Days: Tuesday, May 6th Wednesday, May 7th Thursday, May 8th Friday, May 9th
View this program: with abstractssession overviewtalk overview
Technical Sessions across all workshops, tutorials, Ph.D. Forum, and other events.
09:00 | Welcome |
09:20 | Keynote: Measurements → Meaning → Action: Architecting Foundation Models for Cyber-Physical Intelligence |
Securing Sensors
09:00 | Welcome |
09:10 | Secure On-Sensor Machine Learning (abstract) |
09:35 | Security of AV Perception Systems (abstract) |
10:00 | Towards Understanding User Privacy Concerns of Internet of Things Sensor Data (abstract) |
10:15 | Intermittent Power, Continuous Protection: Security and Privacy for Batteryless Devices in IoT (abstract) |
09:00 | 5G Connectivity roadmap and challenges for edge devices to cloud through 5G/6G channels (abstract) |
09:30 | 5G security and AI/ML - Opportunities and Challenges (abstract) |
10:00 | Local Ratio based Real-time Job Offloading and Resource Allocation in Mobile Edge Computing (abstract) |
10:15 | NAMP: A Network-Aware Model Partitioning Framework for Constrained Devices (abstract) |
09:00 | Arrival and Welcome Remarks (abstract) |
09:10 | Scaling Safe Control Synthesis with Logical Specifications and Neuro-Symbolic Methods (abstract) |
09:45 | Perception, Control, and Planning under Communication and Computation Resource Constraints for Intelligent CPS (abstract) |
09:00 | Arrival and welcoming remarks |
09:30 | A Model-Driven Approach for Safety-Security Co-Analysis blending Formal Methods and Generative AI (abstract) |
09:00 | Skin-Interfaced Wearable Biosensors (abstract) |
09:50 | MobiVital: Self-supervised Quality Estimation for UWB-based Contactless Respiration Monitoring (abstract) |
10:00 | Through-dressing Wound Monitoring Based on the mmWave Sensor (abstract) |
10:10 | Fine-grained Heartbeat Waveform Monitoring with RFID: A Latent Diffusion Model (abstract) |
09:00 | Welcome Remarks |
09:05 | Keynote: Bringing AI Up to Speed – Designing for Pushing the Limits (abstract) |
09:50 | Simulation vs. Hallucination: Assessing Vision-Language Model Question Answering Capabilities in Engineering Simulations (abstract) |
10:10 | Empirical Assessment of Graph Neural Network Convolution Operators for AC-OPF Learning (abstract) |
09:00 | ASERT Workshop & FACCT (abstract) |
09:30 | Keynote: Arguing at the Compliance Interface: Dispatches from Industrial Experience (abstract) |
Welcoming Remarks + Keynote
09:00 | The Power Struggle: Balancing Peripherals & Programmer Effort in Batteryless Sensing (abstract) |
The transition to Software-Defined Vehicles (SDVs) necessitates a shift from distributed to high-performance more centralized and zonal E/E architecture, driven by the requirements for continuous updates, better user experience, and advanced functionalities. This transformation complicates the integration of safety-critical applications due to the rapidly increasing demands on software and hardware. Traditional OEMs, relying on various suppliers, face challenges in deployment with frequent updates, resource optimization, and managing different ECU/vehicle variants. Many existing solutions lack flexibility, leading to increased testing efforts, unreliable critical functions, and timeline delays. Addressing these issues require formal description of the SW functions and communication, automation in deployment, the separation of safe and unsafe software, predictable resource utilization, and dynamic configuration of communication networks with end-to-end guarantees. This event invites presentations aiming at solutions for these challenges as well as extended issues that safety-critical and real-time systems encounter in the automotive industry.
09:00 | Opening and Welcome notes: Building safe, secure and deterministic software defined vehicles (abstract) |
09:15 | Keynote: Middleware for Autonomous Driving Systems (abstract) |
10:00 | Managing MPSoC Memory Interference on SDV Architectures (abstract) |
This tutorial introduces Playground, an open-source "safe" operating system (OS) abstraction for buildings that enables the execution of untrusted, multi-tenant applications in modern buildings. Playground is integrated with the Brick representation of the underlying buildings and features flexible and extensible access control and resource isolation mechanisms. This tutorial will provide a detailed walkthrough of the system design of Playground and relevant background with multiple hands-on exercises.
09:00 | Introduction to Playground |
09:20 | Recap on Brick programming and NREL’s BuildingMOTIF |
09:40 | Lab session 1 — Write your own building app with Playground Checkpoints: |
The overall theme of this tutorial is on designing formal verification and control algorithms for learning-enabled cyber-physical systems (LE-CPSs) with practical safety guarantees by using conformal prediction.
The 4th student design competition on Networked Computing on the Edge. This competition invites student teams of all levels to develop and demonstrate innovative projects on the topic of networked computing for edge applications. Projects of integrated computing, control, and communication components on the ground, underwater or air mobile platforms are welcomed. Topics of interest include but are not limited to unmanned aerial vehicle (UAV) networks, urban aerial mobility, autonomous driving, edge computing, and human-machine interfaces. Projects on the development of UAV applications are especially encouraged.
In this first session, “Making your code do the talking,” participants will learn to use tools for managing and documenting their code, running it effectively, enhancing its readability, enhancing its ability to be set up, and preparing it for going public.
09:00 | Code tutorial: make your code pretty and reusable (abstract) |
Technical Sessions across all workshops, tutorials, Ph.D. Forum, and other events.
