Abstract is missing.
- The Power of On-line Indirect Surveys to Monitor SocietyAntonio Fernández Anta, Nicolas Nicolaou, Efstathios Stavrakis. [doi]
- Digital Twins for Trustworthy AutonomyFrancesco Flammini. [doi]
- Advancing Secure & Safe IoT and Edge Computing Platforms: Lessons from LoLiPoP IoT and SuzECK projectGeorge E. Violettas. [doi]
- Graphical Security Models and Their ApplicationsDan Dongseong Kim. [doi]
- Approximate and Stochastic Ising MachinesJie Han. 1 [doi]
- Characterizing Modern GPU Resilience and Impact in HPC Systems: A Case Study of A100 GPUsShengkun Cui, Archit Patke, Ziheng Chen, Aditya Ranjan, Hung Nguyen, Phuong Cao, Brett M. Bode, Gregory H. Bauer, Saurabh Jha, Chandra Narayanaswami, Daby Sow, Catello Di Martino, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. 1-6 [doi]
- A Hybrid Cybersecurity Assessment Framework for Unmanned Aircraft Vehicles Based on IMECA and Penetration TestingArtem Abakumov, Vyacheslav Kharchenko, Peter T. Popov. 7-14 [doi]
- Refining Environmental Requirements for Autonomous Driving Systems: Leveraging the FRAV FrameworkMahwish Kundi, Faraz Ahmad, Rosemary Monahan. 15-22 [doi]
- Safety-Centric Architecture for AI-Enabled Autonomous Driving SystemsJatin Arora, Alexandre Esper, Vasco Santos. 23-26 [doi]
- Model-Driven, Logic-Supported Exploratory Dependability AnalysisAndrás Földvári, András Pataricza. 27-34 [doi]
- Enhancing Cyber-Physical System Dependability via Synthesis: Challenges and Future DirectionsMax Taylor, Arthur Amorim. 35-42 [doi]
- Reasoning with Happens-Before Relations About Concurrent Programs in the THETA FrameworkCsanád Telbisz, Levente Bajczi, Dániel Szekeres, András Vörös 0001, István Majzik. 43-46 [doi]
- Dependability Assurance with Symbolic Reasoning in LLM-Enabled SystemsAndrás Gergely Deé-Lukács, András Földvári. 47-54 [doi]
- Program Verification for Rigorous Analysis of Decision Tree Ensembles Against SpecificationsIat Tou Leong, Aleksandar Avdalovic, Raul Barbosa. 55-62 [doi]
- DURA-CPS: A Multi-Role Orchestrator for Dependability Assurance in LLM-Enabled Cyber-Physical SystemsTrisanth Srinivasan, Santosh V. Patapati, Himani Musku, Idhant Gode, Aditya Arora, Samvit Bhattacharya, Abubakr Nazriev, Sanika Hirave, Zaryab Kanjiani, Srinjoy Ghose. 63-70 [doi]
- Leveraging Time-Frequency Features for Contact Classification and Regression with a Piezoelectric Tactile Skin for Robotic FingertipsNicole Alati, Davide Bargellini, Alex Pasquali, Yahya Abbass, Maurizio Valle, Gianluca Palli, Roberto Meattini. 71-78 [doi]
- Ransomware Threats in Manufacturing Industry: Patterns Based on Dark Web Tor GroupsLuis de Marcos, Adrián Domínguez-Díaz, Carlos Cilleruelo, Daniel Rodríguez. 79-82 [doi]
- Human-AI Interaction Implementation in Consolidate Digital Environments Through a Collaborative and Multidisciplinary Design ApproachMichele Zannoni, Virginia Vignali. 83-87 [doi]
- Orchestration of Sustainable Mixed-Criticality Systems Over Heterogenous Edge NodesFrancesco Boccola, Marcello Cinque, Luigi De Simone, Davide De Vita, Nike Di Giacomo. 88-95 [doi]
