Content
October 2024, Volume 10, Issue 4
- 303-317 Robust predictive path-following control of autonomous ground vehicle with input delays
by Wei Li & Yu Xie & Xiaoyuan Zhu - 318-339 Time-to-approach-based model predictive controller for autonomous vehicle safety during unexpected wheelchairs on the path
by Mhafuzul Islam & Mashrur Chowdhury & Mizanur Rahman & Zadid Khan - 340-361 Hysteretic quantised security control for PDE systems under replay attacks
by Ganghui Lu & Xiaona Song & Shuai Song - 362-386 Blockchain-based group signature for secure authentication of IoT systems in smart home environments
by Mustafa Kara & Hisham R.J. Merzeh & Muhammed Ali Aydin & Hasan Hüseyin Balik
July 2024, Volume 10, Issue 3
- 231-246 Development of a digital twin of heat energy storage and retrieval system for performance evaluation through AR-based simulation
by Bhagyesh B. Deshmukh & Vijay A. Athavale & Aditya R. Vernekar & Yash R. Katkar & Anirudha K. Jahagirdar & Yash C. Waghmare & Sachin Salunkhe & Sharad Gawade - 247-262 Dual-path recommendation algorithm based on CNN and attention-enhanced LSTM
by Huimin Li & Yongyi Cheng & Hongjie Ni & Dan Zhang - 263-282 Incremental segmented slope residential load pattern clustering based on three-stage curve profiles
by Jue Hou & Tingzhe Pan & Xinlei Cai & Xin Jin & Zijie Meng & Hongxuan Luo - 283-301 Maximum elastic scheduling of virtual machines in general graph cloud data center networks
by Yusuf Qwareeq & Abdalaziz Sawwan & Jie Wu
April 2024, Volume 10, Issue 2
- 123-175 Cooperative vehicular platooning: a multi-dimensional survey towards enhanced safety, security and validation
by Ênio Vasconcelos Filho & Ricardo Severino & Pedro M. Salgueiro dos Santos & Anis Koubaa & Eduardo Tovar - 176-196 Design of a single input control signal for fault-tolerant synchronization of fractional order hyperchaotic Lu system
by Alireza Sabaghian & Saeed Balochian & Mohammad Alishahi - 197-213 Rolling bearing fault diagnosis based on the enhanced channel attention network
by Zhongting Huang & Yongyi Chen & Jianjun Liu & Hongjie Ni & Dan Zhang - 214-230 Microgrid trading mechanism enhancement for smart contract considering reputation values
by Zhikang Wang & Wendi Wu & Zhengtian Wu & Baochuan Fu
January 2024, Volume 10, Issue 1
- 1-42 A Review of Energy Aware Cyber-Physical Systems
by Houssam Kanso & Adel Noureddine & Ernesto Exposito - 43-59 Frequency control for islanded AC microgrid based on deep reinforcement learning
by Xianggang Liu & Zhi-Wei Liu & Ming Chi & Guixi Wei - 60-83 Two-stage IDS for IoT using layered machine- and deep-learning models
by André van der Walt & Tahmid Quazi & Brett van Niekerk - 84-103 Modeling and analysis of supply chain with green product change
by Yi Yang & Chen Peng & Li Qing–Kui - 104-122 Modified light GBM based classification of malicious users in cooperative cognitive radio networks
by S Sekar & S Jeyalakshmi & S Ravikumar & D Kavitha
October 2023, Volume 9, Issue 4
- 313-337 Deep Learning Assist IoT Search Engine for Disaster Damage Assessment
by Hengshuo Liang & Lauren Burgess & Weixian Liao & Erik Blasch & Wei Yu - 338-356 A biometric-based system for unsupervised anomaly behaviour detection at the pawn shop
by Giacomo Abbattista & Michela Chimienti & Vincenzo Dentamaro & Paolo Giglio & Donato Impedovo & Giuseppe Pirlo & Giacomo Rosato - 357-375 Exponential state estimation for reaction-diffusion inertial neural networks via incomplete measurement scheme
by Xuemei Wang & Xiaona Song & Jingtao Man & Nana Wu - 376-389 Fixed-point iterative approach for solving linear Diophantine systems with bounds on the variables
by Haocheng Yu & Luyao Yang & Jinyu Dai & Baoping Jiang & Zhengtian Wu & Shuxian Zhu - 390-406 Nonlinear finite-time and fixed-time bipartite consensus tracking of multi-agent systems
by Li Lu & Bo Xiao & Tao Han