11:00 | Toward Foundation Models for Online Complex Event Detection in CPS-IoT: A Case Study (abstract) |
11:20 | Towards Zero-shot Question Answering in CPS-IoT: Large Language Models and Knowledge Graphs (abstract) |
11:40 | Exploring the Capabilities of LLMs for IMU-based Fine-grained Human Activity Understanding (abstract) |
Sensing Applications
11:00 | Towards Trustworthy XR: Safety, security, and privacy concerns in XR in the era of AI (abstract) |
11:25 | Toward Mobile AI Systems with Physical World Perception (abstract) |
11:50 | Attacking mmWave Sensing with Meta-material-enhanced Tags (abstract) |
12:15 | mmVanish: Extending the Vanish Attack for Multi-Radar Exploitation of mmWave Sensing with Meta-material Tags (abstract) |
11:00 | Invited talk: Trusted Time for Untrusted Edge Systems (abstract) |
11:30 | Invited talk: AI for Cyber-Physical Systems: Identifying the Valuable Gaps (abstract) |
12:00 | Surgical Software-less I/O Virtualization (abstract) |
12:15 | Adaptive Intrusion Mitigation in Software-Defined Vehicles Using Deep Reinforcement Learning (abstract) |
11:00 | Safe Autonomy for AI-enabled Robot Teams (abstract) |
11:35 | Towards Verified Visual Autonomy: Perception Contracts and Abstract Rendering (abstract) |
12:10 | Adapting linear Hopf reachability analysis for scalable analysis and control synthesis for nonlinear differential games (abstract) |
11:00 | Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems (abstract) |
11:45 | Secret Types Require OS-Backed Secrecy Code Sections (abstract) |
11:00 | Activity Recognition using RF and IMU Sensor Data Fusion (abstract) |
11:10 | Unsupervised Deep Clustering for Human Behavior Understanding (abstract) |
11:20 | Human-Centered Gait Balance Estimation Using Footstep-Induced Floor Vibrations (abstract) |
11:30 | Wireless Sensing of Gait for Neurodegenerative Disease Assessment: A Scoping Review (abstract) |
11:40 | Mitigating Sensor Data Bias from User Operational Variability via Causal Intervention (abstract) |
11:50 | Touchless Restroom Monitoring: A Privacy-Preserving System for Patient Care (abstract) |
12:00 | Panel Discussion: Challenges and Opportunities in Human-Centered Sensing |
11:00 | Invited talk: Signal Temporal Logic-based Motion planning for Multi-Robot Systems with Complex Objectives (abstract) |
11:30 | Finding Unknown Unknowns using Cyber-Physical System Simulators (abstract) |
11:50 | Autonomous Cybersecurity Testbed for Operational Technology Networks (abstract) |
12:10 | From Toy to Target: Investigating Representation Transfer for Reinforcement Learning with Implications for Cyber-Physical Systems (abstract) |
11:00 | The Importance of Starting in a Good Place (abstract) |
11:20 | Towards Compositional Assurance of Large CPS (abstract) |
11:40 | Assurance Cost Reduction Through Architectural Design (abstract) |
12:00 | Advanced Certification Methods: Needs and Motivations |
11:00 | Reverse Engineering the ESP32-C3 Wi-Fi Drivers for Static Worst-Case Analysis of Intermittently-Powered Systems (abstract) |
11:20 | Reception Window Selection in EDT+ for Energy Efficient NB-IoT (abstract) |
11:40 | Self-Adaptive Structure Enabled Energy-Efficient PM2.5 Sensing (abstract) |
12:00 | Modeling and Prototyping of IoT-based Long Range Self-powered Image Sensing System (abstract) |
11:00 | Unseen Risks in Container Adoption for SDVs: Navigating Security Challenges in Automotive Architectures (abstract) |
11:30 | Keynote 2: Making the SDV a reality – changing the paradigm of automotive software development (abstract) |
12:10 | Solving the Challenge of Software Interoperability in Autonomous and ADAS Systems (abstract) |
This tutorial introduces Playground, an open-source "safe" operating system (OS) abstraction for buildings that enables the execution of untrusted, multi-tenant applications in modern buildings. Playground is integrated with the Brick representation of the underlying buildings and features flexible and extensible access control and resource isolation mechanisms. This tutorial will provide a detailed walkthrough of the system design of Playground and relevant background with multiple hands-on exercises.
11:00 | Lab session 2 — Regulate building apps with various policies |
The overall theme of this tutorial is on designing formal verification and control algorithms for learning-enabled cyber-physical systems (LE-CPSs) with practical safety guarantees by using conformal prediction.
This session, titled “Creating an accessible and active resource,” is where participants will learn to structure and present their data in ways that maximize accessibility, transparency, and usability with exemplar demonstrations from the Tennessee Department of Transportation's I-24 Mobility Technology Interstate Observation Network (MOTION) and the Leveraging Advanced Data to Deliver Multimodal Safety (LADDMS) initiative.
11:00 | Demonstration of posting various types of resources with the CPS Virtual Organization (abstract) |
11:30 | CPS open data sharing practice: I-24 MOTION testbed demonstration (abstract) |
12:00 | CPS open data sharing practice: LADDMS demonstration (abstract) |
Technical Sessions across all workshops, tutorials, Ph.D. Forum, and other events.
