Login / Signup
Bo Luo
ORCID
Publication Activity (10 Years)
Years Active: 2002-2024
Publications (10 Years): 95
Top Topics
Malware Detection
Access Control
Database
Neural Network
Top Venues
CoRR
ACSAC
CCS
USENIX Security Symposium
</>
Publications
</>
Bo Luo
,
Xiaobao Yang
,
Yu Zhou
Model-Free Predictive Current Control of Permanent Magnet Synchronous Motor Based on Estimation of Current Variations.
IEEE Trans. Ind. Electron.
71 (8) (2024)
Tianyang Chen
,
Peng Xu
,
Stjepan Picek
,
Bo Luo
,
Willy Susilo
,
Hai Jin
,
Kaitai Liang
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
CoRR
(2024)
Yuying Li
,
Zeyan Liu
,
Junyi Zhao
,
Liangqin Ren
,
Fengjun Li
,
Jiebo Luo
,
Bo Luo
The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking.
CoRR
(2024)
Yijun Zhao
,
Lingjing Yu
,
Yong Sun
,
Qingyun Liu
,
Bo Luo
No Source Code? No Problem! Demystifying and Detecting Mask Apps in iOS.
ICPC
(2024)
Yiming Zhang
,
Bo Luo
,
Hao Cheng
,
Zhuling Wang
,
Chaoqiang Jiang
,
Ruikun Mai
A multi-loads capacitive power transfer system for railway intelligent monitoring systems based on single relay plate.
Int. J. Circuit Theory Appl.
52 (1) (2024)
Dongli Liu
,
Wei Wang
,
Peng Xu
,
Laurence T. Yang
,
Bo Luo
,
Kaitai Liang
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases.
CoRR
(2024)
Liangqin Ren
,
Zeyan Liu
,
Fengjun Li
,
Kaitai Liang
,
Zhu Li
,
Bo Luo
PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption.
Proc. Priv. Enhancing Technol.
2024 (3) (2024)
Xuanbo Huang
,
Kaiping Xue
,
Lutong Chen
,
Mingrui Ai
,
Huancheng Zhou
,
Bo Luo
,
Guofei Gu
,
Qibin Sun
You Can Obfuscate, but You Cannot Hide: CrossPoint Attacks against Network Topology Obfuscation.
USENIX Security Symposium
(2024)
Jinrui Ma
,
Lutong Chen
,
Kaiping Xue
,
Bo Luo
,
Xuanbo Huang
,
Mingrui Ai
,
Huanjie Zhang
,
David S. L. Wei
,
Yan Zhuang
FakeBehalf: Imperceptible Email Spoofing Attacks against the Delegation Mechanism in Email Systems.
USENIX Security Symposium
(2024)
Dongli Liu
,
Wei Wang
,
Peng Xu
,
Laurence T. Yang
,
Bo Luo
,
Kaitai Liang
d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases.
USENIX Security Symposium
(2024)
Tianxiao Zhang
,
Wenju Xu
,
Bo Luo
,
Guanghui Wang
Depth-Wise Convolutions in Vision Transformers for Efficient Training on Small Datasets.
CoRR
(2024)
Tianxiao Zhang
,
Kaidong Li
,
Xiangyu Chen
,
Cuncong Zhong
,
Bo Luo
,
Ivan Grijalva Teran
,
Brian McCornack
,
Daniel Flippo
,
Ajay Sharda
,
Guanghui Wang
Aphid Cluster Recognition and Detection in the Wild Using Deep Learning Models.
CoRR
(2023)
Zeyan Liu
,
Zijun Yao
,
Fengjun Li
,
Bo Luo
Check Me If You Can: Detecting ChatGPT-Generated Academic Writing using CheckGPT.
CoRR
(2023)
Tianxiao Zhang
,
Kaidong Li
,
Xiangyu Chen
,
Cuncong Zhong
,
Bo Luo
,
Ivan Grijalva Teran
,
Brian McCornack
,
Daniel Flippo
,
Ajay Sharda
,
Guanghui Wang
A New Dataset and Comparative Study for Aphid Cluster Detection.
CoRR
(2023)
Tianyang Chen
,
Peng Xu
,
Stjepan Picek
,
Bo Luo
,
Willy Susilo
,
Hai Jin
,
Kaitai Liang
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
NDSS
(2023)
Tao Xue
,
Yu Wen
,
Bo Luo
,
Gang Li
,
Yingjiu Li
,
Boyang Zhang
,
Yang Zheng
,
Yanfei Hu
,
Dan Meng
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics.
