Biblio

Found 4176 results

Filters: First Letter Of Last Name is M  [Clear All Filters]
2015-04-04
Munindar P. Singh.  2015.  Norms as a Basis for Governing Sociotechnical Systems: Extended Abstract. Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI). :1–5.

We understand a sociotechnical system as a microsociety in which autonomous parties interact with and about technical objects.  We define governance as the administration of such a system by its participants.  We develop an approach for governance based on a computational representation of norms.  Our approach has the benefit of capturing stakeholder needs precisely while yielding adaptive resource allocation in the face of changes both in stakeholder needs and the environment.  In current work, we are extending this approach to tackle some challenges in cybersecurity.

Extended abstract appearing in the IJCAI Journal Abstracts Track

2015-04-07
Munindar P. Singh.  2015.  Norms as a Basis for Governing Sociotechnical Systems: Extended Abstract. Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI). :1–5.

We understand a sociotechnical system as a microsociety in which autonomous parties interact with and about technical objects.  We define \emph{governance} as the administration of such a system by its participants.  We develop an approach for governance based on a computational representation of norms.  Our approach has the benefit of capturing stakeholder needs precisely while yielding adaptive resource allocation in the face of changes both in stakeholder needs and the environment.  In current work, we are extending this approach to tackle some challenges in cybersecurity.

Extended abstract appearing in the IJCAI Journal Abstracts Track

Munindar P. Singh.  2015.  Norms as a Basis for Governing Sociotechnical Systems: Extended Abstract. Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI). :1–5.

We understand a sociotechnical system as a microsociety in which autonomous parties interact with and about technical objects.  We define governance as the administration of such a system by its participants. We develop an approach for governance based on a computational representation of norms.  Our approach has the benefit of capturing stakeholder needs precisely while yielding adaptive resource allocation in the face of changes both in stakeholder needs and the environment. In current work, we are extending this approach to tackle some challenges in cybersecurity.

Extended abstract appearing in the IJCAI Journal Abstracts Track

2018-05-27
M. Rungger, P. Tabuada.  2015.  A Notion of Robustness for Cyber-Physical Systems. IEEE Transactions on Automatic Control. PP:1-1.
Zhou, Yuchen, Maity, Dipankar, Baras, John S.  2015.  Optimal mission planner with timed temporal logic constraints. Control Conference (ECC), 2015 European. :759–764.
2018-05-17
2018-06-04
Malikopoulos, Andreas, Zhang, Tao, Heaslip, Kevin, Fehr, Walton.  2015.  Panel 2: Connected electrified vehicles and cybersecurity. Transportation Electrification Conference and Expo (ITEC), 2015 IEEE. :1–1.
2018-03-29
Zhang, Desheng, He, Tian, Lin, Shan, Munir, Sirajum, Stankovic, John A.  2015.  pCruise: Online Cruising Mile Reduction for Large-Scale Taxicab Networks. IEEE Transactions on Parallel and Distributed Systems. :}keywords={TPDS.
2015-11-12
Xia, Weiyi, Kantarcioglu, Murat, Wan, Zhiyu, Heatherly, Raymond, Vorobeychik, Yevgeniy, Malin, Bradley.  2015.  Process-Driven Data Privacy. Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. :1021–1030.

The quantity of personal data gathered by service providers via our daily activities continues to grow at a rapid pace. The sharing, and the subsequent analysis of, such data can support a wide range of activities, but concerns around privacy often prompt an organization to transform the data to meet certain protection models (e.g., k-anonymity or E-differential privacy). These models, however, are based on simplistic adversarial frameworks, which can lead to both under- and over-protection. For instance, such models often assume that an adversary attacks a protected record exactly once. We introduce a principled approach to explicitly model the attack process as a series of steps. Specically, we engineer a factored Markov decision process (FMDP) to optimally plan an attack from the adversary's perspective and assess the privacy risk accordingly. The FMDP captures the uncertainty in the adversary's belief (e.g., the number of identied individuals that match the de-identified data) and enables the analysis of various real world deterrence mechanisms beyond a traditional protection model, such as a penalty for committing an attack. We present an algorithm to solve the FMDP and illustrate its efficiency by simulating an attack on publicly accessible U.S. census records against a real identied resource of over 500,000 individuals in a voter registry. Our results demonstrate that while traditional privacy models commonly expect an adversary to attack exactly once per record, an optimal attack in our model may involve exploiting none, one, or more indiviuals in the pool of candidates, depending on context.

