Resilient Distributed Estimation: Exponential Convergence Under Sensor Attacks
暂无分享,去创建一个
[1] Soummya Kar,et al. Consensus + innovations distributed inference over networks: cooperation and sensing in networked systems , 2013, IEEE Signal Processing Magazine.
[2] Soummya Kar,et al. Cyber-physical systems: Dynamic sensor attacks and strong observability , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[3] B. Gharesifard,et al. Distributed Optimization Under Adversarial Nodes , 2016, IEEE Transactions on Automatic Control.
[4] Yunghsiang Sam Han,et al. Distributed Bayesian Detection in the Presence of Byzantine Data , 2013, IEEE Transactions on Signal Processing.
[5] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[6] Pramod K. Varshney,et al. Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.
[7] Soummya Kar,et al. Resilient Distributed Estimation: Sensor Attacks , 2017, IEEE Transactions on Automatic Control.
[8] Soummya Kar,et al. Resilient Distributed Estimation Through Adversary Detection , 2017, IEEE Transactions on Signal Processing.
[9] Soummya Kar,et al. Convergence Rate Analysis of Distributed Gossip (Linear Parameter) Estimation: Fundamental Limits and Tradeoffs , 2010, IEEE Journal of Selected Topics in Signal Processing.
[10] Lang Tong,et al. Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.
[11] Shreyas Sundaram,et al. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.
[12] H. Poor,et al. Fully Distributed State Estimation for Wide-Area Monitoring Systems , 2012, IEEE Transactions on Smart Grid.
[13] Shreyas Sundaram,et al. Resilient Asymptotic Consensus in Robust Networks , 2013, IEEE Journal on Selected Areas in Communications.
[14] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[15] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[16] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[17] Firas Hassan,et al. Resilient distributed parameter estimation in heterogeneous time-varying networks , 2014, HiCoNS.
[18] Soummya Kar,et al. Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.