- Real-Time Systems Scheduling
- Formal Methods in Verification
- Embedded Systems Design Techniques
- Petri Nets in System Modeling
- Adversarial Robustness in Machine Learning
- Healthcare Technology and Patient Monitoring
- Software Testing and Debugging Techniques
- Software Reliability and Analysis Research
- Parallel Computing and Optimization Techniques
- Safety Systems Engineering in Autonomy
- Distributed systems and fault tolerance
- Anomaly Detection Techniques and Applications
- Model-Driven Software Engineering Techniques
- Fault Detection and Control Systems
- Advanced Software Engineering Methodologies
- Metal and Thin Film Mechanics
- Smart Grid Security and Resilience
- Distributed and Parallel Computing Systems
- Wireless Body Area Networks
- ECG Monitoring and Analysis
- Logic, programming, and type systems
- Advanced Photocatalysis Techniques
- Corporate Finance and Governance
- Financial Markets and Investment Strategies
- Simulation Techniques and Applications
California University of Pennsylvania
2016-2025
Jeonbuk National University
2015-2025
University of Pennsylvania
2015-2024
Philadelphia University
2010-2024
University of Oulu
2023
Sungkyunkwan University
2023
Macquarie University
2023
Universität Hamburg
2023
Montimage (France)
2023
Institut Polytechnique de Paris
2023
We address the problem of providing compositional hard real-time guarantees in a hierarchy schedulers. first propose resource model to characterize periodic allocation and present exact schedulability conditions for our proposed under EDF RM algorithms. Using conditions, we then provide methods abstract timing requirements that set tasks demands algorithms as single task. With these abstraction methods, schedulers, introduce composition method derives parent scheduler from its child...
The interaction between information technology and phys ical world makes Cyber-Physical Systems (CPS) vulnerable to malicious attacks beyond the standard cyber attacks. This has motivated need for attack-resilient state estimation. Yet, existing state-estimators are based on non-realistic assumption that exact system model is known. Consequently, in this work we present a method estimation presence of attacks, systems with noise modeling errors. When estimated states used by state-based...
This paper presents Verisig, a hybrid system approach to verifying safety properties of closed-loop systems using neural networks as controllers. We focus on sigmoid-based and exploit the fact that sigmoid is solution quadratic differential equation, which allows us transform network into an equivalent system. By composing network's with plant's, we problem verification can be solved state-of-the-art reachability tools. show decidable for one hidden layer general if Schanuel's conjecture...
Several recent incidents have clearly illustrated the susceptibility of cyberphysical systems (CPS) to attacks, raising attention security challenges in these systems. The tight interaction between information technology and physical world has introduced new vulnerabilities that cannot be addressed with use standard cryptographic techniques. Accordingly, problem state estimation presence sensor actuator attacks attracted significant past. Unlike existing work, this paper, we consider...
Abstract Background Blood glucose (BG) management is crucial for type-1 diabetes patients resulting in the necessity of reliable artificial pancreas or insulin infusion systems. In recent years, deep learning techniques have been utilized a more accurate BG level prediction system. However, continuous monitoring (CGM) readings are susceptible to sensor errors. As result, inaccurate CGM would affect and make it unreliable, even if most optimal machine model used. Methods this work, we propose...
It is desirable to develop large complex systems using components based on systematic abstraction and composition. Our goal a compositional real-time scheduling framework support composition techniques for aspects of components. In this paper, we present formal description problems, which are the component problems. We identify issues that need be addressed by solutions provide our solutions, periodic interface . Specifically, introduce resource model characterize allocations provided single...
We discuss current trends in the development and use of high-confidence medical cyber-physical systems (MCPS). These trends, including increased reliance on software to deliver new functionality, wider network connectivity MCPS, demand for continuous patient monitoring, bring challenges into process MCPS at same time create opportunities research development.
Scheduling of sporadic task systems on multiprocessor platforms is an area which has received much attention in the recent past. It widely believed that finding optimal scheduler hard, and therefore most studies have focused developing algorithms with good utilization bounds. These can be broadly classified into two categories: partitioned scheduling tasks are statically assigned to individual processors, globalscheduling each allowed execute any processor platform. In this paper we consider...
