Byzantine machine learning: A primer

R Guerraoui, N Gupta, R Pinot - ACM Computing Surveys, 2024 - dl.acm.org
The problem of Byzantine resilience in distributed machine learning, aka Byzantine machine
learning, consists of designing distributed algorithms that can train an accurate model …

Resource-efficient and secure distributed state estimation over wireless sensor networks: A survey

XC Jia - International Journal of Systems Science, 2021 - Taylor & Francis
Wireless sensor networks (WSNs) are extensively adopted for remote monitoring and
tracking scenarios, such as battlefield surveillance, target detection and tracking, traffic …

Cyber-physical coordinated risk mitigation in smart grids based on attack-defense game

Z Zhang, S Huang, Y Chen, B Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Since modern smart grids have various and deeply coupled cyber-physical components,
they are vulnerable to malicious cyber attacks. Although regular defenses including firewall …

How to secure distributed filters under sensor attacks

X He, X Ren, H Sandberg… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this article, we study how to secure distributed filters for linear time-invariant systems with
bounded noise under false-data injection attacks. A malicious attacker is able to arbitrarily …

Privacy-preserving distributed Kalman filtering

A Moradi, NKD Venkategowda… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Distributed Kalman filtering techniques enable agents of a multiagent network to enhance
their ability to track a system and learn from local cooperation with neighbors. Enabling this …

[HTML][HTML] Distributed control under compromised measurements: Resilient estimation, attack detection, and vehicle platooning

X He, E Hashemi, KH Johansson - Automatica, 2021 - Elsevier
We study how to design a secure observer-based distributed controller such that a group of
vehicles can achieve accurate state estimates and formation control even if the …

Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation

J Shang, J Zhou, T Chen - Automatica, 2022 - Elsevier
Remote state estimation through a wireless communication network is usually vulnerable to
malicious cyber-attacks, which can manipulate transmitted data without even being …

Sensor fault detection and isolation via networked estimation: Full-rank dynamical systems

M Doostmohammadian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This article considers the problem of simultaneous sensor fault detection, isolation, and
networked estimation of linear full-rank dynamical systems. The proposed networked …

Distributed anti-Eavesdropping fusion estimation under energy constraints

D Xu, B Chen, Y Zhang, L Yu - IEEE Transactions on Automatic …, 2023 - ieeexplore.ieee.org
In this article, we study the distributed fusion estimation problem with energy-constrained
sensors in the presence of eavesdroppers, where smart sensors send their local estimates …

Byzantine fault tolerant distributed linear regression

N Gupta, NH Vaidya - arXiv preprint arXiv:1903.08752, 2019 - arxiv.org
This paper considers the problem of Byzantine fault tolerance in distributed linear regression
in a multi-agent system. However, the proposed algorithms are given for a more general …