- Robot Situation and Task Awareness Using Large Language Models and OntologiesVictor Molina, Oriol Ruiz-Celada, Raúl Suárez, Jan Rosell, Isiah Zaplana. 96-103 [doi]
- Experimental Evaluation of a User-Centered Unilateral Telemanipulation System for Training and Control in Robotic Industrial ScenariosMattia Tafuri, Davide Chiaravalli, Mona Saber Gharamaleki, Claudio Melchiorri, Gianluca Palli, Roberto Meattini. 104-110 [doi]
- XMULT: An Energy-Efficient Design of Approximate MultiplierAhsan Rafiq, Maksim Jenihhin. 111-114 [doi]
- Deep&Wide: Achieving Area Efficiency in Scalable Approximate AcceleratorsFarjana Jalil, Muhammad Awais, Qazi Arbab Ahmed, Hassan Ghasemzadeh Mohammadi, Thorsten Jungeblut, Marco Platzner. 115-118 [doi]
- On the Resilience of INT8 Quantized Neural Networks on Low-Power RISC-V DevicesAntonio Porsia, Giacomo Perlo, Annachiara Ruospo, Ernesto Sánchez. 119-122 [doi]
- A Margin Based Early-Stopping Approach for Random Forest ClassifiersMario Barbareschi, Antonio Emmanuele. 123-126 [doi]
- An Architectural Framework for Urban Digital Twin Design: A Case Study on Hydrogeological Risk ManagementAngelo Martella, Antonella Longo, Cristian Martella, Marco Zappatore, Francesca Miccoli. 127-134 [doi]
- An Integrated Digital Twin Architecture for Real-Time Urban Air Quality ManagementManoj Herath, Hrishikesh Dutta, Roberto Minerva, Noël Crespi, Maira Alvi, Syed Mohsan Raza. 135-138 [doi]
- A Digital Twin Approach to Autonomous Emergency Braking: HiL Testing with Raspberry Pi and Standardized ScenariosRoland Nagy, Árpád Török. 139-145 [doi]
- Network and Vehicle Digital Twins for Hardware in the Loop Simulation of C-ITS ApplicationsAndrea Marchetta, Tamás Márton Kazár, Marcello Cinque, Angelo Coppola, Zsombor Petho, Zsolt Szalay, Árpád Török. 146-151 [doi]
- A Digital Twin Network for Proactive Security: The Smart Grid Use-CaseBiagio Boi, Christian Esposito 0001. 152-159 [doi]
- A Model-based Approach for Cybersecurity Assessment of Off-Road and Defense VehiclesUmberto Bellini, Marzieh Kordi, Bruno Crispo, Paolo Lollini, Andrea Bondavalli, Davide Compar. 160-167 [doi]
- Using Digital Twins as an Upgrade Path for Critical Infrastructure Control SystemsHuzaifah Nadeem, Amy Babay. 168-175 [doi]
- Toward Predictive Diagnostics: Real-Time Digital Twin for Electric Vehicle Power SystemsEmil Nagy, József Pázmány, Dávid Tollner, Árpád Török. 176-183 [doi]
- Assessing the Elephant in the Room in Scheduling for Current Hybrid HPC-QC ClustersPaolo Viviani 0001, Roberto Rocco, Matteo Barbieri, Gabriella Bettonte, Elisabetta Boella, Marco Cipollini, Jonathan Frassineti, Fulvio Ganz, Sara Marzella, Daniele Ottaviani, Simone Rizzo, Alberto Scionti, Chiara Vercellino, Giacomo Vitali, Olivier Terzo, Bartolomeo Montrucchio, Daniele Gregori. 184-187 [doi]
- A Typology of Quantum-Classical FaultsEdoardo Giusto, Santiago Núñez Corrales, Alessandro Cilardo, Nicola Mazzocca, Travis S. Humble. 188-195 [doi]
