From IoT-based cloud manufacturing approach to intelligent additive manufacturing: Industrial Internet of Things—An overview
L Haghnegahdar, SS Joshi, NB Dahotre - The International Journal of …, 2022 - Springer
Abstract The industrial Internet of Things (IIoT) has grown to empower advantages of
advanced manufacturing machinery and smarter control. The cloud-based technology of …
advanced manufacturing machinery and smarter control. The cloud-based technology of …
Resilient time-varying formation-tracking of multi-UAV systems against composite attacks: A two-layered framework
This paper studies the countermeasure design problems of distributed resilient time-varying
formation-tracking control for multi-UAV systems with single-way communications against …
formation-tracking control for multi-UAV systems with single-way communications against …
The confluence of networks, games, and learning a game-theoretic framework for multiagent decision making over networks
Multiagent decision making over networks has recently attracted an exponentially growing
number of researchers from the systems and control community. The area has gained …
number of researchers from the systems and control community. The area has gained …
Resilient output formation-tracking of heterogeneous multiagent systems against general Byzantine attacks: A twin-layer approach
This work solves the countermeasure design problems of distributed resilient output time-
varying formation-tracking (TVFT) of heterogeneous multiagent systems (MASs) against …
varying formation-tracking (TVFT) of heterogeneous multiagent systems (MASs) against …
Scenario-agnostic zero-trust defense with explainable threshold policy: A meta-learning approach
The increasing connectivity and intricate remote access environment have made traditional
perimeter-based network defense vulnerable. Zero trust becomes a promising approach to …
perimeter-based network defense vulnerable. Zero trust becomes a promising approach to …
Cybersecurity in robotics: Challenges, quantitative modeling, and practice
Robotics is becoming more and more ubiquitous, but the pressure to bring systems to
market occasionally goes at the cost of neglecting security mechanisms during the …
market occasionally goes at the cost of neglecting security mechanisms during the …
An efficient parallel reinforcement learning approach to cross-layer defense mechanism in industrial control systems
K Zhong, Z Yang, G Xiao, X Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The ongoing digitalization enables stable control processes and smooth operations of
Industrial Control Systems (ICSs). A direct consequence of the highly interconnected …
Industrial Control Systems (ICSs). A direct consequence of the highly interconnected …
Resilient output containment control of heterogeneous multiagent systems against composite attacks: A digital twin approach
This article delves into the distributed resilient output containment control of heterogeneous
multiagent systems against composite attacks, including Denial-of-Service (DoS) attacks …
multiagent systems against composite attacks, including Denial-of-Service (DoS) attacks …
Introduction to the special section on learning and security for multi-agent systems
This special section features six articles that provide an overview of the emerging research
topics at the intersection learning, security, and multi-agent systems. Recent years have …
topics at the intersection learning, security, and multi-agent systems. Recent years have …
Evasion-aware Neyman-Pearson detectors: a game-theoretic approach
Network security relies heavily on the detection of adversarial behaviors. Traditional
detection methods, such as anomaly detection and signature detection, are inadequate for …
detection methods, such as anomaly detection and signature detection, are inadequate for …