Sensing in the Age of Machine Learning
14:00 | IoTCloak: Practical Integrity Checks of Machine Learning Inference Code and Models on Tiny IoT Devices (abstract) |
14:15 | ACLI-DPFL: Differentially Private Federated Learning with Adaptive Clipping and Local Iteration (abstract) |
14:30 | Safeguarding Media Integrity From The Growing Threat of Generative AI (abstract) |
14:00 | Invited talk: A Position on Network Management and Control for Dynamic Real-Time Systems (abstract) |
14:30 | Invited talk: Deterministic AI Processing of Streaming Data on Edge and Embedded Devices (abstract) |
15:00 | Efficient Inference of parallel partitioned hybrid-Vision Transformers (abstract) |
15:15 | Selective Layer Acceleration with Data-parallel Architecture for DNN Inference Throughput Maximization (abstract) |
14:00 | To Barrier or to Abstract: That Is the Question in Verifying Stochastic Systems — A Unifying Perspective for Comparative Analysis (abstract) |
14:35 | Stein-MAP: A Sequential Variational Inference Framework for Maximum A Posteriori Estimation (abstract) |
15:10 | Computation-Aware Algorithmic Design for Cyber-Physical Systems under Uncertainty: Challenges and Opportunities (abstract) |
14:00 | Tutorial Session: Safety Begins at System Level Design (abstract) |
14:00 | Embedded Intelligence for Health and Wellness (abstract) |
14:00 | Invited Talk: LLMs: Your AI Co-Pilot for Aviation Data (abstract) |
14:30 | Visual Modeling of ROS Launch Files (abstract) |
14:50 | Enabling Analysis and Visualization of Transportation Big Data (abstract) |
15:10 | V2X-Enabled Communication for Traffic Operations via ROS (abstract) |
14:00 | Panel: Challenges and Opportunities of Automated Formal Assurance (abstract) |
14:00 | Energy-Constrained Optimization for Wildfire Detection Using RGB Images (abstract) |
14:20 | Voltage Change is Not Energy Consumption (abstract) |
14:40 | A Sensing System is More than its Electronics: Towards addressing environmental challenges on outdoor data collection platforms (abstract) |
15:00 | Demo: Greenhouse Sensing using Chirp-Based VLC with a Solar Panel for Energy Harvesting and Data Downlink (abstract) |
15:05 | Poster: Towards Microbial Fuel Cell Powered Backscatter Tags for Low-Cost In-Ground Soil Moisture Sensing (abstract) |
14:00 | Get ready for feature-oriented vehicle SW development and testing (abstract) |
14:25 | Deterministic Scheduling for Autonomous Systems: Challenges, and Our Solution - NVIDIA System Task Manager (abstract) |
14:50 | Keynote 3: Addressing the SDV challenges through Cloud native architectures (abstract) |
This tutorial will provide you with practical tools and frameworks to integrate sociological insights into AI design. You will gain knowledge and skills to develop AI systems that actively support human values, such as fairness, transparency, and inclusivity, while promoting equitable outcomes across various sectors, including urban infrastructure, healthcare, and energy management.
14:00 | Kick-off for Aligning Human Values and CPS/IoT |
14:15 | Applied Tutorial – Systems That Make Sense: Aligning CPS/IoT Design with Human Priorities (abstract) |
The Ph.D. Forum provides a unique platform for Ph.D. students in their final years to present their research, either through an oral presentation or a poster presentation. Participants will benefit from feedback provided by senior researchers in the field, gaining insights on their presentation skills, Ph.D. research, and even career advice.
Autonomy requires careful reasoning about the surrounding environment in order to safely interact with the world. This tutorial introduces Scenic, an open-source, probabilistic programming language for simulator-agnostic world modeling. Scenic enables the formal specification and generation of reactive, multi-agent scenarios for use in training, testing, and debugging autonomous systems. Widely adopted in both academia and industry, Scenic supports applications ranging from synthetic data generation to sim-to-real transfer. This session will demonstrate how Scenic can assist safe AI-based autonomy development across domains such as robotics, computer vision, and reinforcement learning.
- A Human-Centered Perspective on Optimizing Ambient Assisted Living Sensing Systems for Aging in Place. Andrea Green, Andrea Cuadra, Sarah Billington and Yiwen Dong.
- Towards Secure User Interaction in WebXR. Chandrika Mukherjee, Arjun Arunasalam, Habiba Farrukh, Reham Mohamed Aburas and Z. Berkay Celik.
- Towards a Lightweight Platform for Human-Robot Interaction in Federated Edge and IoT Environments. Simon Zhang, Zhengxiong Li, Xin Qin and Hailu Xu.
- Vision: Preventing Tech-related Physiological Health Issues using Commodity Wearables. Bhawana Chhaglani, Sarmistha Sarna Gomasta and Prashant Shenoy.
- mmHvital: A Study on Head-Mounted mmWave Radar for Vital Sign Monitoring. Yang Liu, Fahim Kawsar and Alessandro Montanari.
- ExplainGen: a Human-Centered LLM Assistant for Combating Misinformation. Zhicheng Yang, Xinle Jia and Xiaopeng Jiang.
- Towards Human-Centric Smart Homes: Modeling Sensor-Actuator Interactions with Deep Learning. Md Abdur Rahman Fahad and Razib Iqbal.
Technical Sessions across all workshops, tutorials, Ph.D. Forum, and other events.
16:00 | Are We There Yet? A Measurement Study of Efficiency for LLM Applications on Mobile Devices (abstract) |
16:20 | MixForecast: Mixer-Enhanced Foundation Model for Load Forecasting (abstract) |
16:00 | Invited talk: Optimizing IoT Node Design for Edge Computing Applications (abstract) |
16:30 | Invited talk: Connected Minds: Leveraging Collective Reasoning for Autonomous Systems |
17:00 | SIM-LDM: Local Dynamic Map Generation Framework using Autonomous Driving Simulator (abstract) |
17:15 | Open Discussion moderated by the chairs and concluding remarks |
16:00 | Towards a Digital Twin Framework for Secure and Efficient Cyber-Physical Transportation Systems (abstract) |
16:30 | Digital Twin and Digital Threat for System Security and Performance applied to a Smart Grid Use Case (abstract) |
17:00 | Plenary discussion and closing remarks |
16:00 | A Semi-automated Mesh Editing Pipeline for HRTF Simulation (abstract) |
16:10 | MoCoMR: A Collaborative MR Simulator with Individual Behavior Modeling (abstract) |
16:20 | DUal-NET: A Transformer-Based U-Net Model for Denoising Bone Conduction Speech (abstract) |
16:30 | Quantitative Assessment of mmWave Point Cloud for Target Detection (abstract) |
16:40 | PluralLLM: Pluralistic Alignment in LLMs via Federated Learning (abstract) |
16:50 | Good, but Not That Good: An Honestly-Noisy Visualization of Low-Fidelity Data Streams (abstract) |
17:00 | DomAIn: Towards Programless Smart Homes (abstract) |
17:10 | Urban Sensing for Human-Centered Systems: A Modular Edge Framework for Real-Time Interaction (abstract) |
17:20 | Human-Centric Wearable Platform for Work Safety Monitoring: Navigating Between Protection and Privacy (abstract) |
16:00 | Invited Talk: Predictive Runtime Verification of Learning-Enabled Systems with Conformal Prediction (abstract) |
16:30 | Uncertainty Quantification and Data Provenance for Data Pipeline Security Analysis (abstract) |
16:00 | GAIA-X4AGEDA: Enabling Data-Driven and Adaptive Vehicle Architectures for the Mobility of the Future (abstract) |
16:25 | Telematics Control Units (TCU) in the real world (abstract) |
16:50 | Next Challenges for SDV Research (abstract) |
This tutorial will provide you with practical tools and frameworks to integrate sociological insights into AI design. You will gain knowledge and skills to develop AI systems that actively support human values, such as fairness, transparency, and inclusivity, while promoting equitable outcomes across various sectors, including urban infrastructure, healthcare, and energy management.
