High-Confidence Attack Detection via Wasserstein-Metric Computations
暂无分享,去创建一个
[1] A. Guillin,et al. On the rate of convergence in Wasserstein distance of the empirical measure , 2013, 1312.2128.
[2] Carlos Murguia,et al. CUSUM and chi-squared attack detection of compromised sensors , 2016, 2016 IEEE Conference on Control Applications (CCA).
[3] Karl Henrik Johansson,et al. Quantifying the Impact of Cyber-Attack Strategies for Control Systems Equipped With an Anomaly Detector , 2018, 2018 European Control Conference (ECC).
[4] Paulo Tabuada,et al. Secure State Estimation Against Sensor Attacks in the Presence of Noise , 2015, IEEE Transactions on Control of Network Systems.
[5] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[6] Tyler H. Summers,et al. Distributionally Robust Tuning of Anomaly Detectors in Cyber-Physical Systems with Stealthy Attacks** , 2019, 2020 American Control Conference (ACC).
[7] Vijay Gupta,et al. Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..
[8] Dragan Nesic,et al. Security Metrics of Networked Control Systems under Sensor Attacks (extended preprint) , 2018, ArXiv.
[9] Filippo Santambrogio,et al. Optimal Transport for Applied Mathematicians , 2015 .
[10] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[11] Nathan van de Wouw,et al. Reachable Sets of Hidden CPS Sensor Attacks: Analysis and Synthesis Tools , 2017 .
[12] Sonia Martínez,et al. On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.
[13] Jorge Cortés,et al. Coverage Optimization and Spatial Load Balancing by Robotic Sensor Networks , 2010, IEEE Transactions on Automatic Control.
[14] Francesco Bullo,et al. Distributed Control of Robotic Networks , 2009 .
[15] Quanyan Zhu,et al. Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.
[16] Vijay Gupta,et al. Security in stochastic control systems: Fundamental limitations and performance bounds , 2015, 2015 American Control Conference (ACC).
[17] Phan Thanh Nam,et al. Reachable Set Bounding for Linear Discrete-Time Systems with Delays and Bounded Disturbances , 2013, J. Optim. Theory Appl..
[18] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[19] João Pedro Hespanha,et al. Equivalent Characterizations of Input-to-State Stability for Stochastic Discrete-Time Systems , 2014, IEEE Transactions on Automatic Control.
[20] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.
[21] Jos F. Sturm,et al. A Matlab toolbox for optimization over symmetric cones , 1999 .
[22] F. Santambrogio. Optimal Transport for Applied Mathematicians: Calculus of Variations, PDEs, and Modeling , 2015 .
[23] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[24] M. A. Athans,et al. The role and use of the stochastic linear-quadratic-Gaussian problem in control system design , 1971 .