From IoT-based cloud manufacturing approach to intelligent additive manufacturing: Industrial Internet of Things—An overview

L Haghnegahdar, SS Joshi, NB Dahotre - The International Journal of …, 2022 - Springer
Abstract The industrial Internet of Things (IIoT) has grown to empower advantages of
advanced manufacturing machinery and smarter control. The cloud-based technology of …

Resilient time-varying formation-tracking of multi-UAV systems against composite attacks: A two-layered framework

X Gong, MV Basin, Z Feng, T Huang… - IEEE/CAA Journal of …, 2023 - ieeexplore.ieee.org
This paper studies the countermeasure design problems of distributed resilient time-varying
formation-tracking control for multi-UAV systems with single-way communications against …

The confluence of networks, games, and learning a game-theoretic framework for multiagent decision making over networks

T Li, G Peng, Q Zhu, T Başar - IEEE Control Systems Magazine, 2022 - ieeexplore.ieee.org
Multiagent decision making over networks has recently attracted an exponentially growing
number of researchers from the systems and control community. The area has gained …

Resilient output formation-tracking of heterogeneous multiagent systems against general Byzantine attacks: A twin-layer approach

X Gong, X Li, Z Shu, Z Feng - IEEE Transactions on Cybernetics, 2023 - ieeexplore.ieee.org
This work solves the countermeasure design problems of distributed resilient output time-
varying formation-tracking (TVFT) of heterogeneous multiagent systems (MASs) against …

Scenario-agnostic zero-trust defense with explainable threshold policy: A meta-learning approach

Y Ge, T Li, Q Zhu - IEEE INFOCOM 2023-IEEE Conference on …, 2023 - ieeexplore.ieee.org
The increasing connectivity and intricate remote access environment have made traditional
perimeter-based network defense vulnerable. Zero trust becomes a promising approach to …

Cybersecurity in robotics: Challenges, quantitative modeling, and practice

Q Zhu, S Rass, B Dieber… - Foundations and Trends …, 2021 - nowpublishers.com
Robotics is becoming more and more ubiquitous, but the pressure to bring systems to
market occasionally goes at the cost of neglecting security mechanisms during the …

An efficient parallel reinforcement learning approach to cross-layer defense mechanism in industrial control systems

K Zhong, Z Yang, G Xiao, X Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The ongoing digitalization enables stable control processes and smooth operations of
Industrial Control Systems (ICSs). A direct consequence of the highly interconnected …

Resilient output containment control of heterogeneous multiagent systems against composite attacks: A digital twin approach

Y Cui, L Cao, X Gong, MV Basin… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This article delves into the distributed resilient output containment control of heterogeneous
multiagent systems against composite attacks, including Denial-of-Service (DoS) attacks …

Introduction to the special section on learning and security for multi-agent systems

Q Zhu, H Ishii - Annual Reviews in Control, 2022 - Elsevier
This special section features six articles that provide an overview of the emerging research
topics at the intersection learning, security, and multi-agent systems. Recent years have …

Evasion-aware Neyman-Pearson detectors: a game-theoretic approach

Y Hu, Q Zhu - 2022 IEEE 61st Conference on Decision and …, 2022 - ieeexplore.ieee.org
Network security relies heavily on the detection of adversarial behaviors. Traditional
detection methods, such as anomaly detection and signature detection, are inadequate for …