16:00 | Round Table Discussion – Aligning CPS/IoT with Human Priorities (abstract) |
17:00 | Wrap-Up and Key Takeaways |
Autonomy requires careful reasoning about the surrounding environment in order to safely interact with the world. This tutorial introduces Scenic, an open-source, probabilistic programming language for simulator-agnostic world modeling. Scenic enables the formal specification and generation of reactive, multi-agent scenarios for use in training, testing, and debugging autonomous systems. Widely adopted in both academia and industry, Scenic supports applications ranging from synthetic data generation to sim-to-real transfer. This session will demonstrate how Scenic can assist safe AI-based autonomy development across domains such as robotics, computer vision, and reinforcement learning.
16:00 | Applications of Scenic (Part 2) |
16:30 | Hands-On Programming with Scenic (Part 2) |
16:50 | Ongoing and Future Research Directions: |
Security and Privacy
16:40 | AttackLLM: LLM-based Attack Pattern Generation for an Industrial Control System (abstract) |
17:00 | FL-DABE-BC: A Privacy-Enhanced, Decentralized Authentication, and Secure Communication for Federated Learning Framework with Decentralized Attribute-Based Encryption and Blockchain for IoT Scenarios (abstract) |
17:20 | Closing + Best Paper Award |
Welcome Reception will feature a special musical performance from E-SONIC! E-SONIC is the faculty band in the UCI Samueli School of Engineering comprised of professors from the Departments of Chemical and Biomolecular Engineering, Electrical Engineering and Computer Science, and Biomedical Engineering. The band’s ratio of enthusiasm to musicality is somewhat high, and they cover anything from engineering-themed favorites to crowd-pleasing sing-alongs.
View this program: with abstractssession overviewtalk overview
Speaker: Dr. Steve Chien, Jet Propulsion Laboratory, NASA and California Institute of Technology
Abstract: In October 2023, the Onboard Planner (OBP) took control of the Perseverance rover on Mars, over 200 million miles from Earth. As of 29th January 2025, OBP has operated for 429 Martian days (sols) and has: executed over 7800 activities requested by scientists and engineers, driven over 12 kilometers, acquired over 70,000 images, and collected 4 rock core samples. In contrast to the traditional form of operations, where operators provide a rigid set of instructions for the rover, with OBP Perseverance revises its schedule an average of 16 times each day to stay responsive in a dynamic Martian environment where things don’t always go as expected. This flexibility allows the mission to manage resources such as energy more efficiently and therefore accomplish more science.
In this talk, we discuss the approach to ensuring that a search-based AI system, specifically the Onboard Planner, would (1) achieve mission objectives; and critically (2) protect the rover, a multi-billion dollar one of a kind asset. We describe the “whole lifecycle” approach to developing trusted autonomy software for M2020, spanning: conception, design, analysis, prototyping, and testing. We then describe the incremental rollout and training to smooth the transition to operations with increased onboard autonomy. Next we discuss how the OBP software has performed. Finally we describe the even greater challenges of autonomy in future missions to hunt for life beyond Earth.
Bio: Steve Chien is a Technical Fellow in Artificial Intelligence and Co-head of the Artificial Intelligence Group at the Jet Propulsion Laboratory, California Institute of Technology. He has spent decades deploying AI/Autonomy to numerous space missions including: Earth Observing One, Sensorweb, ESA’s Rosetta Orbiter, and M2020. He has been awarded four NASA Medals in 1997, 2000, 2007, and 2015 for development and deployment of AI technologies for space missions. He has supported numerous government bodies including the Defense Science Board and the Air Force Scientific Advisory Board. He was appointed by Congress to the National Security Commission on Artificial Intelligence (2018-2021). He currently serves on the Army Science Board and as an Advisor to the Senate Defense Modernization Caucus.
10:30 | Sparse Intersection Checking for Sparse Polynomial Zonotopes (abstract) |
10:55 | Indistinguishability in Localization and Control with Coarse Information (abstract) |
11:20 | Stationary regimes of piecewise linear dynamical systems with priorities (abstract) |
11:45 | Sharc: Simulator for Hardware Architecture and Real-time Control (abstract) |
10:30 | Welcome to ICCPS (abstract) |
10:52 | Can control barrier functions keep automated vehicles safe in live freeway traffic? (abstract) |
11:14 | Breaking the Latency Barrier: Practical Haptic Bilateral Teleoperation over 5G (abstract) |
11:36 | Ethics by Design in Autonomous Driving: Developing a Model-Based Liability Determination Framework (abstract) |
10:30 | Welcome to RTAS 2025 |
11:00 | From Systems to Hardware and Back: Unlocking the Potential of Cross-Layer Design (abstract) |
10:30 | Welcome to SenSys 2025 |
10:45 | Argus: Multi-View Egocentric Human Mesh Reconstruction Based on Stripped-Down Wearable mmWave Add-on (abstract) |
11:00 | Ultra-High-Frequency Harmony: mmWave Radar and Event Camera Orchestrate Accurate Drone Landing (abstract) |
11:15 | mmET: mmWave Radar-Based Eye Tracking on Smart Glasses (abstract) |
11:30 | Proteus: Enhanced mmWave Leaf Wetness Detection with Cross-Modality Knowledge Transfer (abstract) |
11:45 | Improving mmWave based Hand Hygiene Monitoring through Beam Steering and Combining Techniques (abstract) |
Technical Sessions for all conferences.
