Secure state reconstruction in differentially flat systems under sensor attacks using satisfiability modulo theory solving
暂无分享,去创建一个
Paulo Tabuada | Alberto L. Sangiovanni-Vincentelli | Sanjit A. Seshia | Pierluigi Nuzzo | Yasser Shoukry | Nicola Bezzo | A. Sangiovanni-Vincentelli | S. Seshia | N. Bezzo | P. Tabuada | Yasser Shoukry | P. Nuzzo
[1] Sharad Malik,et al. Boolean satisfiability from theoretical hardness to practical success , 2009, Commun. ACM.
[2] M. Fliess,et al. Flatness and defect of non-linear systems: introductory theory and examples , 1995 .
[3] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[4] Vijay Kumar,et al. The GRASP Multiple Micro-UAV Testbed , 2010, IEEE Robotics & Automation Magazine.
[5] Cesare Tinelli,et al. Satisfiability Modulo Theories , 2021, Handbook of Satisfiability.
[6] Stephen P. Boyd,et al. Real-Time Convex Optimization in Signal Processing , 2010, IEEE Signal Processing Magazine.
[7] Bruno Sinopoli,et al. Secure Estimation in the Presence of Integrity Attacks , 2013, IEEE Transactions on Automatic Control.
[8] Francesco Bullo,et al. Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[9] Vijay Gupta,et al. On Kalman filtering in the presence of a compromised sensor: Fundamental performance bounds , 2014, 2014 American Control Conference.
[10] João Pedro Hespanha,et al. Observability of linear systems under adversarial attacks , 2015, 2015 American Control Conference (ACC).
[11] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[12] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[13] Paulo Tabuada,et al. Non-invasive Spoofing Attacks for Anti-lock Braking Systems , 2013, CHES.
[14] Karl Henrik Johansson,et al. Efficient Computations of a Security Index for False Data Attacks in Power Networks , 2012, IEEE Transactions on Automatic Control.
[15] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[16] Paulo Tabuada,et al. Sound and complete state estimation for linear dynamical systems under sensor attacks using Satisfiability Modulo Theory solving , 2015, 2015 American Control Conference (ACC).
[17] Paulo Tabuada,et al. Secure State Estimation Under Sensor Attacks: A Satisfiability Modulo Theory Approach , 2014, ArXiv.
[18] Raffaello D'Andrea,et al. A simple learning strategy for high-speed quadrocopter multi-flips , 2010, 2010 IEEE International Conference on Robotics and Automation.
[19] S. Mitter,et al. Robust Recursive Estimation in the Presence of Heavy-Tailed Observation Noise , 1994 .
[20] Georgios B. Giannakis,et al. Doubly Robust Smoothing of Dynamical Processes via Outlier Sparsity Constraints , 2011, IEEE Transactions on Signal Processing.
[21] Paulo Tabuada,et al. Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.
[22] Paulo Tabuada,et al. Robustness of attack-resilient state estimators , 2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).
[23] A. Sangiovanni-Vincentelli,et al. I MHOTEP-SMT : A Satisfiability Modulo Theory Solver For Secure State Estimation ∗ , 2015 .
[24] Paulo Tabuada,et al. Event-triggered projected Luenberger observer for linear systems under sparse sensor attacks , 2014, 53rd IEEE Conference on Decision and Control.
[25] Paulo Tabuada,et al. A Satisfiability Modulo Theory Approach to Secure State Reconstruction in Differentially Flat Systems Under Sensor Attacks , 2015, ArXiv.