systems under time-varying sensor attacks. Provided that the LTI system is stable and
observable via every single sensor and that at least one sensor is uncompromised, we
guarantee that the true state is always contained in the estimated set. We use zonotopes to
represent these sets for computational efficiency. However, we show that intelligently
designed stealthy attacks may cause exponential growth in the algorithm's worst-case …