Bowen Zheng

Learn More
Carbon nanotubes (CNTs) [1, 2] have dimensions similar to those of typical polymeric chains, with 1-50nm in diameter and 1-10µm in length. Experimental results on individual carbon nanotubes and nanotube bundles show that they have exceptional electrical and mechanical properties with an elastic modulus of ~1TPa and fracture strain of 5-10%. [3] The thermal(More)
The safety of real-time embedded systems relies on both functional and timing correctness. On the timing side, real-time constraints are set on task executions, and missing them may lead to system failure. On the functional side, soft errors have become a major concern. Various soft error tolerance strategies are proposed for soft error detection and(More)
Cyber-security has emerged as a pressing issue for transportation systems. Studies have shown that attackers can attack modern vehicles from a variety of interfaces and gain access to the most safety-critical components. Such threats become even broader and more challenging with the emergence of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I)(More)
In this article, we propose a new lifetime task optimization technique for real-time embedded processors considering the electromigration-induced reliability. The new approach is based on a recently proposed physics-based electromigration (EM) model for more accurate EM assessment of a power grid network at the chip level. We apply the dynamic voltage and(More)
In this article, we address both security and safety requirements and solve security-aware design problems for the controller area network (CAN) protocol and time division multiple access (TDMA)-based protocols. To provide insights and guidelines for other similar security problems with limited resources and strict timing constraints, we propose a general(More)
We have studied the stress wave propagation in one-dimensional (1-D) nanoscopic buckyball (C60) system by molecular dynamics (MD) simulation and quantitative modeling. Simulation results have shown that solitary waves are generated and propagating in the buckyball system through impacting one buckyball at one end of the buckyball chain. We have found the(More)
Demand response (DR) is an effective mechanism in improving power system efficiency and reducing energy cost for customers. However, DR processes might be vulnerable to cyber attacks from the usage of advanced metering infrastructure and wide-area network to exchange information. In this paper, we study potential attacks for a proactive demand participation(More)
The most important blocks in the digital part of a RFID reader are the MCU which controls all the system work in an efficient way and the modulator which is used to accomplish the digital signal processing. As now most commercial RFID readers are discrete component design and researching on implementation of single chip RFID reader is few, this paper point(More)
Security attacks may have disruptive consequences on cyber-physical systems, and lead to significant social and economic losses. Building secure cyber-physical systems is particularly challenging due to the variety of attack surfaces from the cyber and physical components, and often to limited computation and communication resources. In this paper, we(More)