{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:14:45Z","timestamp":1774023285202,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":102,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,30]],"date-time":"2021-09-30T00:00:00Z","timestamp":1632960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2028910,2028897,2028875,2028879,2028889,2028740"],"award-info":[{"award-number":["2028910,2028897,2028875,2028879,2028889,2028740"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,30]]},"DOI":"10.1145\/3477244.3477624","type":"proceedings-article","created":{"date-parts":[[2021,9,30]],"date-time":"2021-09-30T17:06:05Z","timestamp":1633021565000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Towards scalable, secure, and smart mission-critical IoT systems"],"prefix":"10.1145","author":[{"given":"Xiaolong","family":"Guo","sequence":"first","affiliation":[{"name":"Kansas State University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Song","family":"Han","sequence":"additional","affiliation":[{"name":"University of Connecticut"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"X. Sharon","family":"Hu","sequence":"additional","affiliation":[{"name":"University of Notre Dame"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xun","family":"Jiao","sequence":"additional","affiliation":[{"name":"Villanova University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yier","family":"Jin","sequence":"additional","affiliation":[{"name":"University of Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fanxin","family":"Kong","sequence":"additional","affiliation":[{"name":"Syracuse University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Lemmon","sequence":"additional","affiliation":[{"name":"University of Notre Dame"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2021,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MetroCAD51599.2021.00014"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS52030.2021.00027"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2046044"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2011.25"},{"key":"e_1_3_2_1_5_1","volume-title":"Camil Demetrescu, and Irene Finocchi. A survey of symbolic execution techniques. arXiv preprint arXiv:1610.00502","author":"Baldoni Roberto","year":"2016","unstructured":"Roberto Baldoni , Emilio Coppa , Daniele Cono D'Elia , Camil Demetrescu, and Irene Finocchi. A survey of symbolic execution techniques. arXiv preprint arXiv:1610.00502 , 2016 . Roberto Baldoni, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu, and Irene Finocchi. A survey of symbolic execution techniques. arXiv preprint arXiv:1610.00502, 2016."},{"key":"e_1_3_2_1_6_1","volume-title":"Koopman invariant subspaces and finite linear representations of nonlinear dynamical systems for control. PLoS ONE, 11(2-e0150171)","author":"Brunton S.L.","year":"2016","unstructured":"S.L. Brunton , B.W. Brunton , J.L. Proctor , and J.N. Kutz . Koopman invariant subspaces and finite linear representations of nonlinear dynamical systems for control. PLoS ONE, 11(2-e0150171) , 2016 . S.L. Brunton, B.W. Brunton, J.L. Proctor, and J.N. Kutz. Koopman invariant subspaces and finite linear representations of nonlinear dynamical systems for control. PLoS ONE, 11(2-e0150171), 2016."},{"key":"e_1_3_2_1_7_1","first-page":"1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"Buttazzo Giorgio C","year":"2014","unstructured":"Giorgio C Buttazzo , Enrico Bini , and Darren Buttle . Rate-adaptive tasks : Model, analysis, and design issues. In 2014 Design , Automation & Test in Europe Conference & Exhibition (DATE) , pages 1 -- 6 . IEEE, 2014 . Giorgio C Buttazzo, Enrico Bini, and Darren Buttle. Rate-adaptive tasks: Model, analysis, and design issues. In 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 1--6. IEEE, 2014."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"e_1_3_2_1_9_1","first-page":"1967","volume-title":"28th {USENIX} Security Symposium ({USENIX} Security 19)","author":"Chen Yuanliang","year":"2019","unstructured":"Yuanliang Chen , Yu Jiang , Fuchen Ma , Jie Liang , Mingzhe Wang , Chijin Zhou , Xun Jiao , and Zhuo Su . Enfuzz: Ensemble fuzzing with seed synchronization among diverse fuzzers . In 28th {USENIX} Security Symposium ({USENIX} Security 19) , pages 1967 -- 1983 , 2019 . Yuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Xun Jiao, and Zhuo Su. Enfuzz: Ensemble fuzzing with seed synchronization among diverse fuzzers. In 28th {USENIX} Security Symposium ({USENIX} Security 19), pages 1967--1983, 2019."