A Verifiable Computing Scheme for Encrypted Control Systems

F Stabile, W Lucia, A Youssef… - IEEE Control Systems …, 2024 - ieeexplore.ieee.org
The proliferation of cloud computing technologies has paved the way for deploying
networked encrypted control systems, offering high performance, remote accessibility and …

A Data-Driven Approach To Preserve Safety and Reference Tracking for Constrained Cyber-Physical Systems Under Network Attacks

M Attar, W Lucia - arXiv preprint arXiv:2410.00208, 2024 - arxiv.org
This paper proposes a worst-case data-driven control architecture capable of ensuring the
safety of constrained Cyber-Physical Systems under cyber-attacks while minimizing …

A Modular Safety Filter for Safety-Certified Cyber-Physical Systems

M Bajelani, W Lucia, K van Heusden - arXiv preprint arXiv:2403.15854, 2024 - arxiv.org
Nowadays, many control systems are networked and embed communication and
computation capabilities. Such control architectures are prone to cyber attacks on the …

Optimal Stealthy Attack Design Using Sequential Linear Programming

DDK Nguyen, C Escudero, E Zamaï… - … on Control and …, 2024 - ieeexplore.ieee.org
This article presents a novel methodology based on Sequential Linear Programming (SLP)
for designing optimal (stealthy) attack sequences aimed at maximizing a nonlinear attack …

Actuator and Sensor Attacks Detection Method based on Attack Reconstruction

DDK Nguyen, C Escudero… - … on Control and …, 2024 - ieeexplore.ieee.org
This article outlines a method for designing Sliding Mode Observer (SMO) to detect and
reconstruct attacks, demonstrating robustness against system uncertainty. Additionally, a …