13:30 | Composition of Constraints in Long Duration Autonomy (abstract) |
13:30 | Perception-based Quantitative Runtime Verification for Learning-enabled Cyber-Physical Systems (abstract) |
13:52 | Safety Monitoring for Learning-Enabled Cyber-Physical Systems in Out-of-Distribution Scenarios (abstract) |
14:14 | Mining Specifications for Predictive Safety Monitoring (abstract) |
14:36 | Scalable and Interpretable Verification of Image-based Neural Network Controllers for Autonomous Vehicles (abstract) |
13:30 | Asymptotically Optimal Multiprocessor Real-Time Locking for non-JLFP Scheduling (Outstanding Paper Award) (abstract) |
13:52 | SPR: Shielded Processor Reservations with Bounded Management Overhead (abstract) |
14:14 | Nip It In The Bud: Job Acceptance Multi-Server (abstract) |
14:36 | Optimal Priority Assignment for Synchronous Harmonic Tasks With Dynamic Self-Suspension (abstract) |
13:30 | CheckMate: LLM-Powered Approximate Intermittent Computing (abstract) |
13:45 | TOCTOU Resilient Attestation for IoT Networks (abstract) |
14:00 | SecureGaze: Defending Gaze Estimation Against Backdoor Attacks (abstract) |
14:15 | Membership Inference Against Self-supervised IMU Sensing Applications (abstract) |
14:30 | Demo and Poster 1-minute Madness (Part 1) |
Technical Sessions for all conferences.
Verification
- Poster Abstract: PRoTECT: Parallel Construction of Barrier Certificates for Safety Verification of Polynomial Systems, Ben Wooding, Viacheslav Horbanov and Abolfazl Lavaei
- Poster Abstract: Physics-Informed Safety Verification of Nonlinear Systems: A Scenario Approach with Data Mitigation, Mohammadhossein Ashoori, Ali Aminzadeh, Abolfazl Lavaei and Amy Nejati
- Poster Abstract: Verifying Vision-Based Autonomy with Abstract Rendering and Perception Contracts, Yangge Li, Chenxi Ji and Sayan Mitra
- Poster Abstract: A gray box approach for Large Language Model-guided Natural Language to Temporal Logic Automatic, Eshita Shukla, Quinn Thibeault and Giulia Pedrielli
- Poster Abstract: Symbolic Gaussian Smoothing, Andrew Mata, Ali Arjomandbigdeli and Stanley Bak
- Poster Abstract: Polynomial Zonotopes Intersection Checking, Ertai Luo, Yushen Huang, Yifan Sun and Stanley Bak
Detection
- Demo Abstract: SEQUIN: A Network Science and Physics-based Approach to Identify Sequential N-k Attacks in Electric Power Grids, Andrew Chio, Russell Bent, Kaarthik Sundar and Nalini Venkatasubramanian
- Poster Abstract: Monitor and Recover: A Paradigm for Future Research on Distribution Shift in Learning-Enabled Cyber-Physical Systems, Vivian Lin and Insup Lee
- Poster Abstract: Conformance-Driven Anomaly Detection for Cyber-Physical Systems, Xin Qin
- Poster Abstract: Integrating the Simplex Architecture to Enhance Safety in Deep Learning Autonomous Systems, Niko Salamini, Federico Nesti, Mauro Marinoni, Giorgiomaria Cicero, Gabriele Serra, Alessandro Biondi and Giorgio Buttazzo
- Demo Abstract: Real-Time Freeway Traffic Anomalous Event Detection System via Radar Detector Sensors, Austin Coursey, Junyi Ji, Zhiyao Zhang, William Barbour, Marcos Quinones-Grueiro, Tyler Derr, Gautam Biswas and Daniel Work
- Poster Abstract: Data Efficient PV based Indoor Event Detection, Tushar Routh, Jiechao Gao and Bradford Campbell
- Poster Abstract: Detecting Stealthy False Data Injections on Cyber-Physical Systems using Temporal Distance Metrics, Akash Bhattacharya, Suraj Singh, Sunandan Adhikary and Soumyajit Dey
Simulation
- Poster Abstract: Adaptive Beamforming for Connected Vehicles – A Co-simulation Framework, Anik Roy, Varuni Reddy, Somnath Hazra, Serene Banerjee, Arnab Sarkar and Soumyajit Dey
- Poster Abstract: 1000DaySim: Open-Source Traffic Simulation With Real Data Over Long Time Horizons, Zhiyao Zhang, Yuhang Zhang, Marcos Quiñones-Grueiro, William Barbour, Gautam Biswas and Daniel Work
- Poster Abstract: Reproducible and Low-cost Sim-to-real Environment for Traffic Signal Control, Yiran Zhang, Khoa Vo, Longchao Da, Tiejin Chen, Xiaoou Liu and Hua Wei
- Poster Abstract: SPHERE CPS: A Reconfigurable Testbed for Industrial Control System Security Experimentation, Luis Garcia, Jelena Mirkovic, David Balenson, Erik Kline, David Choffnes, Daniel Dubois, Srivatsan Ravi, Joseph Barnes, George Pradkin, Geoff Lawler, Chris Tran and Alba Regalado
- Poster Abstract: Exploring Flexible Road Reconstruction in Godot Simulator, Daniel Peralta and Xin Qin
- Poster Abstract: High-Level Scenario Management For Parallel Autonomous Vehicle Simulation, Alex Richardson and Jonathan Sprinkle
- Demo Abstract: Cost-Effective Rover for Farms, Pawan Kumar, Yejur Dube and Hokeun Kim
- Journal-first: Minimal-Overlap Centrality for Multi-Gateway Designation in Real-Time TSCH Networks. Authors: M. Gutiérrez Gaitán, L. Almeida, P. Santos, P. d’Orey, T. Watteyne