2017-03-08
Allen, J. H., Curtis, P. D., Mehravari, N., Crabb, G..  2015.  A proven method for identifying security gaps in international postal and transportation critical infrastructure. 2015 IEEE International Symposium on Technologies for Homeland Security (HST). :1–5.

The safety, security, and resilience of international postal, shipping, and transportation critical infrastructure are vital to the global supply chain that enables worldwide commerce and communications. But security on an international scale continues to fail in the face of new threats, such as the discovery by Panamanian authorities of suspected components of a surface-to-air missile system aboard a North Korean-flagged ship in July 2013 [1].This reality calls for new and innovative approaches to critical infrastructure security. Owners and operators of critical postal, shipping, and transportation operations need new methods to identify, assess, and mitigate security risks and gaps in the most effective manner possible.

2018-05-11
Kunihisa Okano, Masashi Wakaiki, João Pedro Hespanha.  2015.  Real-time Control under Clock Offsets between Sensors and Controllers. Proc. of the 18th Int. Conf. on Hybrid Systems: Computation and Control (HSCC 2015)" month = "Apr..
2018-05-25
Symington, Andrew, Medvesek, Jan, Martin, Paul, Srivastava, Mani, Hailes, Stephen.  2015.  Real-time Indoor Localization using Magnetic, Time of Flight, and Signal Strength Inference Maps. Indoor Location Competition at the ACM/IEEE Information Processing in Sensor Networks (IPSN).
2018-05-23
2018-05-14
David Broman, Lev Greenberg, Edward A. Lee, Michael Masin, Stavros Tripakis, Michael Wetter.  2015.  Requirements for hybrid cosimulation standards. Proceedings of the 18th International Conference on Hybrid Systems: Computation and Control, HSCC'15, Seattle, WA, USA, April 14-16, 2015. :179–188.
2018-05-17
Botha, Hermanus V., Boddhu, Sanjay K., McCurdy, Helena B., Gallagher, John C., Matson, Eric T., Kim, Yongho.  2015.  A Research Platform for Flapping Wing Micro Air Vehicle Control Study. Robot Intelligence Technology and Applications 3: Results from the 3rd International Conference on Robot Intelligence Technology and Applications. :135–150.

The split-cycle constant-period frequency modulation for flapping wing micro air vehicle control in two degrees of freedom has been proposed and its theoretical viability has been demonstrated in previous work. Further consecutive work on developing the split-cycle based physical control system has been targeted towards providing on-the-fly configurability of all the theoretically possible split-cycle wing control parameters with high fidelity on a physical Flapping Wing Micro Air Vehicle (FWMAV). Extending the physical vehicle and wing-level control modules developed previously, this paper provides the details of the FWMAV platform, that has been designed and assembled to aid other researchers interested in the design, development and analysis of high level flapping flight controllers. Additionally, besides the physical vehicle and the configurable control module, the platform provides numerous external communication access capabilities to conduct and validate various sensor fusion study for flapping flight control.

2018-05-27
Martin, William C, Wu, Albert, Geyer, Hartmut.  2015.  Robust spring mass model running for a physical bipedal robot. Robotics and Automation (ICRA), 2015 IEEE International Conference on. :6307–6312.
2018-05-25
Luong, Anh, Madsen, Spencer, Empey, Michael, Patwari, Neal.  2015.  Rubreathing: non-contact real time respiratory rate monitoring system. Proceedings of the 14th International Conference on Information Processing in Sensor Networks. :412–413.
2017-03-08
Yasrebi, P., Monfared, S., Bannazadeh, H., Leon-Garcia, A..  2015.  Security function virtualization in software defined infrastructure. 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM). :778–781.

In this paper we present an approach to implement security as a Virtualized Network Function (VNF) that is implemented within a Software-Defined Infrastructure (SDI). We present a scalable, flexible, and seamless design for a Deep Packet Inspection (DPI) system for network intrusion detection and prevention. We discuss how our design introduces significant reductions in both capital and operational expenses (CAPEX and OPEX). As proof of concept, we describe an implementation for a modular security solution that uses the SAVI SDI testbed to first detect and then block an attack or to re-direct it to a honey-pot for further analysis. We discuss our testing methodology and provide measurement results for the test cases where an application faces various security attacks.