July 2023, Volume 9, Issue 3
- 193-223 Securing the cyber-physical system: a review
by M. Lydia & G. Edwin Prem Kumar & A. Immanuel Selvakumar - 224-243 Confidentiality attacks against encrypted control systems
by Amir Mohammad Naseri & Walter Lucia & Amr Youssef - 244-259 Towards an intrusion detection system for detecting web attacks based on an ensemble of filter feature selection techniques
by Deepak Kshirsagar & Sandeep Kumar - 260-272 Coordinative energy efficiency improvement of buildings based on deep reinforcement learning
by Chenguan Xu & Wenqing Li & Yao Rao & Bei Qi & Bin Yang & Zhongdong Wang - 273-312 LTL cross entropy optimisation for quadcopter task orchestration
by Christopher Banks & Samuel Coogan & Magnus Egerstedt
April 2023, Volume 9, Issue 2
- 97-121 A resilient hierarchical distributed model of a cyber physical system
by Surya B Yadav - 122-143 Transaction model and energy management optimisation method of rural microgrid
by Mengkai Chen & Baochuan Fu & Zhenping Chen & Jianhan Wu - 144-173 ProSD-EdgeIoT: Protected Cluster assisted SDWSN for Tetrad Edge-IoT by Collaborative DDoS Detection and Mitigation
by Vishnu V.M. & Manjunath P - 174-192 A Improved Subgradient Lagrangian Relaxation Algorithm for Solving the Stochastic Demand Inventory Routing Problem
by Yuan-Yuan Zhao & Qian-qian Duan
January 2023, Volume 9, Issue 1
- 1-24 A survey of video violence detection
by Huiling Yao & Xing Hu - 25-42 RNN-LSTM Based Deep Learning Model for Tor Traffic Classification
by VishnuPriya. A & Hiran Kumar Singh & SivaChaitanyaPrasad. M & JaiSivaSai. G - 43-76 Novel Authentication and Secure Trust based RPL Routing in Mobile sink supported Internet of Things
by Bandarupalli Rakesh & Parveen Sultana H - 77-96 Integral terminal sliding-mode integral backstepping adaptive control for trajectory tracking of unmanned surface vehicle
by Jiayu Dong & Meijiao Zhao & Min Cheng & Yueying Wang
October 2022, Volume 8, Issue 4
- 263-285 Finite-time observer-based trajectory tracking control of underactuated USVs using hierarchical non-singular terminal sliding mode
by Fengting Zhu & Yan Peng & Min Cheng & Jun Luo & Yueying Wang - 286-320 Flexible, decentralised access control for smart buildings with smart contracts
by Leepakshi Bindra & Kalvin Eng & Omid Ardakanian & Eleni Stroulia - 321-346 Bandwidth assessment of scheduled and unscheduled communication in hybrid networked control system
by S M A K Azad & Srinivasan Kannan
July 2022, Volume 8, Issue 3
- 173-191 Q-Learning Based Optimisation Framework for Real-Time Mixed-Task Scheduling
by Tianchuang Meng & Jin Huang & Huiqian Li & Zengkun Li & Yu Jiang & Zhihua Zhong - 192-209 A hierarchical perception decision-making framework for autonomous driving
by Ende Zhang & Jin Huang & Yue Gao & Yau Liu & Yangdong Deng - 210-232 Secure Filter for Discrete-Time Delayed Systems Subject to Cyber Attacks
by Mutaz M. Hamdan & Magdi S. Mahmoud - 233-260 Identification of Chua’s chaotic circuit parameters using penguins search optimisation algorithm
by Fouzia Maamri & Sofiane Bououden & Ilyes Boulkaibet
April 2022, Volume 8, Issue 2
- 85-110 A constraint partially observable semi-Markov decision process for the attack–defence relationships in various critical infrastructures
by Nadia Niknami & Jie Wu - 111-137 Control-based event-driven bandwidth allocation scheme for video-surveillance systems
by Gautham Nayak Seetanadi & Karl-Erik Årzen & Martina Maggio - 138-171 Optimisation model of micro grid dispatching for smart building cluster based on blockchain
by Sheng Zhao & Zhengtian Wu
January 2022, Volume 8, Issue 1
- 1-31 SEVA: Secure E-Voting Application in Cyber Physical System
by Rahul Johari & Arvinder Kaur & Mohammad Hashim & Prateek Kumar Rai & Kanika Gupta - 32-44 Indel-K2P: a modified Kimura 2 Parameters (K2P) model to incorporate insertion and deletion (Indel) information in phylogenetic analysis