IEEE Trans. Dependable Secur. Comput.
20 (2) (2023)
Sohaib Kiani
,
Jared Barton
,
Jon Sushinsky
,
Lynda Heimbach
,
Bo Luo
Counterfactual Prediction Under Selective Confounding.
CoRR
(2023)
Tianxiao Zhang
,
Andrés M. Bur
,
Shannon Kraft
,
Hannah Kavookjian
,
Bryan Renslo
,
Xiangyu Chen
,
Bo Luo
,
Guanghui Wang
Gender, Smoking History and Age Prediction from Laryngeal Images.
CoRR
(2023)
Tianxiao Zhang
,
Andrés M. Bur
,
Shannon Kraft
,
Hannah Kavookjian
,
Bryan Renslo
,
Xiangyu Chen
,
Bo Luo
,
Guanghui Wang
Gender, Smoking History, and Age Prediction from Laryngeal Images.
J. Imaging
9 (6) (2023)
Kevin Li
,
Zhaohui Wang
,
Ye Wang
,
Bo Luo
,
Fengjun Li
Poster: Ethics of Computer Security and Privacy Research - Trends and Standards from a Data Perspective.
CCS
(2023)
Zhaohui Wang
,
Bo Luo
,
Fengjun Li
Poster Abstract: SmartAppZoo: a Repository of SmartThings Apps for IoT Benchmarking.
IoTDI
(2023)
Sohaib Kiani
,
Jared Barton
,
Jon Sushinsky
,
Lynda Heimbach
,
Bo Luo
Counterfactual Prediction Under Selective Confounding.
ECAI
(2023)
Javaria Ahmad
,
Fengjun Li
,
Bo Luo
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps.
ESORICS (2)
(2022)
Tianxiao Zhang
,
Bo Luo
,
Ajay Sharda
,
Guanghui Wang
Dynamic Label Assignment for Object Detection by Combining Predicted IoUs and Anchor IoUs.
J. Imaging
8 (7) (2022)
Jingchun Xiang
,
Chaoqiang Jiang
,
Tianlu Ma
,
Xiaosheng Wang
,
Bo Luo
,
Li Fang
A Comparison of Advanced IPT Systems with Nanocrystalline and Ferrite Cores for Wireless EV Charging.
IECON
(2022)
Zeyan Liu
,
Fengjun Li
,
Jingqiang Lin
,
Zhu Li
,
Bo Luo
Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems.
ESORICS (3)
(2022)
James Pope
,
Jinyuan Liang
,
Vijay Kumar
,
Francesco Raimondo
,
Xinyi Sun
,
Ryan McConville
,
Thomas Pasquier
,
Robert J. Piechocki
,
George Oikonomou
,
Bo Luo
,
Dan Howarth
,
Ioannis Mavromatis
,
Adrián Sánchez-Mompó
,
Pietro Carnelli
,
Theodoros Spyridopoulos
,
Aftab Khan
Resource-Interaction Graph: Efficient Graph Representation for Anomaly Detection.
CoRR
(2022)
Wenchi Ma
,
Xuemin Tu
,
Bo Luo
,
Guanghui Wang
Semantic clustering based deduction learning for image recognition and classification.
Pattern Recognit.
124 (2022)
Zeyan Liu
,
Fengjun Li
,
Zhu Li
,
Bo Luo
LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks.
CCS
(2022)
Ishrak Hayet
,
Zijun Yao
,
Bo Luo
Invernet: An Inversion Attack Framework to Infer Fine-Tuning Datasets through Word Embeddings.
EMNLP (Findings)
(2022)
Mingrui Ai
,
Kaiping Xue
,
Bo Luo
,
Lutong Chen
,
Nenghai Yu
,
Qibin Sun
,
Feng Wu
Blacktooth: Breaking through the Defense of Bluetooth in Silence.
CCS
(2022)
Zeyan Liu
,
Fengjun Li
,
Jingqiang Lin
,
Zhu Li
,
Bo Luo
Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems.
CoRR
(2022)
Ziqiang Ma
,
Shuaigang Li
,
Jingqiang Lin
,
Quanwei Cai
,
Shuqin Fan
,
Fan Zhang
,
Bo Luo
Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature.
SecureComm
(2022)
Tianxiao Zhang
,
Ajay Sharda
,
Bo Luo
,
Guanghui Wang
Dynamic Label Assignment for Object Detection by Combining Predicted and Anchor IoUs.
CoRR
(2022)
Sohaib Kiani
,
Sana Awan
,
Chao Lan
,
Fengjun Li
,
Bo Luo
Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency.
