Cyber-Physical Systems
2015 - 2025
Current editor(s): Yang Xiao From Taylor & Francis Journals Bibliographic data for series maintained by Chris Longhurst (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 7, issue 4, 2021
- An Optimal Intrusion Detection System using GWO-CSA-DSAE Model pp. 197-220

- Pankaj Kumar Keserwani, Mahesh Chandra Govil and Emmanuel S. Pilli
- Memory-loss resilient controller design for temporal logic constraints pp. 221-242

- Megersa Abate, W. Stuckey, L. Lerner, E. Feron and S. Coogan
Volume 7, issue 3, 2021
- Unsupervised learning of depth and ego-motion with absolutely global scale recovery from visual and inertial data sequences pp. 133-158

- Yanwen Meng, Qiyu Sun, Chongzhen Zhang and Yang Tang
- Mitigation of the spectrum sensing data falsifying attack in cognitive radio networks pp. 159-178

- Rajorshi Biswas, Jie Wu, Xiaojiang Du and Yaling Yang
- Exponential stabilisation for nonlinear PDE systems via sampled-data static output feedback control pp. 179-196

- Dongxiao Hu, Xiaona Song, Mi Wang and Junwei Lu
Volume 7, issue 2, 2021
- Leveraging the power of quantum computing for breaking RSA encryption pp. 73-92

- Moolchand Sharma, Vikas Choudhary, R. S. Bhatia, Sahil Malik, Anshuman Raina and Harshit Khandelwal
- Moving least squares approximation-based online control optimised by the team game algorithm for Duffing-Holmes chaotic problems pp. 93-113

- M. J. Mahmoodabadi
- State estimation and stabilisation of nonlinear networked control systems with mixed time-delay pp. 114-132

- Bo Zhang and Xiaoyu Su
Volume 7, issue 1, 2021
- Public goods game with the moral dual process theory pp. 1-10

- Yanbo Zhang, Zidong Chai, Xiaobo Liu, Ruonan Xing, Mengti Zhao, Danhua Li, Xinyu Zhang, Yu Hao and Aliaksei Vasilyeu
- Result attack: a privacy breaching attack for personal data through K-means algorithm pp. 11-40

- Sharath Yaji and Neelima Bayyapu
- Optimal controller design for DC microgrid based on state-dependent Riccati Equation (SDRE) approach pp. 41-72

- Erfan Shahradfar and Ahmad Fakharian
Volume 6, issue 4, 2020
- Non-linear optimal control for four-wheel omnidirectional mobile robots pp. 181-206

- G. Rigatos, K. Busawon, M. Abbaszadeh and P. Wira
- Vision-based trajectory tracking control of quadrotors using super twisting sliding mode control pp. 207-230

- Wenhui Wu, Xin Jin and Yang Tang
- Vision-based formation control of multiple UAVs with event-triggered integral sliding mode control pp. 231-251

- Siqing Chen, Xin Jin, Wenle Zhang and Yang Tang
Volume 6, issue 3, 2020
- Consensus in multi-agent systems over time-varying networks pp. 117-145

- Magdi S. Mahmoud and Mojeed Oyedeji
- Reliable exponential stabilisation for fractional-order semilinear parabolic distributed parameter systems: an LMI approach pp. 146-164

- Xiaona Song, Zhibo Wang, Mi Wang and Shuai Song
- Design and verification of improved CMERE against power analysis attacks pp. 165-179

- Hridoy Jyoti Mahanta, Abhilash Chakraborty and Ajoy Kumar Khan
Volume 5, issue 4, 2019
- A randomised scheme for secured modular exponentiation against power analysis attacks pp. 209-230

- Moushumi Barman and Hridoy Jyoti Mahanta
- Nonlinear optimal control for DC industrial microgrids pp. 231-253

- G. Rigatos, N. Zervos, P. Siano, M. Abbaszadeh, P. Wira and B. Onose
Volume 4, issue 4, 2018
- Side channel attack resistant architecture for elliptic curve cryptosystem pp. 205-215

- Pravin Zode and Raghavendra Deshmukh
- Differential flatness and boundary control for bandwidth allocation in Internet routes pp. 216-231

- G. Rigatos and P. Siano
- Enhancing cyber-physical security in manufacturing through game-theoretic analysis pp. 232-259