by Asim Kumar Mahadani & Shashank Awasthi & Goutam Sanyal & Partha Bhattacharjee & Sanjeev Pippal - 45-66 Computational intelligence paradigm for job shop scheduling and routing in an uncertain environment
by Suresh Chavhan & Joel J. P. C. Rodrigues & Ashish Khanna - 67-84 A rail detection algorithm for accurate recognition of train fuzzy video
by Bin Wang & Zhen Wang & Dou Zhao & Xuhai Wang
October 2021, Volume 7, Issue 4
- 197-220 An Optimal Intrusion Detection System using GWO-CSA-DSAE Model
by Pankaj Kumar Keserwani & Mahesh Chandra Govil & Emmanuel S. Pilli - 221-242 Memory-loss resilient controller design for temporal logic constraints
by M. Abate & W. Stuckey & L. Lerner & E. Feron & S. Coogan
July 2021, Volume 7, Issue 3
- 133-158 Unsupervised learning of depth and ego-motion with absolutely global scale recovery from visual and inertial data sequences
by Yanwen Meng & Qiyu Sun & Chongzhen Zhang & Yang Tang - 159-178 Mitigation of the spectrum sensing data falsifying attack in cognitive radio networks
by Rajorshi Biswas & Jie Wu & Xiaojiang Du & Yaling Yang - 179-196 Exponential stabilisation for nonlinear PDE systems via sampled-data static output feedback control
by Dongxiao Hu & Xiaona Song & Mi Wang & Junwei Lu
April 2021, Volume 7, Issue 2
- 73-92 Leveraging the power of quantum computing for breaking RSA encryption
by Moolchand Sharma & Vikas Choudhary & R. S. Bhatia & Sahil Malik & Anshuman Raina & Harshit Khandelwal - 93-113 Moving least squares approximation-based online control optimised by the team game algorithm for Duffing-Holmes chaotic problems
by M. J. Mahmoodabadi - 114-132 State estimation and stabilisation of nonlinear networked control systems with mixed time-delay
by Bo Zhang & Xiaoyu Su
January 2021, Volume 7, Issue 1
- 1-10 Public goods game with the moral dual process theory
by Yanbo Zhang & Zidong Chai & Xiaobo Liu & Ruonan Xing & Mengti Zhao & Danhua Li & Xinyu Zhang & Yu Hao & Aliaksei Vasilyeu - 11-40 Result attack: a privacy breaching attack for personal data through K-means algorithm
by Sharath Yaji & Neelima Bayyapu - 41-72 Optimal controller design for DC microgrid based on state-dependent Riccati Equation (SDRE) approach
by Erfan Shahradfar & Ahmad Fakharian
October 2020, Volume 6, Issue 4
- 181-206 Non-linear optimal control for four-wheel omnidirectional mobile robots
by G. Rigatos & K. Busawon & M. Abbaszadeh & P. Wira - 207-230 Vision-based trajectory tracking control of quadrotors using super twisting sliding mode control
by Wenhui Wu & Xin Jin & Yang Tang - 231-251 Vision-based formation control of multiple UAVs with event-triggered integral sliding mode control
by Siqing Chen & Xin Jin & Wenle Zhang & Yang Tang
July 2020, Volume 6, Issue 3
- 117-145 Consensus in multi-agent systems over time-varying networks
by Magdi S. Mahmoud & Mojeed Oyedeji - 146-164 Reliable exponential stabilisation for fractional-order semilinear parabolic distributed parameter systems: an LMI approach
by Xiaona Song & Zhibo Wang & Mi Wang & Shuai Song - 165-179 Design and verification of improved CMERE against power analysis attacks
by Hridoy Jyoti Mahanta & Abhilash Chakraborty & Ajoy Kumar Khan
October 2019, Volume 5, Issue 4
- 209-230 A randomised scheme for secured modular exponentiation against power analysis attacks
by Moushumi Barman & Hridoy Jyoti Mahanta - 231-253 Nonlinear optimal control for DC industrial microgrids
by G. Rigatos & N. Zervos & P. Siano & M. Abbaszadeh & P. Wira & B. Onose
October 2018, Volume 4, Issue 4
- 205-215 Side channel attack resistant architecture for elliptic curve cryptosystem
by Pravin Zode & Raghavendra Deshmukh - 216-231 Differential flatness and boundary control for bandwidth allocation in Internet routes
