3725 - 3727 |
Guest Editorial: Special Issue on Security and Privacy of Distributed Algorithms and Network Systems Chen ZY, Pasqualetti F, He JP, Cheng P, Trentelman HL, Bullo F |
3728 - 3741 |
Detection of Covert Cyber-Attacks in Interconnected Systems: A Distributed Model-Based Approach Barboni A, Rezaee H, Boem F, Parisini T |
3742 - 3757 |
Secure State Estimation With Byzantine Sensors: A Probabilistic Approach Ren XQ, Mo YL, Chen J, Johansson KH |
3758 - 3771 |
Finite-Time Guarantees for Byzantine-Resilient Distributed State Estimation With Noisy Measurements Su LL, Shahrampour S |
3772 - 3783 |
On the Stability of Unverified Transactions in a DAG-Based Distributed Ledger Ferraro P, King C, Shorten R |
3784 - 3799 |
An Attack-Resilient Pulse-Based Synchronization Strategy for General Connected Topologies Wang ZQ, Wang YQ |
3800 - 3815 |
A Distributed Cyber-Attack Detection Scheme With Application to DC Microgrids Gallo AJ, Turan MS, Boem F, Parisini T, Ferrari-Trecate G |
3816 - 3831 |
Actuator Security Indices Based on Perfect Undetectability: Computation, Robustness, and Sensor Placement Milosevic J, Teixeira A, Johansson KH, Sandberg H |
3832 - 3846 |
Optimizing Attack Schedules Based on Energy Dispatch Over Two-Hop Relay Networks Gan RM, Shao JL, Xiao Y, Zhang H, Zheng WX |
3847 - 3862 |
Novel Stealthy Attack and Defense Strategies for Networked Control Systems Mao YB, Jafarnejadsani H, Zhao P, Akyol E, Hovakimyan N |
3863 - 3878 |
Design of Privacy-Preserving Dynamic Controllers Kawano Y, Cao M |
3879 - 3886 |
Almost Sure Stability of Nonlinear Systems Under Random and Impulsive Sequential Attacks He WL, Qian F, Han QL, Chen GR |
3887 - 3894 |
Privacy-Preserving Distributed Averaging via Homomorphically Encrypted Ratio Consensus Hadjicostis CN, Dominguez-Garcia AD |
3895 - 3902 |
An Online Approach to Physical Watermark Design Liu HX, Mo YL, Yan JQ, Xie LH, Johansson KH |
3903 - 3910 |
Centralized Versus Decentralized Detection of Attacks in Stochastic Interconnected Systems Anguluri R, Katewa V, Pasqualetti F |
3911 - 3918 |
Malicious Attacks on State Estimation Against Distributed Control Systems Lu AY, Yang GH |
3919 - 3926 |
Optimal Partial Feedback Attacks in Cyber-Physical Power Systems Wu GY, Wang G, Sun J, Chen J |
3927 - 3934 |
Stealthy Actuator Signal Attacks in Stochastic Control Systems: Performance and Limitations Fang CR, Qi YF, Chen JM, Tan R, Zheng WX |
3935 - 3942 |
Fully Distributed Resilient State Estimation Based on Distributed Median Solver Lee JG, Kim J, Shim H |
3943 - 3949 |
Switching-Like Event-Triggered Control for Networked Control Systems Under Malicious Denial of Service Attacks Peng C, Sun HT |
3950 - 3957 |
Secure and Private Implementation of Dynamic Controllers Using Semihomomorphic Encryption Murguia C, Farokhi F, Shames I |