Resilient distributed optimization algorithm against adversary attacks
暂无分享,去创建一个
[1] Shreyas Sundaram,et al. Consensus-based distributed optimization with malicious nodes , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[2] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[3] Nitin H. Vaidya,et al. Byzantine Multi-Agent Optimization: Part I , 2015, ArXiv.
[4] Yevgeniy Vorobeychik,et al. Resilient consensus protocol in the presence of trusted nodes , 2014, 2014 7th International Symposium on Resilient Control Systems (ISRCS).
[5] Shreyas Sundaram,et al. Resilient Asymptotic Consensus in Robust Networks , 2013, IEEE Journal on Selected Areas in Communications.
[6] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[7] Martin J. Wainwright,et al. Dual Averaging for Distributed Optimization: Convergence Analysis and Network Scaling , 2010, IEEE Transactions on Automatic Control.
[8] Ling Shi,et al. Time synchronization in WSNs: A maximum value based consensus approach , 2011, IEEE Conference on Decision and Control and European Control Conference.
[9] Nitin H. Vaidya,et al. Fault-Tolerant Multi-Agent Optimization: Part III , 2015, ArXiv.
[10] Nitin H. Vaidya,et al. Robust Multi-agent Optimization: Coping with Byzantine Agents with Input Redundancy , 2016, SSS.
[11] Shreyas Sundaram,et al. Secure local filtering algorithms for distributed optimization , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[12] Nitin H. Vaidya,et al. Fault-Tolerant Distributed Optimization (Part IV): Constrained Optimization with Arbitrary Directed Networks , 2015, ArXiv.
[13] Angelia Nedic,et al. Distributed Optimization Over Time-Varying Directed Graphs , 2015, IEEE Trans. Autom. Control..
[14] Nitin H. Vaidya,et al. Matrix Representation of Iterative Approximate Byzantine Consensus in Directed Graphs , 2012, ArXiv.
[15] B. Gharesifard,et al. Distributed Optimization Under Adversarial Nodes , 2016, IEEE Transactions on Automatic Control.
[16] Nitin H. Vaidya,et al. Byzantine Multi-Agent Optimization: Part II , 2015, ArXiv.
[17] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[18] Asuman E. Ozdaglar,et al. Distributed Subgradient Methods for Multi-Agent Optimization , 2009, IEEE Transactions on Automatic Control.
[19] Raphael Yuster,et al. Connected Domination and Spanning Trees with Many Leaves , 2000, SIAM J. Discret. Math..