by G. Rigatos & P. Siano - 232-259 Enhancing cyber-physical security in manufacturing through game-theoretic analysis
by Zach DeSmit & Aditya U. Kulkarni & Christian Wernz
July 2018, Volume 4, Issue 3
- 137-155 Autonomous monitoring framework for resource-constrained environments
by Sajid Nazir & Hassan Hamdoun & Fabio Verdicchio & Gorry Fairhurst - 156-174 MapTalk: mosaicking physical objects into the cyber world
by Yi-Bing Lin & Min-Zheng Shieh & Yun-Wei Lin & Hsin-Ya Chen - 175-203 Formal interpretation of cyber-physical system performance with temporal logic
by Gang Chen & Zachary Sabato & Zhaodan Kong
April 2018, Volume 4, Issue 2
- 57-98 Survey: mobile sensor networks for target searching and tracking
by Anders Albert & Lars Imsland - 99-115 A real-time logo detection system using data offloading on mobile devices
by Jiacheng Shang & Jie Wu - 116-136 Nonlinear optimal control for a business cycles macroeconomic model of linked economies
by G. Rigatos & P. Siano & V. Loia & T. Ghosh & A. Krawiec
January 2018, Volume 4, Issue 1
- 1-16 Stealth path planning for a high speed torpedo-shaped autonomous underwater vehicle to approach a target ship
by Jonghoek Kim & Sanghoek Kim & Youngmin Choo - 17-38 CLAM: lightweight certificateless anonymous authentication mechanism for vehicular cloud services
by Yingying Yao & Xiaolin Chang & Lin Li & Runkai Yang - 39-56 An adaptive control architecture for cyber-physical system security in the face of sensor and actuator attacks and exogenous stochastic disturbances
by Xu Jin & Wassim M. Haddad & Tomohisa Hayakawa
October 2017, Volume 3, Issue 1-4
- 1-21 Distributed path planning for building evacuation guidance
by Yue Zu & Ran Dai - 22-41 RFID-based smart parking management system
by Eirini Eleni Tsiropoulou & John S. Baras & Symeon Papavassiliou & Surbhit Sinha - 42-65 Incomplete clustering of electricity consumption: an empirical analysis with industrial and residential datasets
by Mustafa Faisal & Alvaro A. Cardenas - 66-102 An unsupervised anomaly detection approach using energy-based spatiotemporal graphical modeling
by Chao Liu & Sambuddha Ghosal & Zhanhong Jiang & Soumik Sarkar - 103-120 Cooperative identification of advection–diffusion processes with spatially varying coefficients based on a multi-model structure
by Jie You & Wencen Wu - 121-142 An information provision system according to residents’ indoor comfort preferences for energy conservation
by Kanae Matsui
October 2016, Volume 2, Issue 1-4
- 1-23 Two-hop communications in a cognitive radio network
by Md. Mizanur Rahman & Jelena Mišić & Vojislav B. Mišić - 24-52 Adaptive control architectures for mitigating sensor attacks in cyber-physical systems
by Tansel Yucelen & Wassim M. Haddad & Eric M. Feron - 53-74 Zoning based block service policy in a MAC protocol with RF recharging
by Mohammad Shahnoor Islam Khan & Jelena Mišić - 75-109 Cyber-physical systems as sociotechnical systems: a view towards human–technology interaction
by Vivek Kant
October 2015, Volume 1, Issue 2-4
- 67-75 From algorithms to architectures in cyber-physical networks
by Magnus Egerstedt - 76-90 Dynamic real-time scheduling for human-agent collaboration systems based on mutual trust
by Xiaotian Wang & Zhenwu Shi & Fumin Zhang & Yue Wang - 91-112 Decentralised seismic tomography computing in cyber-physical sensor systems
by Liang Zhao & Wen-Zhan Song & Lei Shi & Xiaojing Ye - 113-131 SHARK: sparse human action recovery with knowledge of appliances and load curve data
by Guoming Tang & Kui Wu & Jingsheng Lei & Weidong Xiao - 132-159 Towards building an automated system for describing indoor floor maps for individuals with visual impairment
by Devi Archana Paladugu & Qiongjie Tian & Hima Bindu Maguluri & Baoxin Li - 160-179 An energy-efficient relay node selection scheme for underwater acoustic sensor networks
by Ruoyu Su & Ramachandran Venkatesan & Cheng Li