On Privacy of Dynamical Systems: An Optimal Probabilistic Mapping Approach
暂无分享,去创建一个
[1] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[2] Charles R. Johnson,et al. Matrix Analysis, 2nd Ed , 2012 .
[3] H. Vincent Poor,et al. Enabling Data Exchange in Two-Agent Interactive Systems Under Privacy Constraints , 2014, IEEE Journal of Selected Topics in Signal Processing.
[4] E. Yaz. Linear Matrix Inequalities In System And Control Theory , 1998, Proceedings of the IEEE.
[5] Carlos Murguia,et al. Information-Theoretic Privacy through Chaos Synchronization and Optimal Additive Noise , 2019, ArXiv.
[6] K. Schittkowski,et al. NONLINEAR PROGRAMMING , 2022 .
[7] Paulo Tabuada,et al. Plausible deniability as a notion of privacy , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).
[8] Stephen P. Boyd,et al. Linear Matrix Inequalities in Systems and Control Theory , 1994 .
[9] William M. Campbell,et al. Mutual Information in Learning Feature Transformations , 2000, ICML.
[10] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[11] H. Vincent Poor,et al. Smart meter privacy: A utility-privacy framework , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[12] Tamer Basar,et al. Privacy constrained information processing , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[13] Carlos Murguia,et al. Characterization of a CUSUM model-based sensor attack detector , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[14] Jerome Le Ny,et al. Differentially Private MIMO Filtering for Event Streams , 2018, IEEE Transactions on Automatic Control.
[15] Charles R. Johnson,et al. Topics in Matrix Analysis , 1991 .
[16] Fuzhen Zhang. The Schur complement and its applications , 2005 .
[17] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[18] Robin Wilson,et al. Modern Graph Theory , 2013 .
[19] Josep Domingo-Ferrer,et al. Optimal data-independent noise for differential privacy , 2013, Inf. Sci..
[20] Martín Ochoa,et al. Design-time Quantification of Integrity in Cyber-physical Systems , 2017, PLAS@CCS.
[21] Carlos Murguia,et al. On Reachable Sets of Hidden CPS Sensor Attacks , 2017, 2018 Annual American Control Conference (ACC).
[22] Karl Henrik Johansson,et al. Directed Information as Privacy Measure in Cloud-based Control , 2017, ArXiv.
[23] H. Vincent Poor. Privacy in Networks of Interacting Agents , 2018 .
[24] Farhad Farokhi,et al. Secure and Private Implementation of Dynamic Controllers Using Semihomomorphic Encryption , 2018, IEEE Transactions on Automatic Control.
[25] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[26] Hui Xiong,et al. Enhancing Security and Privacy in Traffic-Monitoring Systems , 2006, IEEE Pervasive Computing.
[27] Nina Taft,et al. Managing Your Private and Public Data: Bringing Down Inference Attacks Against Your Privacy , 2014, IEEE Journal of Selected Topics in Signal Processing.
[28] Takashi Tanaka,et al. Bidirectional Information Flow and the Roles of Privacy Masks in Cloud-Based Control , 2019, 2019 IEEE Information Theory Workshop (ITW).
[29] Brian C. Ross. Mutual Information between Discrete and Continuous Data Sets , 2014, PloS one.
[30] Jairo Giraldo,et al. Constraining Attacker Capabilities Through Actuator Saturation , 2017, 2018 Annual American Control Conference (ACC).
[31] Flávio du Pin Calmon,et al. Privacy against statistical inference , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[32] Henrik Sandberg,et al. Optimal privacy-preserving policy using constrained additive noise to minimize the fisher information , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[33] H. Vincent Poor,et al. A theory of utility and privacy of data sources , 2010, 2010 IEEE International Symposium on Information Theory.
[34] Quanyan Zhu,et al. Coding sensor outputs for injection attacks detection , 2014, 53rd IEEE Conference on Decision and Control.
[35] Nathan van de Wouw,et al. Reachable Sets of Hidden CPS Sensor Attacks: Analysis and Synthesis Tools , 2017 .
[36] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[37] Geir E. Dullerud,et al. Entropy-minimizing mechanism for differential privacy of discrete-time linear feedback systems , 2014, 53rd IEEE Conference on Decision and Control.
[38] K. Watanabe,et al. Fault diagnosis in nonlinear chemical processes. Part II. Application to a chemical reactor , 1983 .
[39] Carlos Murguia,et al. CUSUM and chi-squared attack detection of compromised sensors , 2016, 2016 IEEE Conference on Control Applications (CCA).
[40] Pramod Viswanath,et al. The optimal mechanism in differential privacy , 2012, 2014 IEEE International Symposium on Information Theory.
[41] Ufuk Topcu,et al. Differentially private convex optimization with piecewise affine objectives , 2014, 53rd IEEE Conference on Decision and Control.
[42] Nina Taft,et al. How to hide the elephant- or the donkey- in the room: Practical privacy against statistical inference for large data , 2013, 2013 IEEE Global Conference on Signal and Information Processing.
[43] Ming Cao,et al. Design of Privacy-Preserving Dynamic Controllers , 2019, IEEE Transactions on Automatic Control.
[44] Geir E. Dullerud,et al. On the cost of differential privacy in distributed control systems , 2014, HiCoNS.
[45] Farhad Farokhi,et al. Privacy-Constrained Communication , 2016 .
[46] Henrik Sandberg,et al. Quadratic Gaussian privacy games , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[47] Paulo Tabuada,et al. Privacy-aware quadratic optimization using partially homomorphic encryption , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[48] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[49] George J. Pappas,et al. Differentially Private Filtering , 2012, IEEE Transactions on Automatic Control.
[50] Sreeram Kannan,et al. Estimating Mutual Information for Discrete-Continuous Mixtures , 2017, NIPS.
[51] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[52] Hyungbo Shim,et al. Encrypting Controller using Fully Homomorphic Encryption for Security of Cyber-Physical Systems* , 2016 .
[53] Navid Hashemi,et al. A Comparison of Stealthy Sensor Attacks on Control Systems , 2017, 2018 Annual American Control Conference (ACC).
[54] Allen Gersho,et al. Vector quantization and signal compression , 1991, The Kluwer international series in engineering and computer science.
[55] Carlos Murguia,et al. Model-based Attack Detection Scheme for Smart Water Distribution Networks , 2017, AsiaCCS.
[56] Sheldon M. Ross,et al. Introduction to Probability Models, Eighth Edition , 1972 .
[57] Iman Shames,et al. Secure and private control using semi-homomorphic encryption , 2017 .
[58] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..
[59] Witold Pedrycz,et al. Measuring relevance between discrete and continuous features based on neighborhood mutual information , 2011, Expert Syst. Appl..
[60] Carlos Murguia,et al. On Privacy of Quantized Sensor Measurements through Additive Noise , 2018, 2018 IEEE Conference on Decision and Control (CDC).
[61] Jie Chen,et al. Robust Model-Based Fault Diagnosis for Dynamic Systems , 1998, The International Series on Asian Studies in Computer and Information Science.
[62] Sheldon M. Ross,et al. Introduction to Probability Models (4th ed.). , 1990 .
[63] Fuhui Long,et al. Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy , 2003, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[64] Carlos Murguia,et al. On model‐based detectors for linear time‐invariant stochastic systems under sensor attacks , 2019, IET Control Theory & Applications.
[65] H. Vincent Poor,et al. Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices , 2013, IEEE Journal on Selected Areas in Communications.
[66] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.