},{"key":"e_1_3_2_1_10_1","volume-title":"Real-time query scheduling for wireless sensor networks","author":"Chipara Octav","year":"1850","unstructured":"Octav Chipara , Chenyang Lu , and Gruia-Catalin Roman . Real-time query scheduling for wireless sensor networks . IEEE transactions on computers, 62(9): 1850 --1865, 2013. Octav Chipara, Chenyang Lu, and Gruia-Catalin Roman. Real-time query scheduling for wireless sensor networks. IEEE transactions on computers, 62(9):1850--1865, 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2011.15"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243752"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1274858.1274866"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_15_1","first-page":"5","volume-title":"Proceedings of the 2008 International Conference on Formal Methods in Computer-Aided Design","author":"De Paula Flavio M","unstructured":"Flavio M De Paula , Marcel Gort , Alan J Hu , Steven JE Wilton , and Jin Yang . Backspace : formal analysis for post-silicon debug . In Proceedings of the 2008 International Conference on Formal Methods in Computer-Aided Design , page 5 . IEEE Press, 2008. Flavio M De Paula, Marcel Gort, Alan J Hu, Steven JE Wilton, and Jin Yang. Backspace: formal analysis for post-silicon debug. In Proceedings of the 2008 International Conference on Formal Methods in Computer-Aided Design, page 5. IEEE Press, 2008."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2010.59"},{"key":"e_1_3_2_1_17_1","volume-title":"The internet of things: How the next evolution of the internet is changing everything. CISCO white paper, 1(2011):1--11","author":"Evans Dave","year":"2011","unstructured":"Dave Evans . The internet of things: How the next evolution of the internet is changing everything. CISCO white paper, 1(2011):1--11 , 2011 . Dave Evans. The internet of things: How the next evolution of the internet is changing everything. CISCO white paper, 1(2011):1--11, 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2018.8462886"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.4271\/2017-01-1654"},{"issue":"1","key":"e_1_3_2_1_21_1","first-page":"3","article-title":"On cyber attacks and signature based intrusion detection for modbus based industrial control systems. Journal of Digital Forensics","volume":"9","author":"Gao Wei","year":"2014","unstructured":"Wei Gao and Thomas H Morris . On cyber attacks and signature based intrusion detection for modbus based industrial control systems. Journal of Digital Forensics , Security and Law , 9 ( 1 ): 3 , 2014 . Wei Gao and Thomas H Morris. On cyber attacks and signature based intrusion detection for modbus based industrial control systems. Journal of Digital Forensics, Security and Law, 9(1):3, 2014.","journal-title":"Security and Law"},{"key":"e_1_3_2_1_22_1","first-page":"93","volume-title":"International Conference on Service-Oriented Computing","author":"Gatouillat Arthur","year":"2017","unstructured":"Arthur Gatouillat , Youakim Badr , and Bertrand Massot . Qos-driven self-adaptation for critical iot-based systems . In International Conference on Service-Oriented Computing , pages 93 -- 105 . Springer , 2017 . Arthur Gatouillat, Youakim Badr, and Bertrand Massot. Qos-driven self-adaptation for critical iot-based systems. In International Conference on Service-Oriented Computing, pages 93--105. Springer, 2017."},{"key":"e_1_3_2_1_23_1","volume-title":"Henrik Sandberg, and Richard Candell. A survey of physics-based attack detection in cyber-physical systems. ACM Computing Surveys (CSUR), 51(4):1--36","author":"Giraldo Jairo","year":"2018","unstructured":"Jairo Giraldo , David Urbina , Alvaro Cardenas , Junia Valente , Mustafa Faisal , Justin Ruths , Nils Ole Tippenhauer , Henrik Sandberg, and Richard Candell. A survey of physics-based attack detection in cyber-physical systems. ACM Computing Surveys (CSUR), 51(4):1--36 , 2018 . Jairo Giraldo, David Urbina, Alvaro Cardenas, Junia Valente, Mustafa Faisal, Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg, and Richard Candell. A survey of physics-based attack detection in cyber-physical systems. ACM Computing Surveys (CSUR), 51(4):1--36, 2018."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2008.09.016"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3166\/ejc.17.568-578"},{"key":"e_1_3_2_1_26_1","volume-title":"31st Euromicro Conference on Real-Time Systems (ECRTS 2019","author":"Gong Tao","year":"2019","unstructured":"Tao Gong , Tianyu Zhang , Xiaobo Sharon Hu , Qingxu Deng , Michael Lemmon , and Song Han . Reliable dynamic packet scheduling over lossy real-time wireless networks . In 31st Euromicro Conference on Real-Time Systems (ECRTS 2019 ). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik , 2019 . Tao Gong, Tianyu Zhang, Xiaobo Sharon Hu, Qingxu Deng, Michael Lemmon, and Song Han. Reliable dynamic packet scheduling over lossy real-time wireless networks. In 31st Euromicro Conference on Real-Time Systems (ECRTS 2019). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2019."