- Near-Term Application Engineering Challenges in Emerging Superconducting Qudit ProcessorsDavide Venturelli, Erik Gustafson, Doga Murat Kürkçüoglu, Silvia Zorzetti. 196-199 [doi]
- ATTAQ: Adversarial Robustness of Quantum Machine LearningFrancesco Marchiori, Mauro Conti. 200-207 [doi]
- Supply Chain Malware Detection via Classical and Quantum Kernel Methods in Embedded SystemsSthefanie Jofer Gomes Passo, Vishal H. Kothavade, John J. Prevost. 208-215 [doi]
- AI-Augmented Parameter Initialization for QAOAJai Nana, Xinpeng Li, Ning Xie 0002, Shusen Pu, Yifan Yu, Qiang Guan, Xiaotian Han, Shuai Xu, Vipin Chaudhary. 216-219 [doi]
- Quantum Circuit Optimization for Protein Structure PredictionXinpeng Li, Vinooth Rao Kulkarni, Jai Nana, Shusen Pu, Ning Xie 0002, Qiang Guan, Ruihao Li 0008, Shulei Zhang, Shuai Xu, Daniel Blankenberg, Vipin Chaudhary. 220-223 [doi]
- Weather Impact Analysis for UAV-based Deforestation Monitoring SystemsTasfia Nuzhat, Fumio Machida, Ermeson Carneiro de Andrade. 224-230 [doi]
- Federated Learning-Based Approach for Landslide Prediction - the Case Study in TaiwanPo-Wu Cheng, Wen-Ping Tsai. 231-234 [doi]
- Beyond Control: Embracing Emergent Behavior in Symbiotic Digital Twin and CPS EcosystemsAndrea Garbugli, Armir Bujari, Paolo Bellavista. 235 [doi]
- Integrating Groundwater Level Forecasting Models into Climate Risk Assessment for Adaptive Water Resource Management: A Case Study of Tainan, TaiwanPei-Ju Tsang, Wen-Ping Tasi. 236-239 [doi]
- Experience: Evaluating Real-Time Drone OS Under Extreme and Adversarial EnvironmentVina Dang, Layann Shaban, Lewis Tseng. 240-241 [doi]
- Revisiting Adversarial Perception Attacks and Defense Methods on Autonomous Driving SystemsCheng Chen, Yuhong Wang, Nafis S. Munir, Xiangwei Zhou, Xugui Zhou. 242-249 [doi]
- On the Transferability of Adversarial Attacks from Convolutional Neural Networks to Variants of ChatGPT4Niklas Bunzel. 250-255 [doi]
- Learning from the Good Ones: Risk Profiling-Based Defenses Against Evasion Attacks on DNNsMohammed Elnawawy, Gargi Mitra, Shahrear Iqbal, Karthik Pattabiraman. 256-258 [doi]
- Audio Jailbreak Attacks: Exposing Vulnerabilities in SpeechGPT in a White-Box FrameworkBinhao Ma, Hanqing Guo, Zhengping Jay Luo 0001, Rui Duan. 259-265 [doi]
- FHE ML Tuxedo: A Tailored Wrapper Architecture for Homomorphic Encryption in Machine LearningMartin Nocker, Linus Henke, Pascal Schöttle. 266-273 [doi]
- Hallucination Detection in LLMs via Beam Search Sampling and Semantic Consistency AnalysisRadouane Bouchekir, Fathiyeh Faghih, Tewodros A. Beyene. 274-281 [doi]
- Securing AI Code Generation Through Automated Pattern-Based PatchingFrancesco Altiero, Domenico Cotroneo, Roberta De Luca, Pietro Liguori. 282-289 [doi]
- Decoding Neighborhood Environments with Large Language ModelsAndrew Cart, Shaohu Zhang, Melanie Escue, Xugui Zhou, Haitao Zhao, Prashanth Busireddygari, Beiyu Lin, Shuang Li. 290-297 [doi]
- A Lightweight Reputation-Based Mechanism for Incentivizing Cooperation in Decentralized Federated LearningKavindu Herath, Suraj Mahangade, Saurabh Bagchi. 298-304 [doi]