Attack-resilient distributed formation control via online adaptation
暂无分享,去创建一个
[1] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[2] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[3] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[4] Ruggero Carli,et al. Distributed Estimation and False Data Detection with Application to Power Networks , 2011, ArXiv.
[5] Bruno Sinopoli,et al. Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.
[6] João Pedro Hespanha,et al. Stabilization of nonlinear systems with limited information feedback , 2005, IEEE Transactions on Automatic Control.
[7] Wei Zhang,et al. Stability of networked control systems: explicit analysis of delay , 2000, Proceedings of the 2000 American Control Conference. ACC (IEEE Cat. No.00CH36334).
[8] Nicola Elia,et al. Stabilization of linear systems with limited information , 2001, IEEE Trans. Autom. Control..
[9] M. Dufwenberg. Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.
[10] John S. Baras,et al. A Trust Based Distributed Kalman Filtering Approach for Mode Estimation in Power Systems , 2010 .
[11] Robin J. Evans,et al. Topological feedback entropy and Nonlinear stabilization , 2004, IEEE Transactions on Automatic Control.
[12] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[13] Vijay Gupta,et al. On Stability in the Presence of Analog Erasure Channel Between the Controller and the Actuator , 2010, IEEE Transactions on Automatic Control.
[14] Shreyas Sundaram,et al. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.
[15] Jorge Cortés,et al. Global and robust formation-shape stabilization of relative sensing networks , 2009, Autom..
[16] William B. Dunbar,et al. Distributed receding horizon control for multi-vehicle formation stabilization , 2006, Autom..
[17] Robin J. Evans,et al. Feedback Control Under Data Rate Constraints: An Overview , 2007, Proceedings of the IEEE.
[18] Vijay Gupta,et al. On stability in the presence of analog erasure channels , 2008, 2008 47th IEEE Conference on Decision and Control.
[19] Daniel Liberzon,et al. Quantized feedback stabilization of linear systems , 2000, IEEE Trans. Autom. Control..
[20] Tamer Basar,et al. Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer , 2010, 49th IEEE Conference on Decision and Control (CDC).
[21] Minghui Zhu,et al. Stackelberg-game analysis of correlated attacks in cyber-physical systems , 2011, Proceedings of the 2011 American Control Conference.
[22] Brian D. O. Anderson,et al. Reaching a Consensus in a Dynamically Changing Environment: Convergence Rates, Measurement Delays, and Asynchronous Events , 2008, SIAM J. Control. Optim..
[23] Bruno Sinopoli,et al. False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[24] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[25] John S. Baras,et al. Game Theoretic Modeling of Malicious Users in Collaborative Networks , 2008, IEEE Journal on Selected Areas in Communications.
[26] B. Pasik-Duncan,et al. Adaptive Control , 1996, IEEE Control Systems.
[27] Dragan Nesic,et al. Input-output stability properties of networked control systems , 2004, IEEE Transactions on Automatic Control.
[28] Richard M. Murray,et al. Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.
[29] Panos J. Antsaklis,et al. Risk-sensitive control under a class of denial-of-service attack models , 2011, Proceedings of the 2011 American Control Conference.
[30] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[31] Jie Lin,et al. Coordination of groups of mobile autonomous agents using nearest neighbor rules , 2003, IEEE Trans. Autom. Control..
[32] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[33] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[34] Tansu Alpcan,et al. Network Security , 2010 .
[35] Xavier Litrico,et al. Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.
[36] Randal W. Beard,et al. Distributed Consensus in Multi-vehicle Cooperative Control - Theory and Applications , 2007, Communications and Control Engineering.
[37] S. Shankar Sastry,et al. Security of interdependent and identical networked control systems , 2013, Autom..
[38] F. Paganini,et al. Global stability with time-delay in network congestion control , 2002, Proceedings of the 41st IEEE Conference on Decision and Control, 2002..
[39] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[40] S Bhattacharya,et al. Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.