- Work in Progress: Reducing WCET Estimation by Increasing the Number of Persistent Blocks. Authors: B. Geller, K. Rainey, C. Tessler, P. Modekurthy
- Work in Progress: Security-Aware Preemptive Scheduling with Partial Trust for Safety-Critical Embedded Systems. Authors: F. Raadia, N. Fisher
- Work in Progress: Biologically Inspired Dynamic Task Prioritization in Computer Vision Systems. Authors: J. Easton-Marks, A. Munoz, A. Cheng
- Journal-first: A Machine Learning-based Platform for Monitoring and Prediction of Hazardous Gases in Rural and Remote Areas. Authors: E. Ladeira, B. Silva
- Work in Progress: Self Healing Architectures Using Machine Learning and Federated Learning for Attack Detection. Authors: H. Ibrahim, H. Alkhzaimi
- Brief Industry Paper: STM: A Static Non-preemptive Scheduler for NVIDIA Tegra SoC. Authors: A. Davies, N. Poorswani, R. Xiang, B. Brown, R. Singh, A. Tadkase, S. Gupta, A. Vafaee, J. Han, P. Tumati, S. Janapareddy
- Work in Progress: Optimizing Schedulability using Cache-Bypassing. Authors: T. Fischer, H. Falk
- Work in Progress: Increasing Schedulability via on-GPU Scheduling. Authors: J. Bakita, J. Anderson
- Work in Progress: Middleware-transparent Callback Enforcement in Commoditized Component-oriented Real-time Systems. Authors: T. Ishikawa-Aso, A. Yano, T. Azumi, S. Kato
- Journal-First: Cache-Related Preemption Delay in Non-Inclusive Cache Hierarchies. Authors: T. Fischer, H. Falk
15:30 | Test of Time Awards Presentations |
16:15 | Demo and Poster 1-minute Madness (Part 2) |
Posters and Demos Session
View this program: with abstractssession overviewtalk overview
Framed around the motion “This House contends that the inherent complexity of modern engineering challenges renders exhaustive mathematical analysis overkill, and that an iterative, adaptive design approach should be prioritized—even for life-critical systems,” this session will feature structured arguments, audience participation, and live voting. With opening statements, cross-examination, and closing remarks from both teams, the debate aims to challenge assumptions, spark meaningful discussion, and engage the CPS-IoT Week community in one of the most pressing questions today.
Moderator: Prof. Nalini Venkatasubramanian, University of California, Irvine
Affirmative team: Prof. Mani Srivastava (University of California, Los Angeles), Prof. Tarek Abdelzaher (University of Illinois Urbana-Champaign) and Prof. Anthony Rowe (Carnegie Mellon University)
Negative team: Dr. Georgios Fainekos (Toyota Motor North America R&D), Prof. Sayan Mitra (University of Illinois Urbana-Champaign) and Prof. Oleg Sokolsky (University of Pennsylvania)
Coffee Break
Technical Sessions for all conferences.
10:30 | Data-Driven Dynamic Controller Synthesis for Discrete-Time General Nonlinear Systems (abstract) |
10:55 | From Data to Global Asymptotic Stability of Unknown Large-Scale Networks with Provable Guarantees (abstract) |
11:20 | Robust Identification of Hybrid Automata from Noisy Data (abstract) |
11:45 | SAVER: A Toolbox for Sampling-Based, Probabilistic Verification of Neural Networks (abstract) |
10:30 | T-Tex: Timed Threaded Execution in Real-Time OpenMP (abstract) |
10:52 | Stealthy Computational Delay Attacks on Control Systems (abstract) |
11:14 | MAARS: Multi-Rate Attack-Aware Randomized Scheduling for Securing Real-time Systems (abstract) |
11:36 | Repairing Control Safety Violations via Scheduler Patch Synthesis (abstract) |
10:30 | A Unified Framework for Quantitative Cache Analysis (Outstanding Paper Award) (abstract) |
10:52 | Consistency-aware and Predictable Memory Processing for Safety-critical Out-of-order Multicores (abstract) |
11:14 | ParRP: Enabling Space Isolation in Caches with Shared Data (abstract) |
11:36 | A Field Practical Approach to Memory Bandwidth Allocation for Consolidating Multi-Domain Automotive Applications on a Single SoC (abstract) |
10:30 | UMusic: In-car Occupancy Sensing via High-resolution UWB Power Delay Profile (abstract) |
10:45 | RAM-Hand: Robust Acoustic Multi-Hand Pose Reconstruction Using a Microphone Array (abstract) |
11:00 | LeekyFeeder: In-Air Gesture Control Through Leaky Acoustic Waves (abstract) |
11:15 | LightLLM: A Versatile Large Language Model for Predictive Light Sensing (abstract) |
11:30 | RoboTera: Non-Contact Friction Sensing for Robotic Grasping via Wireless Sub-Terahertz Perception (abstract) |
11:45 | LiDARMarker: Machine-friendly Road Markers for Smart Driving Systems (abstract) |
N2Women (Networking Networking Women) is a discipline-specific community of researchers in the fields of networking and communications. N2Women encourages diversity and aims at fostering connections among under-represented women in this computing (https://n2women.comsoc.org/).
Technical Sessions for all conferences.
