-
作者:Duo, Wenli; Wang, Shouguang; Zhou, MengChu
作者单位:Macau University of Science & Technology; Zhejiang Gongshang University; New Jersey Institute of Technology
摘要:This work investigates cyber-attacks targeting cyber-physical systems in the framework of discrete event systems. From intruders' perspective, we propose a concept called k-step attackability to explore attack scenarios where intruders are constrained by a limited number of attack operations. In particular, we focus on a class of sensor attacks where sensor readings can be replaced, deleted, and inserted during transmission. We examine k-step attackability under such attacks and address its ve...
-
作者:Jin, Kaijing; Ye, Dan; Zhang, Tian-Yu
作者单位:Northeastern University - China; Northeastern University - China
摘要:In this article, the security of state estimation is studied under stealthy false-data injection attacks launched in the sensor-to-estimator channels. It is proved that there is no strictly stealthy sensor attack such that the state estimation is insecure. Thus, we focus on the existence of the attacks with complete and energy stealthiness to gradually remove the attack impact on detectors. Since the existence of stealthy attacks is significantly affected by accessing attack channels, the nece...
-
作者:Parasnis, Rohit; Franceschetti, Massimo; Touri, Behrouz
作者单位:University of California System; University of California San Diego
摘要:We derive a generalization of the Perron-Frobenius theorem to time-varying row-stochastic matrices as follows: using Kolmogorov's concept of absolute probability sequences, which are time-varying analogs of principal eigenvectors, we identify a set of connectivity conditions that generalize the notion of irreducibility (strong connectivity) to time-varying matrices (networks), and we show that under these conditions, the absolute probability sequence associated with a given matrix sequence is ...
-
作者:Coutinho, Pedro Henrique Silva; Oliveira, Tiago Roux; Krstic, Miroslav
作者单位:Universidade do Estado do Rio de Janeiro; University of California System; University of California San Diego
摘要:This article deals with the gradient extremum seeking control for static scalar maps with actuators governed by distributed diffusion partial differential equations (PDEs). To achieve the real-time optimization objective, we design a compensation controller for the distributed diffusion PDE via backstepping transformation in infinite dimensions. A further contribution of this article is the appropriate motion planning design of the so-called probing (or perturbation) signal, which is more invo...
-
作者:Feng, Qian; Xiao, Feng; Wang, Xiaoyu
作者单位:North China Electric Power University
摘要:Dissipative estimator (observer) design for continuous time-delay systems poses a significant challenge when multiple pointwise and general distributed delays (DDs) are present. We propose an effective solution to this semiopen problem using the Krasovski functional (KF) framework in conjunction with a quadratic supply rate function, where both the plant and the estimator can accommodate a finite but unlimited number of pointwise and general DDs with square-integrable kernels. A key contributi...
-
作者:Wang, Peng; Lu, Yang; Lian, Jianming; Pan, Lulu; Shao, Haibin; Li, Ning
作者单位:Shanghai Jiao Tong University; Lancaster University; United States Department of Energy (DOE); Oak Ridge National Laboratory
摘要:A privacy-preserving average consensus algorithm is proposed that synergizes the Beaver triple in secret sharing theory and noise obfuscation. The algorithm safeguards the initial values of agents against passive adversaries in a multiagent system. It is proved that the proposed algorithm can concurrently ensure average consensus and privacy, while also reducing the online computation and communication overhead compared to encryption-based ones. In addition, it imposes a less stringent conditi...
-
作者:Liu, Yu; Cao, Lin; Shu, Shaolong; Lin, Feng
作者单位:Tongji University; Wayne State University; Shanghai Maritime University
摘要:Recognizing complex events revealed by raw data is an increasingly crucial task that serves as one of the foundations for system monitoring and decision making. Our goal is to accurately recognize the occurred complex events, that is, uniquely determine the occurred complex event sequence from the raw data. We abstract the outputs of data sources as a set of atomic events, and then, use an automaton to describe all atomic event sequences that can be generated by the given system. We represent ...
-
作者:Tanwani, Aneel; Shim, Hyungbo; Teel, Andrew R.
作者单位:Universite de Toulouse; Centre National de la Recherche Scientifique (CNRS); Seoul National University (SNU); University of California System; University of California Santa Barbara
摘要:For a class of hybrid systems, where jumps occur frequently, we analyze the stability of system trajectories in view of singularly perturbed dynamics. The specific model we consider comprises an interconnection of two hybrid subsystems, a timer which triggers the jumps, and some discrete variables to determine the index of the jump maps. The flow equations of these variables are singularly perturbed differential equations and, in particular, a smaller value of the singular perturbation paramet...
-
作者:Mehdifar, Farhad; Lindemann, Lars; Bechlioulis, Charalampos P.; Dimarogonas, Dimos V.
作者单位:Royal Institute of Technology; University of Southern California; University of Patras
摘要:This article introduces a novel control framework to address the satisfaction of multiple time-varying output constraints in uncertain high-order multi-input-multi-output (MIMO) nonlinear control systems. Unlike existing methods, which often assume that the constraints are always decoupled and feasible, our approach can handle coupled time-varying constraints even in the presence of potential infeasibilities. First, it is shown that satisfying multiple constraints essentially boils down to ens...
-
作者:Xiang, Zhaoyu; Chen, Yufeng; Wu, Naiqi; Li, Zhiwu
作者单位:Macau University of Science & Technology; Xidian University
摘要:In this article, we investigate the supervisory control of a networked timed discrete event system modeled with a timed automaton. In this system, a plant communicates with its supervisor through multiple observation channels and a single control channel. Any observation channel is imposed a bandwidth constraint such that the number of events transmitted through the channel per time unit should not exceed a given nonnegative integer. The control channel is subject to bounded control delays and...