The major goals of telemedicine today are to develop next-generation telehealth tools and technologies enhance healthcare delivery medically underserved populations using telecommunication technology, increase access medical specialty services while decreasing costs, provide training providers, clinical trainees, students in health-related fields. Key drivers for these the need interest collaborate among stakeholders, including patients, patient communities, research funders, researchers,...
Recent years have witnessed a significant increase in the number of security-related incidents control systems. These include high-profile attacks wide range application domains, from on critical infrastructure, as case Maroochy Water breach [1], and industrial systems (such StuxNet virus attack an supervisory data acquisition system [2], [3] German Steel Mill cyberattack [4], [5]), to modern vehicles [6]-[8]. Even high-assurance military were shown be vulnerable attacks, illustrated highly...
In modern hospitals, patients are treated using a wide array of medical devices that increasingly interacting with each other over the network, thus offering perfect example cyber-physical system. We study safety device system for physiologic closed-loop control drug infusion. The main contribution paper is verification approach properties systems. demonstrate, case study, can be applied to clinical importance. Our method combines simulation-based analysis detailed model contains continuous...
Medical Cyber-Physical Systems (MCPS) hold the promise of reducing human errors and optimizing healthcare by delivering new ways to monitor, diagnose treat patients through integrated clinical environments (ICE). Despite benefits provided MCPS, many ICE medical devices have not been designed satisfy cybersecurity requirements and, consequently, are vulnerable recent attacks. Nowadays, ransomware attacks account for 85% all malware in healthcare, more than 70% confirmed data disclosure. With...
Automated insulin delivery (AID) may benefit individuals with long-standing type 1 diabetes where frequent exposure to hypoglycemia impairs counterregulatory responses. This study assessed the effect of 18 months AID on avoidance and glucose responses insulin-induced in complicated by impaired awareness hypoglycemia.
In this paper, we present a framework and the software architecture for deployment of multiple autonomous robots in an unstructured unknown environment, with applications ranging from scouting reconnaissance, to search rescue, manipulation tasks, cooperative localization mapping, formation control. Our allows modular hierarchical approach programming deliberative reactive behaviors operation. Formal definitions sequential composition, parallel composition allow bottom-up development complex...
Given the shortage of caregivers and increase in an aging US population, future healthcare quality does not look promising definitely is unlikely to be cheaper. Advances health information systems technology offer a tremendous opportunity for improving care while reducing costs. The development production medical device software crucial issue, both economy ensuring safe advances delivery. As devices become increasingly smaller physical terms but larger terms, design, testing, eventual Food...
There is a growing interest in establishing rules to regulate the privacy of citizens treatment sensitive personal data such as medical and financial records. Such must be respected by software used these sectors. The regulatory statements are somewhat informal interpreted carefully interface private data. This paper describes techniques formalize how exploit this formalization analyze automatically. Our formalism, which we call APIs, an extension access control matrix operations include (1)...
A model-driven design and validation of closed-loop medical device systems is presented. Currently, few if any on the market support control interconnected devices, mechanisms for regulatory approval such are lacking. We present a system implementing clinical scenario where may reduce possibility human error improve safety patient. The studied with simple controller proposed in literature. demonstrate that, under certain failure conditions, patient not guaranteed. Finally, more complex...
Compositional schedulability analysis of hierarchical scheduling frameworks is a well studied problem, as it has wide-ranging applications in the embedded systems domain. Several techniques, such periodic resource model based abstraction and composition, have been proposed for this problem. However these are sub-optimal because they incur bandwidth overhead. In work, we introduce explicit deadline (EDP) model, present compositional techniques under EDF DM. We show that optimal, do not any...
This Special Issue presents papers that cover key features of Cyber - Physical Systems (CPS), including new research and technology advances, open problems, technical challenges with the organized into three categories: theoretical foundations, small-scale applications, large-scale applications.