13:30 | Monitoring Spatially Distributed Cyber-Physical Systems with Alternating Finite Automata (abstract) |
13:55 | Runtime Enforcement of CPS against Signal Temporal Logic (abstract) |
14:20 | Soteria: A Formal Digital-Twin-Enabled Framework for Safety-Assurance of Latency-Aware Safety-Critical Cyber-Physical Systems (abstract) |
14:45 | Trigger-Based Discretization of Hybrid Games for Autonomous Cyber-Physical Systems (abstract) |
13:30 | Falsification and Control of CPS using the Language Set of Discrete-Time Temporal Logic (abstract) |
13:52 | Uncertainty Quantification for Physics-Informed Traffic Graph Networks (abstract) |
14:14 | Human-In-The-Loop Classification of Adaptive Cruise Control at a Freeway Scale (abstract) |
14:36 | Certified Inductive Synthesis for Online Mixed-Integer Optimization (abstract) |
13:30 | Intelligent Power Distribution Systems: Model, Utilization Bounds, and Implementation (abstract) |
13:52 | Mesh Network Scheduling based on Cyber-Physical Sensitivity for Wireless Control Systems (abstract) |
14:14 | Analysis of Control Systems under Sensor Timing Misalignments (abstract) |
14:36 | Scheduling EV Battery Swap/Charge Operations (abstract) |
13:30 | GPIoT: Tailoring Small Language Models for IoT Program Synthesis and Development (abstract) |
13:45 | TaskSense: A Translation-like Approach for Tasking Heterogeneous Sensor Systems with LLMs (abstract) |
14:00 | SelfReplay: Adapting Self-Supervised Sensory Models via Adaptive Meta-Task Replay (abstract) |
14:15 | Babel: A Scalable Pre-trained Model for Multi-Modal Sensing via Expandable Modality Alignment (abstract) |
14:30 | Toward Sensor-In-the-Loop LLM Agent: Benchmarks and Implications (abstract) |
14:45 | WixUp: A Generic Data Augmentation Framework for Wireless Human Tracking (abstract) |
Technical Sessions for all conferences.
15:30 | Successive Control Barrier Functions for Nonlinear Systems (abstract) |
15:55 | Certifying Lyapunov Stability of Black-Box Nonlinear Systems via Counterexample Guided Synthesis (abstract) |
16:20 | Polyhedral Control Lyapunov Functions for Switched Affine Systems (abstract) |
16:45 | Test of Time Award & Presentation |
15:30 | Psychophysiology-aided Perceptually Fluent Speech Analysis of Children Who Stutter (abstract) |
15:52 | EXACT: A Meta-Learning Framework for Precise Exercise Segmentation in Physical Therapy (abstract) |
16:14 | JOIN: Optimized Light Source Activation for Deep Tissue Optical Sensing (abstract) |
16:36 | Medical CPS Panel Discussion (abstract) |
15:30 | Optimal Task Phasing for End-To-End Latency in Harmonic and Semi-Harmonic Automotive Systems (abstract) |
15:52 | Reconciling ROS 2 with Classical Real-Time Scheduling of Periodic Tasks (abstract) |
16:14 | Jointly Ensuring Timing Disparity and End-to-End Latency Constraints in Hybrid DAGs (Outstanding Paper Award) (abstract) |
16:36 | CROS-RT: Cross-Layer Priority Scheduling for Predictable Inter-Process Communication in ROS 2 (Outstanding Paper Award) (abstract) |
16:58 | Physics-Informed Mixed-Criticality Scheduling for F1Tenth Cars with Preemptable ROS 2 Executors (abstract) |
15:30 | SHADE-AD: An LLM-Based Framework for Synthesizing Activity Data of Alzheimer's Patients (abstract) |
15:45 | Multi-Modal Dataset Across Exertion Levels: Capturing Post-Exercise Speech, Breathing, and Phonocardiogram (abstract) |
16:00 | SensorQA: A Question Answering Benchmark for Daily-Life Monitoring (abstract) |
16:15 | SEE-V2X: C-V2X Direct Communication Dataset: An Application-Centric Approach (abstract) |
16:30 | Business Meeting |
View this program: with abstractssession overviewtalk overview
Speaker: Professor Sanjit A. Seshia, University of California, Berkeley, USA
Abstract: Verified artificial intelligence (AI) is the goal of designing AI systems that have strong, ideally provable, assurances of correctness with respect to formally-specified requirements. This talk will review the main challenges to achieving Verified AI, and the progress the research community has made towards this goal. A particular focus will be on AI-based autonomous and semi-autonomous cyber-physical systems (CPS), and on the role of environment/world modeling throughout the design cycle. We argue for developing a new generation of design automation techniques, rooted in formal methods, to enable and support the routine development of high assurance AI-based autonomy. I will describe our work on formal methods for Verified AI-based autonomy, implemented in the open-source Scenic and VerifAI toolkits. The use of these tools will be demonstrated in industrial case studies involving deep learning-based autonomy in ground and air vehicles. We conclude with an outlook to the future of the Verified AI agenda.
Bio: Sanjit A. Seshia is the Cadence Founders Chair Professor in the Department of Electrical Engineering and Computer Sciences (EECS) at the University of California, Berkeley. His research interests are in formal methods for dependable and secure computing, spanning the areas of cyber-physical systems (CPS), computer security, distributed systems, artificial intelligence (AI), machine learning, and robotics. He is co-author of a widely-used textbook on embedded, cyber-physical systems and has led the development of technologies for cyber-physical systems education based on formal methods. His awards and honors include a Presidential Early Career Award for Scientists and Engineers (PECASE), an Alfred P. Sloan Research Fellowship, the Frederick Emmons Terman Award for contributions to EECS education, the IEEE TCCPS Mid-Career Award, a Distinguished Alumnus Award from IIT Bombay, and the Computer-Aided Verification (CAV) Award for contributions to the foundations of SMT solving. He is a Fellow of the ACM and the IEEE.
Technical Sessions for all conferences.
