Attack Resilient Distributed Estimation: A Consensus+Innovations Approach
暂无分享,去创建一个
[1] Paulo Tabuada,et al. Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.
[2] Soummya Kar,et al. Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.
[3] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[4] Karl Henrik Johansson,et al. Attack models and scenarios for networked control systems , 2012, HiCoNS '12.
[5] Soummya Kar,et al. Resilient Distributed Estimation Through Adversary Detection , 2017, IEEE Transactions on Signal Processing.
[6] Soummya Kar,et al. Distributed Estimation Under Sensor Attacks , 2017 .
[7] Pramod K. Varshney,et al. Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.
[8] Soummya Kar,et al. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems , 2016, IEEE Transactions on Control of Network Systems.
[9] Soummya Kar,et al. Consensus + innovations distributed inference over networks: cooperation and sensing in networked systems , 2013, IEEE Signal Processing Magazine.
[10] Yunghsiang Sam Han,et al. Distributed Bayesian Detection in the Presence of Byzantine Data , 2013, IEEE Transactions on Signal Processing.
[11] H. Vincent Poor,et al. Distributed Linear Parameter Estimation: Asymptotically Efficient Adaptive Strategies , 2011, SIAM J. Control. Optim..
[12] Soummya Kar,et al. Convergence Rate Analysis of Distributed Gossip (Linear Parameter) Estimation: Fundamental Limits and Tradeoffs , 2010, IEEE Journal of Selected Topics in Signal Processing.
[13] B. Gharesifard,et al. Distributed Optimization Under Adversarial Nodes , 2016, IEEE Transactions on Automatic Control.
[14] Soummya Kar,et al. Cyber-Physical Attacks With Control Objectives , 2016, IEEE Transactions on Automatic Control.
[15] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[16] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[17] Soummya Kar,et al. Cyber-physical systems: Dynamic sensor attacks and strong observability , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[18] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[19] Shreyas Sundaram,et al. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.
[20] Shreyas Sundaram,et al. Resilient Asymptotic Consensus in Robust Networks , 2013, IEEE Journal on Selected Areas in Communications.
[21] Marco Stolpe,et al. The Internet of Things: Opportunities and Challenges for Distributed Data Analysis , 2016, SIGKDD Explor..