, and David K. Y. Yau
    Game-Theoretic Resilience Analysis of Cyber-Physical Systems
    In Proceedings of the 1st IEEE International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA’13)
    Taipei, Taiwan, August 2013 [pdf]
  • Nageswara S. V. Rao, Stephen W. Poole, Chris Y. T. Ma, Fei He, Jun Zhuang, and David K. Y. Yau
    Cyber and Physical Information Fusion for Infrastructure Protection: A Game-Theoretic Approach
    In Proceedings of the International Conference on Information Fusion (Fusion’13)
    Istanbul, Turkey, July 2013
  • Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, and Srdjan Capkun
    On Limitations of Friendly Jamming for Confidentiality
    In Proceedings of the IEEE Symposium on Security and Privacy (S&P’13)
    San Francisco, CA, USA, May 2013 [pdf]
  • Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao
    Markov Game Analysis for Attack-Defense of Power Networks under Possible Misinformation
    IEEE Transactions on Power Systems
    Volume: 28, Issue: 2, Pages: 1676 – 1686, May 2013 [pdf]
  • Jerry T. Chiang and Yih-Chun Hu
    Did You Also Hear That?  Spectrum Sensing Using Hermitian Inner Product
    In Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM’13), Turin, Italy, April, 2013 [pdf]
  • Chris Y. T. Ma, David K. Y. Yau, and Nageswara S. V. Rao
    Scalable Solutions of Markov Games for Smart-Grid Infrastructure Protection
    IEEE Transactions on Smart Grid, Special Section on Smart Grid Communications Systems: Reliability, Dependability, and Performance
    Volume: 4, Issue: 1, Pages: 47 – 55, March 2013 [pdf]
  • Dennis E. Phillips, Rui Tan*, Mohammad-Mahdi Moazzami, Guoliang Xing, Jinzhu Chen, David K. Y. Yau
    Supero: A Sensor System for Unsupervised Residential Power Usage Monitoring
    In Proceedings of The 11th IEEE International Conference on Pervasive Computing and Communications (PerCom)
    San Diego, CA, USA, March  2013,  [pdf]

2012

  • Jinzhu Chen, Rui Tan, Yu Wang, Guoliang Xing, Xiaorui Wang, Xiaodong Wang, Bill Punch, Dirk Colbry
    A High-Fidelity Temperature Distribution Forecasting System for Data Centers
    In Proceedings of The 33rd IEEE Real-Time Systems Symposium (RTSS), cyber-physical systems track
    San Juan, Puerto Rico, December 2012
  • Rui Tan, Guoliang Xing, Xue Liu, Jianguo Yao, Zhaohui Yuan
    Adaptive Calibration for Fusion-based Cyber-Physical Systems
    ACM Transactions in Embedded Computing Systems (TECS)
    Volume: 11, Issue: 4, December 2012
  • Jinzhu Chen, Rui Tan, Guoliang Xing, Xiaorui Wang, Xing Fu
    Fidelity-Aware Utilization Control for Cyber-Physical Surveillance Systems
    IEEE Transactions on Parallel and Distributed Systems (TPDS), special issue on cyber-physical systems
    Volume: 23, Issue: 9, Pages: 1739 – 1751, September 2012
  • Binbin Chen, Haifeng Yu, Yuda Zhao, and Phillip Gibbons
    The Cost of Fault Tolerance in Multi-Party Communication Complexity
    In Proceedings of 31st Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC’12)
    Madeira, Portugal, July 2012 [pdf]
  • Chris Y. T. Ma, David K. Y. Yau, Xin Lou, and Nageswara S. V. Rao
    Extended Abstract: Markov Game Analysis for Attack and Defense of Power Networks
    In Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS’12) (Industrial Track)
    Singapore, June 2012 [pdf]
  • Jerry T. Chiang, Dongho Kim, and Yih-Chun Hu
    JIM-Beam: Using Spatial Randomness to Build Jamming-Resilient Wireless Flooding Networks
    In Proceedings of the Thirteenth International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’12), Hilton Head Island, SC, USA, June, 2012 [pdf]

2011

  • Nageswara S. V. Rao, Chris Y. T. Ma, and David K. Y. Yau
    On Robustness of A Class of Cyber-Physical Network Infrastructures
    In Proceedings of the 1st IEEE Workshop on Design, Modeling and Evaluation of Cyber Physical Systems (CyPhy’11), in conjunction with IEEE IWCMC
    Istanbul, Turkey, July 2011 [pdf]
  • Chris Y. T. Ma, Nageswara S. V. Rao, and David K. Y. Yau
    A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems
    In Proceedings of the 1st International Workshop on Cyber-Physical Networking Systems (CPNS’11), in conjunction with IEEE INFOCOM
    Shanghai, China, April 2011 [pdf]