},{"key":"e_1_3_2_1_27_1","volume-title":"Exploiting physical dynamics to detect actuator and sensor attacks in mobile robots. arXiv preprint arXiv:1708.01834","author":"Guo Pinyao","year":"2017","unstructured":"Pinyao Guo , Hunmin Kim , Nurali Virani , Jun Xu , Minghui Zhu , and Peng Liu . Exploiting physical dynamics to detect actuator and sensor attacks in mobile robots. arXiv preprint arXiv:1708.01834 , 2017 . Pinyao Guo, Hunmin Kim, Nurali Virani, Jun Xu, Minghui Zhu, and Peng Liu. Exploiting physical dynamics to detect actuator and sensor attacks in mobile robots. arXiv preprint arXiv:1708.01834, 2017."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00065"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8740840"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747939"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2011.9"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/3437539.3437617"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44829-2_17"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.2983127"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","first-page":"2490","DOI":"10.1109\/INFCOM.2004.1354670","volume-title":"IEEE INFOCOM 2004","volume":"4","author":"Jin Cheng","year":"2004","unstructured":"Cheng Jin , David X Wei , and Steven H Low . Fast tcp: motivation, architecture, algorithms, performance . In IEEE INFOCOM 2004 , volume 4 , pages 2490 -- 2501 . IEEE, 2004 . Cheng Jin, David X Wei, and Steven H Low. Fast tcp: motivation, architecture, algorithms, performance. In IEEE INFOCOM 2004, volume 4, pages 2490--2501. IEEE, 2004."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2014.54"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2013.6581573"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1137\/18M1216572"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.51"},{"key":"e_1_3_2_1_41_1","first-page":"55","volume-title":"IEEE\/ACM Third International Conference on Cyber-Physical Systems (ICCPS)","author":"Kim Junsung","year":"2012","unstructured":"Junsung Kim , K. Lakshmanan , and R. Rajkumar . Rhythmic tasks: A new task model with continually varying periods for cyber-physical systems . In IEEE\/ACM Third International Conference on Cyber-Physical Systems (ICCPS) , pages 55 -- 64 , 2012 . Junsung Kim, K. Lakshmanan, and R. Rajkumar. Rhythmic tasks: A new task model with continually varying periods for cyber-physical systems. In IEEE\/ACM Third International Conference on Cyber-Physical Systems (ICCPS), pages 55--64, 2012."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00011"},{"key":"e_1_3_2_1_43_1","volume-title":"Approximate simulation for template-based whole-body control. arXiv preprint arXiv:2006.09921","author":"Kurtz Vince","year":"2020","unstructured":"Vince Kurtz , Patrick M Wensing , Michael D Lemmon , and Hai Lin . Approximate simulation for template-based whole-body control. arXiv preprint arXiv:2006.09921 , 2020 . Vince Kurtz, Patrick M Wensing, Michael D Lemmon, and Hai Lin. Approximate simulation for template-based whole-body control. arXiv preprint arXiv:2006.09921, 2020."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974508"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2014.26"},{"key":"e_1_3_2_1_46_1","first-page":"97","volume-title":"Ryan Kastner, Timothy Sherwood, Ben Hardekopf, and Frederic T Chong. Sapper: A language for hardware-level security policy enforcement. In ACM SIGARCH Computer Architecture News","author":"Li Xun","year":"2014","unstructured":"Xun Li , Vineeth Kashyap , Jason K Oberg , Mohit Tiwari , Vasanth Ram Rajarathinam , Ryan Kastner, Timothy Sherwood, Ben Hardekopf, and Frederic T Chong. Sapper: A language for hardware-level security policy enforcement. In ACM SIGARCH Computer Architecture News , volume 42 , pages 97 -- 112 . ACM , 2014 . Xun Li, Vineeth Kashyap, Jason K Oberg, Mohit Tiwari, Vasanth Ram Rajarathinam, Ryan Kastner, Timothy Sherwood, Ben Hardekopf, and Frederic T Chong. Sapper: A language for hardware-level security policy enforcement. In ACM SIGARCH Computer Architecture News, volume 42, pages 97--112. ACM, 2014."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993512"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2160627"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.811451"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586169"},{"key":"e_1_3_2_1_51_1","volume-title":"Communication and Concurrency","author":"Milner R.","year":"1989","unstructured":"R. Milner . Communication and Concurrency . Prentice Hall , 1989 . R. Milner. Communication and Concurrency. Prentice Hall, 1989."},{"key":"e_1_3_2_1_52_1","volume-title":"A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys (CSUR), 46(4):1--29","author":"Mitchell Robert","year":"2014","unstructured":"Robert Mitchell and Ing-Ray Chen . A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys (CSUR), 46(4):1--29 , 2014 . Robert Mitchell and Ing-Ray Chen. A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys (CSUR), 46(4):1--29, 2014."