When a strategic adversary can attack multiple sensors of a system and freely choose a different set of sensors at different times, how can we ensure that the state estimate remains …
This paper considers the problem of set-based state estimation for linear time-invariant (LTI) systems under time-varying sensor attacks. Provided that the LTI system is stable and …
This paper studies the problem of secure state estimation of a linear time-invariant (LTI) system with bounded noise in the presence of sparse attacks on an unknown, time-varying …
Interconnections in modern systems make them vulnerable to adversarial attackers both by corrupting communication channels and compromising entire subsystems. The field of …
X Lei, G Wen, S Wang - 2023 62nd Annual Conference of the …, 2023 - ieeexplore.ieee.org
This paper investigates the problem of sparse attack isolation and distributed secure state estimation (SSE) for remote sensor network in an attack-prone environment. The attack …
X Lei, G Wen - Chinese Conference on Swarm Intelligence and …, 2023 - Springer
In this paper, we propose a distributed signal reconstruction protocol based on resilient consensus framework under a Byzantine adversary model. Specifically, a compromised …
YS Pethe - 2023 IEEE World Conference on Applied …, 2023 - ieeexplore.ieee.org
Wireless networks have become an integral part of modern communication systems. However, they are vulnerable to security threats due to the inherent nature of wireless …
This thesis focuses on threat analysis and management in distributed learning scenarios intending to develop algorithms to mitigate the impact of adversaries in the network. The …
In this dissertation, we consider the problem of collaborating a network of nodes to accomplish an objective, which could be monitoring the state of a dynamical system or …