-
作者:Liu, Hao; Li, Yuzhe; Han, Qing-Long; Raissi, Tarek
作者单位:Shenyang Aerospace University; Northeastern University - China; Swinburne University of Technology; heSam Universite; Conservatoire National Arts & Metiers (CNAM)
摘要:In this article, a novel proactive attack defense strategy is proposed to deal with the secure remote estimation issue in cyber-physical systems with unknown-but-bounded noises in the presence of man-in-the-middle attacks. It is assumed that the residue calculated by the smart sensor is sent to the remote estimator and the abnormal intrusion detector via a wireless network, and the watermark is assumed to belong to a zonotope. In order to guarantee the detection rate, the data processes and th...
-
作者:Merco, Roberto; Ferrante, Francesco; Sanfelice, Ricardo G.; Pisu, Pierluigi
作者单位:Clemson University; University of Perugia; University of California System; University of California Santa Cruz
摘要:feedback control design for linear time -invariant systems in the presence of sporadic measurements and exogenous perturbations is addressed. To cope with the sporadic availability of measurements of the output, a hybrid dynamic out-put feedback controller equipped with a holding device whose state is reset when a new measurement is available is designed. The closed-loop system, resulting from the interconnection of the controller and the plant, is augmented with a timer variable trig-gering t...
-
作者:Tai, Ruochen; Lin, Liyong; Zhu, Yuting; Su, Rong
作者单位:Nanyang Technological University
摘要:In this article, we consider the problem of synthesizing the supremal covert damage-reachable attacker, in the setup where the model of the supervisor is unknown to the adversary but the adversary has recorded a (prefix-closed) finite set of observations of the runs of the closed-loop system. The synthesized attacker needs to ensure both the damage-reachability and the covertness against all the supervisors, which are consistent with the given set of observations. There is a gap between the de...
-
作者:Alanwar, Amr; Koch, Anne; Allgoewer, Frank; Johansson, Karl Henrik
作者单位:Royal Institute of Technology; Constructor University; University of Stuttgart; Royal Institute of Technology
摘要:We consider the problem of computing reachable sets directly from noisy data without a given system model. Several reachability algorithms are presented for different types of systems generating the data. First, an algorithm for computing over-approximated reachable sets based on matrix zonotopes is proposed for linear systems. Constrained matrix zonotopes are introduced to provide less conservative reachable sets at the cost of increased computational expenses and utilized to incorporate prio...
-
作者:Djeumou, Franck; Xu, Zhe; Cubuktepe, Murat; Topcu, Ufuk
作者单位:University of Texas System; University of Texas Austin; University of Texas System; University of Texas Austin; Arizona State University; Arizona State University-Tempe
摘要:We develop a probabilistic control algorithm, GTLProCo, for swarms of agents with heterogeneous dynamics and objectives, subject to high-level task specifications. The resulting algorithm not only achieves decentralized control of the swarm but also significantly improves scalability over state-of-the-art existing algorithms. Specifically, we study a setting in which the agents move along the nodes of a graph, and the high-level task specifications for the swarm are expressed in a recently pro...
-
作者:Picallo, Miguel; Bolognani, Saverio; Dorfler, Florian
作者单位:Swiss Federal Institutes of Technology Domain; ETH Zurich
摘要:A classical approach to design controllers for interconnected systems, is to assume that the different subsystems operate at different time scales, then design simpler controllers within each time scale, and finally, certify stability of the interconnected system via singular perturbation analysis. In this work, we propose an alternative approach that also allows to design the controllers of the individual subsystems separately. However, instead of requiring a sufficiently large time-scale sep...
-
作者:Zhao, Ying; Zhu, Quanxin
作者单位:Hunan Normal University; Hunan Normal University
摘要:In this article, stochastic highly nonlinear delay systems with neutral term are studied, which does not satisfy the linear growth condition. Under the local Lipschtiz condition and the polynomial growth condition, we study the existence and uniqueness, as well as boundedness, of global solution for stochastic highly nonlinear delay systems with neutral term. By designing a discrete-time feedback control function, the stabilization of stochastic highly nonlinear delay systems with neutral term...
-
作者:Tao, Binbin; Xiao, Min; Zheng, Wei Xing; Zhou, Ying; Ding, Jie; Jiang, Guoping; Wu, Xiaoqun
作者单位:Nanjing University of Posts & Telecommunications; Nanjing University of Posts & Telecommunications; Western Sydney University; Wuhan University
摘要:At present, some control strategies have been applied to bifurcation control, but these control strategies are flawed. For instance, some new equilibrium are likely to emerge in the controlled system by the state feedback control and proportional-derivative control. The time-delay feedback control and hybrid control may force the controlled system to have discontinuous stable intervals. In consideration of these defects, this article is the first to design a time-delay feedback control strateg...
-
作者:Cetinkaya, Ahmet; Ishii, Hideaki; Hayakawa, Tomohisa
作者单位:Research Organization of Information & Systems (ROIS); National Institute of Informatics (NII) - Japan; Institute of Science Tokyo; Tokyo Institute of Technology; Institute of Science Tokyo; Tokyo Institute of Technology
摘要:Jamming attacks on wireless networked control systems are investigated for the scenarios where the system dynamics face exogenous disturbance. In particular, the control input packets are assumed to be transmitted from a controller to a remotely located linear plant over an insecure wireless communication channel that is subject to jamming attacks. The time-varying likelihood of transmission failures on this channel depends on the power of the jamming interference signal emitted by an attacker...
-
作者:Li, Zhouchi; Niu, Luyao; Clark, Andrew
作者单位:Worcester Polytechnic Institute
摘要:We investigate a linear quadratic Gaussian (LQG) tracking problem with safety and reachability constraints in the presence of an adversary who mounts a false data injection attack on an unknown set of sensors. For each possible set of compromised sensors, we maintain a state estimator disregarding the sensors in that set, and calculate the optimal LQG control input at each time based on this estimate. We propose a control policy which constrains the control input to lie within a fixed distance...