Map-Based Localization Under Adversarial Attacks
暂无分享,去创建一个
[1] Thia Kirubarajan,et al. Estimation with Applications to Tracking and Navigation: Theory, Algorithms and Software , 2001 .
[2] Claire J. Tomlin,et al. Secure Estimation based Kalman Filter for Cyber-Physical Systems against Adversarial Attacks , 2015, ArXiv.
[3] Hadi Sadoghi Yazdi,et al. Kalman filtering based on the maximum correntropy criterion in the presence of non-Gaussian noise , 2016, 2016 Annual Conference on Information Science and Systems (CISS).
[4] Paulo Tabuada,et al. Attack-resilient state estimation in the presence of noise , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[5] Stephen P. Boyd,et al. An Interior-Point Method for Large-Scale $\ell_1$-Regularized Least Squares , 2007, IEEE Journal of Selected Topics in Signal Processing.
[6] Stergios I. Roumeliotis,et al. IMU-RGBD camera 3D pose estimation and extrinsic calibration: Observability analysis and consistency improvement , 2013, 2013 IEEE International Conference on Robotics and Automation.
[7] F. Dellaert. Factor Graphs and GTSAM: A Hands-on Introduction , 2012 .
[8] Ninghui Li,et al. Introduction to special section SACMAT'08 , 2011, TSEC.
[9] João Pedro Hespanha,et al. Observability of linear systems under adversarial attacks , 2015, 2015 American Control Conference (ACC).
[10] Paulo Tabuada,et al. Robustness of attack-resilient state estimators , 2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).
[11] Paulo Tabuada,et al. A Satisfiability Modulo Theory Approach to Secure State Reconstruction in Differentially Flat Systems Under Sensor Attacks , 2015, ArXiv.
[12] Claire J. Tomlin,et al. Secure Estimation for Unmanned Aerial Vehicles against Adversarial Cyber Attacks , 2016, ArXiv.
[13] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[14] R. Murray,et al. Multi-dimensional state estimation in adversarial environment , 2015, 2015 34th Chinese Control Conference (CCC).
[15] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[16] Insup Lee,et al. Attack-Resilient State Estimation for Noisy Dynamical Systems , 2017, IEEE Transactions on Control of Network Systems.
[17] M. V. Kulikova,et al. Square-root algorithms for maximum correntropy estimation of linear discrete-time systems in presence of non-Gaussian noise , 2016, Syst. Control. Lett..
[18] Dan Simon,et al. Kalman filtering based on the maximum correntropy criterion in the presence of non-Gaussian noise , 2016 .
[19] Insup Lee,et al. Attack resilient state estimation for autonomous robotic systems , 2014, 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[20] Xi Liu,et al. Extended Kalman filter under maximum correntropy criterion , 2016, 2016 International Joint Conference on Neural Networks (IJCNN).
[21] Stergios I. Roumeliotis,et al. Observability-based Rules for Designing Consistent EKF SLAM Estimators , 2010, Int. J. Robotics Res..
[22] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[23] Paulo Tabuada,et al. Sound and complete state estimation for linear dynamical systems under sensor attacks using Satisfiability Modulo Theory solving , 2015, 2015 American Control Conference (ACC).
[24] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[25] A. Krener,et al. Nonlinear controllability and observability , 1977 .
[26] Emmanuel J. Candès,et al. Decoding by linear programming , 2005, IEEE Transactions on Information Theory.
[27] Stergios I. Roumeliotis,et al. Stochastic cloning: a generalized framework for processing relative state measurements , 2002, Proceedings 2002 IEEE International Conference on Robotics and Automation (Cat. No.02CH37292).
[28] Eduardo Mario Nebot,et al. Optimization of the simultaneous localization and map-building algorithm for real-time implementation , 2001, IEEE Trans. Robotics Autom..
[29] Bruno Sinopoli,et al. Secure Estimation in the Presence of Integrity Attacks , 2013, IEEE Transactions on Automatic Control.