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2265083"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2312327"},{"key":"e_1_3_2_1_55_1","volume-title":"Human-level control through deep reinforcement learning. nature, 518(7540):529--533","author":"Mnih Volodymyr","year":"2015","unstructured":"Volodymyr Mnih , Koray Kavukcuoglu , David Silver , Andrei A Rusu , Joel Veness , Marc G Bellemare , Alex Graves , Martin Riedmiller , Andreas K Fidjeland , Georg Ostrovski , Human-level control through deep reinforcement learning. nature, 518(7540):529--533 , 2015 . Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Andrei A Rusu, Joel Veness, Marc G Bellemare, Alex Graves, Martin Riedmiller, Andreas K Fidjeland, Georg Ostrovski, et al. Human-level control through deep reinforcement learning. nature, 518(7540):529--533, 2015."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2712560"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCA.2016.7587875"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2018.8431582"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604050"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843720"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2735960.2735984"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.04.079"},{"key":"e_1_3_2_1_63_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Quinonez Raul","year":"2020","unstructured":"Raul Quinonez , Jairo Giraldo , Luis Salazar , Erick Bauman , Alvaro Cardenas , and Zhiqiang Lin . SAVIOR : Securing autonomous vehicles with robust physical invariants . In 29th USENIX Security Symposium (USENIX Security 20) , 2020 . Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, and Zhiqiang Lin. SAVIOR: Securing autonomous vehicles with robust physical invariants. In 29th USENIX Security Symposium (USENIX Security 20), 2020."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/6152"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744823"},{"key":"e_1_3_2_1_66_1","volume-title":"August 14, 2013.","author":"Rutkin Aviva Hope","unstructured":"Aviva Hope Rutkin . \"Spoofers\" use fake gps signals to knock a yacht off course , August 14, 2013. Aviva Hope Rutkin. \"Spoofers\" use fake gps signals to knock a yacht off course, August 14, 2013."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2010.41"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2015.7341303"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.01.014"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2013.27"},{"key":"e_1_3_2_1_72_1","volume-title":"Wireless Networks","author":"Shen Wei","year":"2013","unstructured":"Wei Shen , Tingting Zhang , Mikael Gidlund , and Felix Dobslaw . SAS-TDMA : a source aware scheduling algorithm for real-time communication in industrial wireless sensor networks . Wireless Networks , 2013 . Wei Shen, Tingting Zhang, Mikael Gidlund, and Felix Dobslaw. SAS-TDMA: a source aware scheduling algorithm for real-time communication in industrial wireless sensor networks. Wireless Networks, 2013."},{"key":"e_1_3_2_1_73_1","volume-title":"Edge computing: Vision and challenges","author":"Shi Weisong","year":"2016","unstructured":"Weisong Shi , Jie Cao , Quan Zhang , Youhuizi Li , and Lanyu Xu . Edge computing: Vision and challenges . IEEE internet of things journal, 3(5):637--646, 2016 . Weisong Shi, Jie Cao, Quan Zhang, Youhuizi Li, and Lanyu Xu. Edge computing: Vision and challenges. IEEE internet of things journal, 3(5):637--646, 2016."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2852491"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00596-1_21"},{"key":"e_1_3_2_1_77_1","first-page":"881","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Son Yunmok","year":"2015","unstructured":"Yunmok Son , Hocheol Shin , Dongkwan Kim , Youngseok Park , Juhwan Noh , Kibum Choi , Jungwoo Choi , and Yongdae Kim . Rocking drones with intentional sound noise on gyroscopic sensors . In 24th USENIX Security Symposium (USENIX Security 15) , pages 881 -- 896 , 2015 . Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim. Rocking drones with intentional sound noise on gyroscopic sensors. In 24th USENIX Security Symposium (USENIX Security 15), pages 881--896, 2015."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2008.15"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2312291"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.020211.00036"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.20"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2913450"},{"key":"e_1_3_2_1_83_1","first-page":"1752","volume-title":"2018 Annual American Control Conference (ACC)","author":"Tunga Rohit","year":"2018","unstructured":"Rohit Tunga , Carlos Murguia , and Justin Ruths . Tuning windowed chi-squared detectors for sensor attacks . In 2018 Annual American Control Conference (ACC) , pages 1752 -- 1757 . IEEE, 2018 . Rohit Tunga, Carlos Murguia, and Justin Ruths. Tuning windowed chi-squared detectors for sensor attacks. In 2018 Annual American Control Conference (ACC), pages 1752--1757. IEEE, 2018."