Author of the publication

From control system security indices to attack identifiability.

, and . SOSCYPS@CPSWeek, page 1-6. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Sensor Data Injection Attacks with Multiplicative Watermarking., and . ECC, page 338-343. IEEE, (2018)Optimal stealthy attacks on actuators for strictly proper systems.. CDC, page 4385-4390. IEEE, (2019)Risk assessment and optimal allocation of security measures under stealthy false data injection attacks., , and . CCTA, page 1347-1353. IEEE, (2022)Privatized Distributed Anomaly Detection for Large-Scale Nonlinear Uncertain Systems., , , and . IEEE Trans. Autom. Control., 66 (11): 5299-5313 (2021)Security Allocation in Networked Control Systems under Stealthy Attacks., , and . CoRR, (2023)Risk-based Security Measure Allocation Against Injection Attacks on Actuators., and . CoRR, (2023)Risk-averse controller design against data injection attacks on actuators for uncertain control systems., and . ACC, page 5037-5042. IEEE, (2022)Secure State Estimation with Asynchronous Measurements against Malicious Measurement-Data and Time-Stamp Manipulation., , , , and . CDC, page 7073-7080. IEEE, (2023)On the Trade-Offs Between Accuracy, Privacy, and Resilience in Average Consensus Algorithms., , and . CDC, page 8026-8031. IEEE, (2023)Design of multiplicative watermarking against covert attacks., , , and . CDC, page 4176-4181. IEEE, (2021)