Haibo Zeng

ORCID: 0000-0003-1162-759X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Real-Time Systems Scheduling
  • Embedded Systems Design Techniques
  • Formal Methods in Verification
  • Parallel Computing and Optimization Techniques
  • Distributed systems and fault tolerance
  • Petri Nets in System Modeling
  • Transportation Planning and Optimization
  • Transportation and Mobility Innovations
  • Electric Vehicles and Infrastructure
  • Vehicle emissions and performance
  • Interconnection Networks and Systems
  • Vehicular Ad Hoc Networks (VANETs)
  • IoT and Edge/Fog Computing
  • Distributed and Parallel Computing Systems
  • Advanced Battery Technologies Research
  • Network Traffic and Congestion Control
  • Smart Grid Energy Management
  • Software Reliability and Analysis Research
  • Traffic control and management
  • Optimization and Search Problems
  • Vehicle Routing Optimization Methods
  • Software-Defined Networks and 5G
  • Network Time Synchronization Technologies
  • Advanced Software Engineering Methodologies
  • Scheduling and Optimization Algorithms

Virginia Tech
2016-2025

University of Maryland, College Park
2023-2024

Purdue University West Lafayette
2023-2024

École Polytechnique Fédérale de Lausanne
2023

National University
2018

Nanjing University of Science and Technology
2017

McGill University
2011-2014

University of Virginia
2014

Robotic Technology (United States)
2012

Technische Universität Braunschweig
2012

Workplace electric vehicle (EV) charging is now supported by more and companies to encourage EV adoption. In the meantime, renewable energies are becoming an important power source. To participate in day-ahead market, decisions have be made before knowing actual demand. This paper addresses challenges of energy scheduling office buildings integrated with photovoltaic systems workplace charging. It proposes leverage market time-of-use electricity, uses stochastic programming address...

10.1109/tte.2017.2659626 article EN IEEE Transactions on Transportation Electrification 2017-01-25

Automotive in-vehicle systems are distributed consisting of multiple ECUs (Electronic Control Units) interconnected with a broadcast network such as FlexRay. Message authentication is an effective mechanism to prevent attackers from injecting malicious messages into the network. In order reduce timing interference message operations on application tasks, hardware coprocessors in form either FPGA or ASIC adopted offload computation-intensive cryptographic algorithms ECU. However, it may not...

10.1109/tpds.2016.2520949 article EN IEEE Transactions on Parallel and Distributed Systems 2016-01-22

The Controller Area Network (CAN) is a ubiquitous bus protocol present in the Electrical/Electronic (E/E) systems of almost all vehicles. It vulnerable to range attacks once attacker gains access through vehicle’s attack surface. We address problem Intrusion Detection on CAN and series methods based two classifiers trained with Auxiliary Classifier Generative Adversarial (ACGAN) detect assign fine-grained labels Known Attacks also Unknown Attack class dataset containing mixture (Normal +...

10.1145/3540198 article EN ACM Transactions on Embedded Computing Systems 2022-06-03

The need to reduce greenhouse gases from our current power systems accelerates the integration of renewable energy sources (for example, wind and solar power). A fundamental difficulty is that usually high variability. Numerous advancements in technologies methods for smart grid are required mitigate absorb this In paper, we focus on one them: how plan farms with capacity low variability locally distributedly. First, study characteristics both resource turbines propose a novel estimation...

10.1109/jproc.2014.2359448 article EN Proceedings of the IEEE 2014-10-14

The advancing machine learning techniques have been widely applied to data-driven dynamic stability assessment (DSA) in modern smart grids. However, how extract critical spatial-temporal features from wide-area system dynamics still remains an open issue. Emphasizing on short-term voltage (SVS) assessment, this paper develops a novel sequential feature approach address problem two steps. First, based visualized contours, it tactfully constructs comprehensive sequence model dynamically...

10.1109/tii.2018.2873605 article EN IEEE Transactions on Industrial Informatics 2018-10-04

With the rapid growth of connectivity and autonomy for today’s automobiles, their security vulnerabilities are becoming one most urgent concerns in automotive industry. The lack message authentication Controller Area Network (CAN), which is popular in-vehicle communication protocol, makes it susceptible to cyber attack. It has been demonstrated that remote attackers can take over maneuver vehicles after getting access CAN, poses serious safety threats public. To mitigate this issue, we...

10.1145/3362034 article EN ACM Transactions on Embedded Computing Systems 2019-11-15

Heterogeneous computing systems are being increasingly deployed on time-critical applications, where tasks need to meet execution deadlines and the energy consumption is be minimized. Dynamic voltage frequency scaling (DVFS) has been widely applied for saving devices. Unfortunately, DVFS may introduce transient errors shorten processor lifetime. There also time overhead when making switching. In this article, we investigate scheduling approaches—that independent of, or weakly dependent...

10.1109/tcad.2021.3049688 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2021-01-07

In the design of time-critical applications, schedulability analysis is used to define feasibility region tasks with deadlines, so that optimization techniques can find best solution within timing constraints. The formulation based on response time calculation requires many integer variables and too complex for solvers. Approximation have been a convex subset region, in conjunction branch bound approach compute suboptimal solutions optimal task period selection, priority assignment, or...