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0507-7"},{"key":"e_1_3_2_1_86_1","volume-title":"Proceedings 27th IEEE Real-time and Embedded Technology and Applications Symposium (RTAS 2021)","author":"Wang Jiachen","year":"2021","unstructured":"Jiachen Wang , Tianyu Zhang , Dawei Shen , X.S. Hu , and Song Han . APaS : an adaptive parition-based scheduling framework for 6TiSCH networks . In Proceedings 27th IEEE Real-time and Embedded Technology and Applications Symposium (RTAS 2021) , 2021 . Jiachen Wang, Tianyu Zhang, Dawei Shen, X.S. Hu, and Song Han. APaS: an adaptive parition-based scheduling framework for 6TiSCH networks. In Proceedings 27th IEEE Real-time and Embedded Technology and Applications Symposium (RTAS 2021), 2021."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183494"},{"key":"e_1_3_2_1_88_1","volume-title":"27th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), Brief Industry Paper Track. IEEE","author":"Wang Ruixuan","year":"2021","unstructured":"Ruixuan Wang , Fanxin Kong , Hasshi Sudler , and Xun Jiao . Hdad : Hyperdimensional computing-based anomaly detection for automotive sensor attacks . In 27th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), Brief Industry Paper Track. IEEE , 2021 . Ruixuan Wang, Fanxin Kong, Hasshi Sudler, and Xun Jiao. Hdad: Hyperdimensional computing-based anomaly detection for automotive sensor attacks. In 27th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), Brief Industry Paper Track. IEEE, 2021."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2980198"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2013.22"},{"key":"e_1_3_2_1_91_1","first-page":"6","article-title":"Joint optimization of caching, computing, and radio resources for fog-enabled iot using natural actor-critic deep reinforcement learning","author":"Wei Yifei","year":"2018","unstructured":"Yifei Wei , F Richard Yu , Mei Song , and Zhu Han . Joint optimization of caching, computing, and radio resources for fog-enabled iot using natural actor-critic deep reinforcement learning . IEEE Internet of Things Journal , 6 , 2018 . Yifei Wei, F Richard Yu, Mei Song, and Zhu Han. Joint optimization of caching, computing, and radio resources for fog-enabled iot using natural actor-critic deep reinforcement learning. IEEE Internet of Things Journal, 6, 2018.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00026"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055004.3055010"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2013.6531076"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2775054.2694372"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS49844.2020.00028"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2017.11"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2877681"},{"key":"e_1_3_2_1_99_1","article-title":"Distributed dynamic packet scheduling framework for handling disturbances in real-time wireless networks","author":"Zhang Tianyu","year":"2018","unstructured":"Tianyu Zhang , Tao Gong , Song Han , Qingxu Deng , and Xiaobo Sharon Hu . Distributed dynamic packet scheduling framework for handling disturbances in real-time wireless networks . IEEE Transactions on Mobile Computing , 2018 . Tianyu Zhang, Tao Gong, Song Han, Qingxu Deng, and Xiaobo Sharon Hu. Distributed dynamic packet scheduling framework for handling disturbances in real-time wireless networks. IEEE Transactions on Mobile Computing, 2018.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2018.00007"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2011.5954998"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00001"}],"event":{"name":"ESWEEK '21: Seventeenth Embedded Systems Week","location":"Virtual Event","acronym":"ESWEEK '21","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","SIGDA ACM Special Interest Group on Design Automation","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","IEEE CAS","IEEE Council on Electronic Design Automation (CEDA)"]},"container-title":["Proceedings of the 2021 International Conference on Embedded Software"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477244.3477624","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3477244.3477624","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3477244.3477624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:32Z","timestamp":1750191512000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477244.3477624"}},"subtitle":["review and vision"],"short-title":[],"issued":{"date-parts":[[2021,9,30]]},"references-count":102,"alternative-id":["10.1145\/3477244.3477624","10.1145\/3477244"],"URL":"https:\/\/doi.org\/10.1145\/3477244.3477624","relation":{},"subject":[],"published":{"date-parts":[[2021,9,30]]},"assertion":[{"value":"2021-09-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}