CoRR
(2021)
Sohaib Kiani
,
Sana Awan
,
Chao Lan
,
Fengjun Li
,
Bo Luo
Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency.
ACSAC
(2021)
Wenchi Ma
,
Xuemin Tu
,
Bo Luo
,
Guanghui Wang
Semantic Clustering based Deduction Learning for Image Recognition and Classification.
CoRR
(2021)
Prashanthi Mallojula
,
Javaria Ahmad
,
Fengjun Li
,
Bo Luo
You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps.
TrustCom
(2021)
Congwu Li
,
Le Guan
,
Jingqiang Lin
,
Bo Luo
,
Quanwei Cai
,
Jiwu Jing
,
Jing Wang
Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory.
IEEE Trans. Dependable Secur. Comput.
18 (3) (2021)
Sana Awan
,
Bo Luo
,
Fengjun Li
CONTRA: Defending Against Poisoning Attacks in Federated Learning.
ESORICS (1)
(2021)
James Pope
,
Francesco Raimondo
,
Vijay Kumar
,
Ryan McConville
,
Robert J. Piechocki
,
George Oikonomou
,
Thomas Pasquier
,
Bo Luo
,
Dan Howarth
,
Ioannis Mavromatis
,
Pietro Edoardo Carnelli
,
Adrián Sánchez-Mompó
,
Theodoros Spyridopoulos
,
Aftab Khan
Container Escape Detection for Edge Devices.
SenSys
(2021)
Abdulmalik Humayed
,
Fengjun Li
,
Jingqiang Lin
,
Bo Luo
CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks.
ESORICS (1)
(2020)
Chengming Shi
,
Bo Luo
,
Songping He
,
Kai Li
,
Hongqi Liu
,
Bin Li
Tool Wear Prediction via Multidimensional Stacked Sparse Autoencoders With Feature Fusion.
IEEE Trans. Ind. Informatics
16 (8) (2020)
Linzhi Jiang
,
Chunxiang Xu
,
Xiaofang Wang
,
Bo Luo
,
Huaqun Wang
Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain.
IEEE Trans. Dependable Secur. Comput.
17 (1) (2020)
Bo Luo
,
Razvan Beuran
,
Yasuo Tan
Smart Grid Security: Attack Modeling from a CPS Perspective.
ComComAP
(2020)
Tao Xue
,
Yu Wen
,
Bo Luo
,
Boyang Zhang
,
Yang Zheng
,
Yanfei Hu
,
Yingjiu Li
,
Gang Li
,
Dan Meng
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark.
ACSAC
(2020)
Lingjing Yu
,
Bo Luo
,
Jun Ma
,
Zhaoyu Zhou
,
Qingyun Liu
You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi.
USENIX Security Symposium
(2020)
Yu Li
,
Min Li
,
Bo Luo
,
Ye Tian
,
Qiang Xu
DeepDyve: Dynamic Verification for Deep Neural Networks.
CoRR
(2020)
Bo Luo
,
Min Li
,
Yu Li
,
Qiang Xu
On Configurable Defense against Adversarial Example Attacks.
ACM Great Lakes Symposium on VLSI
(2020)
Sohaib Kiani
,
Sana Awan
,
Jun Huan
,
Fengjun Li
,
Bo Luo
WOLF: automated machine learning workflow management framework for malware detection and other applications.
HotSoS
(2020)
Yu Li
,
Min Li
,
Bo Luo
,
Ye Tian
,
Qiang Xu
DeepDyve: Dynamic Verification for Deep Neural Networks.
CCS
(2020)
Bing Bai
,
Guanhua Zhang
,
Ye Lin
,
Hao Li
,
Kun Bai
,
Bo Luo
CSRN: Collaborative Sequential Recommendation Networks for News Retrieval.
CoRR
(2020)
Le Guan
,
Chen Cao
,
Sencun Zhu
,
Jingqiang Lin
,
Peng Liu
,
Yubin Xia
,
Bo Luo
Protecting mobile devices from physical memory attacks with targeted encryption.
WiSec
(2019)
Anirudh Narasimman
,
Qiaozhi Wang
,
Fengjun Li
,
Dongwon Lee
,
Bo Luo
Arcana: Enabling Private Posts on Public Microblog Platforms.
SEC
(2019)
Fangjie Jiang
,
Quanwei Cai
,
Jingqiang Lin
,
Bo Luo
,
Le Guan
,
Ziqiang Ma
TF-BIV: transparent and fine-grained binary integrity verification in the cloud.