10.1109/tc.2012.21 article EN IEEE Transactions on Computers 2012-01-17

Today’s safety-critical Cyber-Physical Systems (CPS) often need to integrate multiple diverse applications with varying levels of importance, or criticality. Mixed-criticality scheduling (MCS) has been proposed the objectives achieving certification at criticality and efficient utilization hardware resources. Current work on MCS typically assumes tasks different are independent do not share any resources (data). We propose highest-locker criticality, priority-ceiling protocol (HLC-PCP),...

10.1109/les.2013.2273352 article EN IEEE Embedded Systems Letters 2013-07-15

Mixed-Criticality Scheduling (MCS) is an effective approach to addressing diverse certification requirements of safety-critical systems that integrate multiple subsystems with different levels criticality. Preemption Threshold (PTS) a well-known technique for controlling the degree preemption, ranging from fully-preemptive fully-non-preemptive scheduling. We present schedulability analysis algorithms enable integration PTS MCS, in order bring rich benefits into including minimizing...

10.5555/2485288.2485324 article EN Design, Automation, and Test in Europe 2013-03-18

Mixed-criticality systems (MCS) integrate components from different levels of criticality onto the same platform. MCS, like all other electronic systems, are susceptible to transient faults. These must mitigate effects faults and provide recovery mechanisms when occur. In this paper, we consider problem designing scheduling certifiable fault-tolerant mixed-criticality systems. To address certification faults, two-mode models treat any single overrun or fault as a combination two, reserving...

10.3850/9783981537079_0312 article EN 2016-01-01

FlexRay is a new communication protocol for automotive systems, providing support transmission of periodic messages in static segments and priority-based scheduling event-triggered dynamic segments. The design schedule not an easy task because constraints demands extensibility flexibility. We study the problem bus from perspective application designer, interested optimizing performance related timing metrics or extensibility. provide solutions different policies on existing industry...

10.1145/1629911.1630133 article EN 2009-07-26

Due to their safety-critical nature, cyber-physical systems (CPS) must tolerate faults and security attacks remain fail-operational. However, conventional techniques for improving safety, such as testing validation, do not meet this requirement, shown by many of the real-world system failures in recent years, often with major economic public-safety implications. We aim improve safety critical CPS through synthesis runtime enforcers, named guards, which are reactive components attached...

10.1145/3061639.3072957 article EN 2017-06-13

In the development of real-time embedded applications, especially those on systems-on-chip, an efficient use RAM memory is as important effective scheduling computation resources. The protection communication and state variables accessed by concurrent tasks must provide schedulability guarantees while using least amount memory. Several schemes, including preemption thresholds, have been developed to improve save stack space selectively disabling preemption. However, design synthesis problem...

10.1145/2632160 article EN ACM Transactions on Embedded Computing Systems 2014-07-23

Memory is a limited resource in cost-sensitive, resource-constrained embedded applications. Preemption Threshold Scheduling (PTS) well-known technique for reducing the system stack size requirement. We consider Global Fixed Priority with (gFPPT), as integration of PTS global Fixed-Priority scheduling on homogeneous multiprocessor platform, and formulate optimization problem minimizing requirement while guaranteeing schedulability. present schedulability analysis, algorithms priority...

10.1109/tpds.2016.2528978 article EN IEEE Transactions on Parallel and Distributed Systems 2016-02-11

The implementation of AUTOSAR runnables as a set concurrent tasks requires the protection shared communication and state variables implementing interface internal ports. In addition, in model-based design flow, results model validation verification are retained only if code preserves semantic properties interest. Since does not support modeling behavior runnables, most likely candidate for development functions is Simulink, which based on Synchronous Reactive semantics. Commercial generation...

10.1109/sies.2011.5953656 article EN 2011-06-01

Multicore platforms are increasingly used in real-time embedded applications. In control systems, including automotive, avionics, and automation, resources shared by tasks on different cores need to be protected mechanisms that guarantee access a mutually exclusive way with bounded worst case blocking time. The evaluation of the tradeoffs among possible protocols for mutual exclusion requires an estimate their implementation overheads. this paper, we summarize protection provide code...

10.1109/tii.2013.2290585 article EN IEEE Transactions on Industrial Informatics 2013-11-19

The adoption of AUTOSAR in the development automotive electronics can increase portability and reuse functional components. Inside each component, behavior is represented by a set runnables, defining reactions executed response to an event or periodic computations. implementation runnables concurrent program executing as tasks reveals several issues trade-offs because need protect communication state variables, guarantee deadlines preserve flow semantics model objective using least possible...

10.1109/sies.2012.6356578 article EN 2012-06-01

Embedded systems in several domains such as avionics and automotive are subject to inspection from certification authorities. These authorities interested verifying the safety-critical aspects of a system and, typically, do not certify non-critical parts. The design Mixed-Criticality Systems (MCS) has received increasing attention recent years. However, although MCS must be designed overcome transient faults, their susceptibility faults is often overlooked. In this paper, we consider problem...

10.1109/tc.2017.2762293 article EN IEEE Transactions on Computers 2017-10-12
Coming Soon ...