A brief survey on encrypted control: From the first to the second generation and beyond

N Schlüter, P Binfet, MS Darup - Annual Reviews in Control, 2023 - Elsevier
This article provides a comprehensive and illustrative presentation of the young field of
encrypted control. In particular, we survey the evolution of encrypted controllers from their …

EVAD: encrypted vibrational anomaly detection with homomorphic encryption

A Falcetta, M Roveri - Neural Computing and Applications, 2024 - Springer
One of the main concerns of cloud-based services based on machine and deep learning
algorithms is the privacy of users' data. This is particularly relevant when companies want to …

Privacy Preserving Anomaly Detection on Homomorphic Encrypted Data from IoT Sensors

A Hangan, D Lazea, T Cioara - arXiv preprint arXiv:2403.09322, 2024 - arxiv.org
IoT devices have become indispensable components of our lives, and the advancement of
AI technologies will make them even more pervasive, increasing the vulnerability to …

Learning with errors based dynamic encryption that discloses residue signal for anomaly detection

Y Jang, J Lee, J Kim, H Shim - arXiv preprint arXiv:2404.02574, 2024 - arxiv.org
Anomaly detection is a protocol that detects integrity attacks on control systems by
comparing the residue signal with a threshold. Implementing anomaly detection on …

Resilient Encryption of Cloud-Based Control Systems

M Fauser - 2024 - kluedo.ub.rptu.de
Cloud-based control systems leverage cloud computing to provide scalable services and
real-time resource access over the internet. However, they face vulnerabilities such as …

[PDF][PDF] Security Analysis and Design of Encrypted Control Systems Using Homomorphic Encryption

寺西郁 - 2024 - uec.repo.nii.ac.jp
Security and privacy are significant concerns in realizing dependable cyberphysical
systems. To ensure the security and privacy of these systems, systems and control …