2016-04-08
Mathieu Dahan, Saurabh Amin.  2015.  Security Games in Network Flow Problems. CoRR. abs/1512.09335

This paper considers a 2-player strategic game for network routing under link disruptions. Player 1 (defender) routes flow through a network to maximize her value of effective flow while facing transportation costs. Player 2 (attacker) simultaneously disrupts one or more links to maximize her value of lost flow but also faces cost of disrupting links. This game is strategically equivalent to a zero-sum game. Linear programming duality and the max-flow min-cut theorem are applied to obtain properties that are satisfied in any mixed Nash equilibrium. In any equilibrium, both players achieve identical payoffs. While the defender's expected transportation cost decreases in attacker's marginal value of lost flow, the attacker's expected cost of attack increases in defender's marginal value of effective flow. Interestingly, the expected amount of effective flow decreases in both these parameters. These results can be viewed as a generalization of the classical max-flow with minimum transportation cost problem to adversarial environments.

2017-03-07
Puttonen, J., Afolaranmi, S. O., Moctezuma, L. G., Lobov, A., Lastra, J. L. M..  2015.  Security in Cloud-Based Cyber-Physical Systems. 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC). :671–676.

Cyber-physical systems combine data processing and physical interaction. Therefore, security in cyber-physical systems involves more than traditional information security. This paper surveys recent research on security in cloud-based cyber-physical systems. In addition, this paper especially analyzes the security issues in modern production devices and smart mobility services, which are examples of cyber-physical systems from different application domains.

2018-05-16
C. Nowzari, J. Cortes.  2015.  Self-triggered and team-triggered control of networked cyber-physical systems. Event-Based Control and Signal Processing. :203-220.

This chapter describes triggered control approaches for the coordination of networked cyber-physical systems. Given the coverage of the other chapters of this book, our focus is on self-triggered control and a novel approach we term team-triggered control.

2015-11-17
Zhenqi Huang, University of Illinois at Urbana-Champaign, Chuchu Fan, University of Illinois at Urbana-Champaign, Alexandru Mereacre, University of Oxford, Sayan Mitra, University of Illinois at Urbana-Champaign, Marta Kwiatkowska, University of Oxford.  2015.  Simulation-based Verification of Cardiac Pacemakers with Guaranteed Coverage. Special Issue of IEEE Design and Test. 32(5)

Design and testing of pacemaker is challenging because of the need to capture the interaction between the physical processes (e.g. voltage signal in cardiac tissue) and the embedded software (e.g. a pacemaker). At the same time, there is a growing need for design and certification methodologies that can provide quality assurance for the embedded software. We describe recent progress in simulation-based techniques that are capable of ensuring guaranteed coverage. Our methods employ discrep- ancy functions, which impose bounds on system dynamics, and proceed through iteratively constructing over-approximations of the reachable set of states. We are able to prove time bounded safety or produce counterexamples. We illustrate the techniques by analyzing a family of pacemaker designs against time duration requirements and synthesize safe parameter ranges. We conclude by outlining the potential uses of this technology to improve the safety of medical device designs.

2018-05-15
Maria Castano, Xiaobo Tan.  2015.  Simultaneous stabilization of pitch and yaw of a gliding robotic fish using sliding mode control. Proceedings of the 2015 ASME Dynamic Systems and Control Conference. :DSCC2015-9915.
2018-07-06
Mozaffari-Kermani, M., Sur-Kolay, S., Raghunathan, A., Jha, N. K..  2015.  Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare. IEEE Journal of Biomedical and Health Informatics. 19:1893–1905.

Machine learning is being used in a wide range of application domains to discover patterns in large datasets. Increasingly, the results of machine learning drive critical decisions in applications related to healthcare and biomedicine. Such health-related applications are often sensitive, and thus, any security breach would be catastrophic. Naturally, the integrity of the results computed by machine learning is of great importance. Recent research has shown that some machine-learning algorithms can be compromised by augmenting their training datasets with malicious data, leading to a new class of attacks called poisoning attacks. Hindrance of a diagnosis may have life-threatening consequences and could cause distrust. On the other hand, not only may a false diagnosis prompt users to distrust the machine-learning algorithm and even abandon the entire system but also such a false positive classification may cause patient distress. In this paper, we present a systematic, algorithm-independent approach for mounting poisoning attacks across a wide range of machine-learning algorithms and healthcare datasets. The proposed attack procedure generates input data, which, when added to the training set, can either cause the results of machine learning to have targeted errors (e.g., increase the likelihood of classification into a specific class), or simply introduce arbitrary errors (incorrect classification). These attacks may be applied to both fixed and evolving datasets. They can be applied even when only statistics of the training dataset are available or, in some cases, even without access to the training dataset, although at a lower efficacy. We establish the effectiveness of the proposed attacks using a suite of six machine-learning algorithms and five healthcare datasets. Finally, we present countermeasures against the proposed generic attacks that are based on tracking and detecting deviations in various accuracy metrics, and benchmark their effectiveness.

2018-05-25