ACSAC
(2019)
Linzhi Jiang
,
Liqun Chen
,
Thanassis Giannetsos
,
Bo Luo
,
Kaitai Liang
,
Jinguang Han
Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case.
IEEE Internet Things J.
6 (6) (2019)
Bo Luo
,
Haoting Wang
,
Hongqi Liu
,
Bin Li
,
Fangyu Peng
Early Fault Detection of Machine Tools Based on Deep Learning and Dynamic Identification.
IEEE Trans. Ind. Electron.
66 (1) (2019)
Chengming Shi
,
George Panoutsos
,
Bo Luo
,
Hongqi Liu
,
Bin Li
,
Xu Lin
Using Multiple-Feature-Spaces-Based Deep Learning for Tool Condition Monitoring in Ultraprecision Manufacturing.
IEEE Trans. Ind. Electron.
66 (5) (2019)
Adaku Uchendu
,
Jeffrey Cao
,
Qiaozhi Wang
,
Bo Luo
,
Dongwon Lee
Characterizing Man-made vs. Machine-made Chatbot Dialogs.
TTO
(2019)
Sana Awan
,
Fengjun Li
,
Bo Luo
,
Mei Liu
Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain.
CCS
(2019)
Bo Luo
,
Yu Li
,
Lingxiao Wei
,
Qiang Xu
On Functional Test Generation for Deep Neural Network IPs.
DATE
(2019)
Yu Li
,
Yannan Liu
,
Min Li
,
Ye Tian
,
Bo Luo
,
Qiang Xu
D2NN: a fine-grained dual modular redundancy framework for deep neural networks.
ACSAC
(2019)
Bo Luo
,
Yu Li
,
Lingxiao Wei
,
Qiang Xu
On Functional Test Generation for Deep Neural Network IPs.
CoRR
(2019)
Jinchao Zhang
,
Bo Luo
,
Fenfang Cao
The antecedent and consequence of users' satisfaction and dissatisfaction with information seeking in online health communities.
ASIST
(2019)
Hui-fen Huang
,
Bo Luo
Wideband Coding Metamaterial with Polarization Insensitivity.
ComComAP
(2019)
Zhaoyu Zhou
,
Lingjing Yu
,
Qingyun Liu
,
Yang Liu
,
Bo Luo
Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities.
ICICS
(2019)
Bo Luo
,
Qiang Xu
Region-Wise Attack: On Efficient Generation of Robust Physical Adversarial Examples.
CoRR
(2019)
Ziqiang Ma
,
Quanwei Cai
,
Jingqiang Lin
,
Bo Luo
,
Jiwu Jing
Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers.
J. Comput. Secur.
27 (5) (2019)
Hao Xue
,
Qiaozhi Wang
,
Bo Luo
,
Hyunjin Seo
,
Fengjun Li
Content-Aware Trust Propagation Toward Online Review Spam Detection.
ACM J. Data Inf. Qual.
11 (3) (2019)
Qiaozhi Wang
,
Hao Xue
,
Fengjun Li
,
Dongwon Lee
,
Bo Luo
#DontTweetThis: Scoring Private Information in Social Networks.
Proc. Priv. Enhancing Technol.
2019 (4) (2019)
Chao Liu
,
Jianan Li
,
Min Yu
,
Bo Luo
,
Song Li
,
Kai Chen
,
Weiqing Huang
,
Bin Lv
FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection.
SecureComm (1)
(2018)
Chen Cao
,
Le Guan
,
Ning Zhang
,
Neng Gao
,
Jingqiang Lin
,
Bo Luo
,
Peng Liu
,
Ji Xiang
,
Wenjing Lou
CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices.
RAID
(2018)
Congwu Li
,
Jingqiang Lin
,
Quanwei Cai
,
Bo Luo
Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines.
ISPA/IUCC/BDCloud/SocialCom/SustainCom
(2018)
Lingjing Yu
,
Sri Mounica Motipalli
,
Dongwon Lee
,
Peng Liu
,
Heng Xu
,
Qingyun Liu
,
Jianlong Tan
,
Bo Luo
My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks.
SACMAT
(2018)
Le Guan
,
Jingqiang Lin
,
Ziqiang Ma
,
Bo Luo
,
Luning Xia
,
Jiwu Jing
Copker: A Cryptographic Engine Against Cold-Boot Attacks.
IEEE Trans. Dependable Secur. Comput.
15 (5) (2018)
Lei Yang
,
Chris Seasholtz
,
Bo Luo
,
Fengjun Li
Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways.
ESORICS (1)
(2018)
Chao Liu
,
Jianan Li
,
Min Yu
,
Gang Li
,
Bo Luo
,
Kai Chen
,
Jianguo Jiang
,
Weiqing Huang
URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls.