10:30 | Extracting Forward Invariant Sets from Neural Network-Based Control Barrier Functions (abstract) |
10:55 | A learning-based approach to stochastic optimal control under reach-avoid constraint (abstract) |
11:20 | Inverse-Optimal Safety Control for Hybrid Systems (abstract) |
11:45 | TRUST: StabiliTy and Safety ContRoller Synthesis for Unknown Dynamical Models Using a Single Trajectory (abstract) |
10:30 | eFlx: Energy Flexibility Provisioning for E-taxi Fleets (abstract) |
10:52 | Online Decision-Making Under Uncertainty for Vehicle-to-Building Systems (abstract) |
11:14 | SEQUIN: A Network Science and Physics-based Approach to Identify Sequential N-k Attacks in Electric Power Grids (abstract) |
11:36 | Pay Attention to Network: Reliability-Aware Spatial-Temporal-Frequential Scheduling for TSN-WiFi Networks (abstract) |
10:30 | Handling System Overloads: An Empirical Evaluation of Deadline-Miss Handling Strategies (abstract) |
10:52 | Arm DynamIQ Shared Unit and Real-Time: An Empirical Evaluation (abstract) |
11:14 | LiME: The Linux Real-Time Task Model Extractor (abstract) |
11:36 | ConvolutionalFixedSum: Uniformly Generating Random Values with a Fixed Sum Subject to Arbitrary Constraints (abstract) |
10:30 | Responsive DNN Adaptation for Video Analytics against Environment Shift via Hierarchical Mobile-Cloud Collaborations (abstract) |
10:45 | JumpQ: Stochastic Scheduling to Accelerating Object-detection-driven Mobile Sensing on Object-sparse Video Data (abstract) |
11:00 | Stochastic Differential Equation Networks for Time Series at Edge (abstract) |
11:15 | Lupe: Integrating the Top-down Approach with DNN Execution on Ultra-Low-Power Devices (abstract) |
11:30 | Orbis: Redesigning Neural-enhanced Video Streaming for Live Immersive Viewing (abstract) |
11:45 | E3: Early Exiting with Explainable AI for Real-Time and Accurate DNN Inference in Edge-Cloud Systems (abstract) |
Technical Sessions for all conferences.
13:30 | Memory-dependent abstractions of stochastic systems through the lens of transfer operators (abstract) |
13:55 | Scalable control synthesis for stochastic systems via structural IMDP abstractions (abstract) |
14:20 | Multi-layer Motion Planning with Kinodynamic and Spatio-Temporal Constraints (abstract) |
14:45 | Robust Aggregation of Electric Vehicle Flexibility (abstract) |
13:30 | PLCpot: Application Dialogue Replay based Scalable PLC Honeypot for Industrial Control Systems (abstract) |
13:52 | Atlas: Ensuring Accuracy for Privacy-Preserving Federated IoT Applications (abstract) |
14:14 | Trust-Based Assured Sensor Fusion in Distributed Aerial Autonomy (abstract) |
14:36 | Synthesis of Dynamic Masks for Information-Theoretic Opacity in Stochastic Systems (abstract) |
13:30 | A Design Flow to Securely Isolate FPGA Bus Transactions in Heterogeneous SoCs (abstract) |
13:52 | Janus: OS Support for a Secure, Fast Control-Plane (abstract) |
14:14 | Integrated Real-Time Control and Scheduling for Safety Critical Cyber-Physical Systems (abstract) |
14:36 | Recovery-Guaranteed Sensor Attack Detection for Cyber-Physical Systems (abstract) |
13:30 | SARLink: Satellite Backscatter Connectivity using Synthetic Aperture Radar (abstract) |
13:45 | I4C... Improving I2C’s Dynamism and Efficiency (abstract) |
14:00 | MoLoRa: Intelligent Mobile Antenna System for Enhanced LoRa Reception in Urban Environments (abstract) |
14:15 | FlexiFly: Interfacing the Physical World with Foundation Models Empowered by Reconfigurable (abstract) |
14:30 | Offload Rethinking by Cloud Assistance for Efficient Environmental on LPWANs (abstract) |
14:45 | Mitigating In-Transit Vision Noise for Enhanced Vehicle Safety (abstract) |
Technical Sessions for all conferences.
15:30 | Distributionally Robust Statistical Verification with Imprecise Neural Networks (abstract) |
15:54 | ProbStar Temporal Logic for Verifying Complex Behaviors of Learning-enabled Systems (abstract) |
16:18 | BT2Automata: Expressing Behavior Trees as Automata for Formal Control Synthesis (abstract) |
16:42 | Exploring Behaviors of Hybrid Systems via the Voronoi Bias over Output Signals (abstract) |
17:06 | Explaining Control Policies through Predicate Decision Diagrams (abstract) |
15:30 | Optimal Integrated Task and Path Planning for Collaborative Multi-Robot Systems (abstract) |
15:52 | RLS3: RL-Based Synthetic Sample Selection to Enhance Spatial Reasoning in Vision-Language Models for Indoor Autonomous Perception (abstract) |
16:14 | Accelerating Neural Policy Repair with Preservation via Stability-Plasticity Interpolation (abstract) |
16:36 | Closing Remarks (abstract) |
15:30 | Scheduling Job Streams on Uniprocessors with Cold Start Delays (abstract) |
15:52 | MATCH: Real-Time Scheduling of Multiple and Parallel Data Copies in Heterogeneous Architectures (abstract) |
16:14 | Scheduling Processing Graphs of Gang Tasks on Heterogeneous Platforms (abstract) |
16:36 | A Framework for Managing Edge-Cloud Distributed Embedded Systems (abstract) |
16:58 | HARD: Hardening Real-Time Scheduling and Analysis for Accelerator Enabled Computing (abstract) |
17:20 | Closing Remarks |
15:30 | MMBind: Unleashing the Potential of Distributed and Heterogeneous Data for Multimodal Learning in IoT (abstract) |
15:45 | BioQ: Towards Context-Aware Multi-Device Collaboration with Bio-cues (abstract) |
16:00 | PIPE: Privacy-preserving 6DoF Pose Estimation for Immersive Applications (abstract) |
16:15 | ThermoHands: A Benchmark for 3D Hand Pose Estimation from Egocentric Thermal Images (abstract) |
16:30 | Geoduck: Nanosatellite Constellation Scheduling for Low Latency Event Detection (abstract) |
16:45 | CaphandAuth: Robust and Anti-spoofing Hand Authentication via COTS Capacitive Touchscreens (abstract) |
17:00 | Matching Skeleton-based Activity Representations with Heterogeneous Signals for HAR (abstract) |
17:15 | RetroLiDAR: A Liquid-crystal Fiducial Marker System for High-fidelity Perception of Embodied AI (abstract) |