- Zach DeSmit, Aditya U. Kulkarni and Christian Wernz
Volume 4, issue 3, 2018
- Autonomous monitoring framework for resource-constrained environments pp. 137-155

- Sajid Nazir, Hassan Hamdoun, Fabio Verdicchio and Gorry Fairhurst
- MapTalk: mosaicking physical objects into the cyber world pp. 156-174

- Yi-Bing Lin, Min-Zheng Shieh, Yun-Wei Lin and Hsin-Ya Chen
- Formal interpretation of cyber-physical system performance with temporal logic pp. 175-203

- Gang Chen, Zachary Sabato and Zhaodan Kong
Volume 4, issue 2, 2018
- Survey: mobile sensor networks for target searching and tracking pp. 57-98

- Anders Albert and Lars Imsland
- A real-time logo detection system using data offloading on mobile devices pp. 99-115

- Jiacheng Shang and Jie Wu
- Nonlinear optimal control for a business cycles macroeconomic model of linked economies pp. 116-136

- G. Rigatos, P. Siano, V. Loia, Taniya Ghosh and A. Krawiec
Volume 4, issue 1, 2018
- Stealth path planning for a high speed torpedo-shaped autonomous underwater vehicle to approach a target ship pp. 1-16

- Jonghoek Kim, Sanghoek Kim and Youngmin Choo
- CLAM: lightweight certificateless anonymous authentication mechanism for vehicular cloud services pp. 17-38

- Yingying Yao, Xiaolin Chang, Lin Li and Runkai Yang
- An adaptive control architecture for cyber-physical system security in the face of sensor and actuator attacks and exogenous stochastic disturbances pp. 39-56

- Xu Jin, Wassim M. Haddad and Tomohisa Hayakawa
Volume 3, issue 1-4, 2017
- Distributed path planning for building evacuation guidance pp. 1-21

- Yue Zu and Ran Dai
- RFID-based smart parking management system pp. 22-41

- Eirini Eleni Tsiropoulou, John S. Baras, Symeon Papavassiliou and Surbhit Sinha
- Incomplete clustering of electricity consumption: an empirical analysis with industrial and residential datasets pp. 42-65

- Mustafa Faisal and Alvaro A. Cardenas
- An unsupervised anomaly detection approach using energy-based spatiotemporal graphical modeling pp. 66-102

- Chao Liu, Sambuddha Ghosal, Zhanhong Jiang and Soumik Sarkar
- Cooperative identification of advection–diffusion processes with spatially varying coefficients based on a multi-model structure pp. 103-120

- Jie You and Wencen Wu
- An information provision system according to residents’ indoor comfort preferences for energy conservation pp. 121-142

- Kanae Matsui
Volume 2, issue 1-4, 2016
- Two-hop communications in a cognitive radio network pp. 1-23

- Md. Mizanur Rahman, Jelena Mišić and Vojislav B. Mišić
- Adaptive control architectures for mitigating sensor attacks in cyber-physical systems pp. 24-52

- Tansel Yucelen, Wassim M. Haddad and Eric M. Feron
- Zoning based block service policy in a MAC protocol with RF recharging pp. 53-74

- Mohammad Shahnoor Islam Khan and Jelena Mišić
- Cyber-physical systems as sociotechnical systems: a view towards human–technology interaction pp. 75-109

- Vivek Kant
Volume 1, issue 2-4, 2015
- From algorithms to architectures in cyber-physical networks pp. 67-75

- Magnus Egerstedt
- Dynamic real-time scheduling for human-agent collaboration systems based on mutual trust pp. 76-90

- Xiaotian Wang, Zhenwu Shi, Fumin Zhang and Yue Wang
- Decentralised seismic tomography computing in cyber-physical sensor systems pp. 91-112

- Liang Zhao, Wen-Zhan Song, Lei Shi and Xiaojing Ye
- SHARK: sparse human action recovery with knowledge of appliances and load curve data pp. 113-131

- Guoming Tang, Kui Wu, Jingsheng Lei and Weidong Xiao
- Towards building an automated system for describing indoor floor maps for individuals with visual impairment pp. 132-159

- Devi Archana Paladugu, Qiongjie Tian, Hima Bindu Maguluri and Baoxin Li
- An energy-efficient relay node selection scheme for underwater acoustic sensor networks pp. 160-179

- Ruoyu Su, Ramachandran Venkatesan and Cheng Li
| |