IPCCC
(2018)
Lingxiao Wei
,
Bo Luo
,
Yu Li
,
Yannan Liu
,
Qiang Xu
I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators.
ACSAC
(2018)
Lingxiao Wei
,
Yannan Liu
,
Bo Luo
,
Yu Li
,
Qiang Xu
I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators.
CoRR
(2018)
Bo Luo
,
Min Li
,
Yu Li
,
Qiang Xu
On Configurable Defense against Adversarial Example Attacks.
CoRR
(2018)
Bo Luo
,
Yannan Liu
,
Lingxiao Wei
,
Qiang Xu
Towards Imperceptible and Robust Adversarial Example Attacks Against Neural Networks.
AAAI
(2018)
Bo Luo
,
Yannan Liu
,
Lingxiao Wei
,
Qiang Xu
Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks.
CoRR
(2018)
Wenjun Huang
,
Ruimin Hu
,
Chao Liang
,
Weijian Ruan
,
Bo Luo
Structural superpixel descriptor for visual tracking.
IJCNN
(2017)
Qiaozhi Wang
,
Jaisneet Bhandal
,
Shu Huang
,
Bo Luo
Classification of Private Tweets Using Tweet Content.
ICSC
(2017)
Abdulmalik Humayed
,
Bo Luo
Using ID-Hopping to Defend Against Targeted DoS on CAN.
SCAV@CPSWeek
(2017)
Le Guan
,
Shijie Jia
,
Bo Chen
,
Fengwei Zhang
,
Bo Luo
,
Jingqiang Lin
,
Peng Liu
,
Xinyu Xing
,
Luning Xia
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
ACSAC
(2017)
Qiaozhi Wang
,
Jaisneet Bhandal
,
Shu Huang
,
Bo Luo
Content-Based Classification of Sensitive Tweets.
Int. J. Semantic Comput.
11 (4) (2017)
Yannan Liu
,
Lingxiao Wei
,
Bo Luo
,
Qiang Xu
Fault injection attack on deep neural network.
ICCAD
(2017)
Quanwei Cai
,
Jonathan Lutes
,
Jingqiang Lin
,
Bo Luo
A-Tor: Accountable Anonymity in Tor.
SecureComm
(2017)
Abdulmalik Humayed
,
Jingqiang Lin
,
Fengjun Li
,
Bo Luo
Cyber-Physical Systems Security - A Survey.
IEEE Internet Things J.
4 (6) (2017)
Chao Lan
,
Yuhao Yang
,
Xiaoli Li
,
Bo Luo
,
Jun Huan
Learning Social Circles in Ego-Networks Based on Multi-View Network Structure.
IEEE Trans. Knowl. Data Eng.
29 (8) (2017)
Abdulmalik Humayed
,
Jingqiang Lin
,
Fengjun Li
,
Bo Luo
Cyber-Physical Systems Security - A Survey.
CoRR
(2017)
Jingqiang Lin
,
Bo Luo
,
Le Guan
,
Jiwu Jing
Secure Computing Using Registers and Caches: The Problem, Challenges, and Solutions.
IEEE Secur. Priv.
14 (6) (2016)
Weijian Ruan
,
Jun Chen
,
Jinqiao Wang
,
Bo Luo
,
Wenjun Huang
,
Ruimin Hu
Boosted local classifiers for visual tracking.
ICME
(2016)
Yang Tian
,
Ranjith Sompalli
,
Guanghui Wang
,
Bo Luo
Textual Ontology and Visual Features Based Search for a Paleontology Digital Library.
ICTAI
(2016)
Caitlin McCollister
,
Bo Luo
,
Shu Huang
Building Topic Models to Predict Author Attributes from Twitter Messages.
CLEF (Working Notes)
(2015)
Jamuna Gopal
,
Shu Huang
,
Bo Luo
FamilyID: A Hybrid Approach to Identify Family Information from Microblogs.
DBSec
(2015)
Manogna Thimma
,
Fang Liu
,
Jingqiang Lin
,
Bo Luo
HyXAC: Hybrid XML Access Control Integrating View-Based and Query-Rewriting Approaches.
IEEE Trans. Knowl. Data Eng.
27 (8) (2015)
Fengjun Li
,
Xin Fu
,
Bo Luo
POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations.
CCS
(2015)
Abdulmalik Humayed
,
Bo Luo
Cyber-physical security for smart cars: taxonomy of vulnerabilities, threats, and attacks.
ICCPS
(2015)