Review of results on smart‐meter privacy by data manipulation, demand shaping, and load scheduling

F Farokhi - IET Smart Grid, 2020 - Wiley Online Library
Simple analysis of energy consumption patterns recorded by smart meters can be used to
deduce household occupancy. With access to higher‐resolution smart‐meter readings, we …

Learning-based attacks in cyber-physical systems

MJ Khojasteh, A Khina… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We introduce the problem of learning-based attacks in a simple abstraction of cyber-physical
systems—the case of a discrete-time, linear, time-invariant plant that may be subject to an …

Designing optimal key lengths and control laws for encrypted control systems based on sample identifying complexity and deciphering time

K Teranishi, T Sadamoto… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In the state-of-the-art literature on cryptography and control theory, there has been no
systematic methodology of constructing cyber–physical systems that can achieve the …

Learning based attacks in cyber physical systems: Exploration, detection, and control cost trade-offs

A Rangi, MJ Khojasteh… - Learning for Dynamics …, 2021 - proceedings.mlr.press
We study the problem of learning-based attacks in linear systems, where the communication
channel between the controller and the plant can be hijacked by a malicious attacker. We …

A model randomization approach to statistical parameter privacy

E Nekouei, H Sandberg, M Skoglund… - … on Automatic Control, 2022 - ieeexplore.ieee.org
In this article, we study a privacy filter design problem for a sequence of sensor
measurements whose joint probability density function (pdf) depends on a private …

Change time estimation uncertainty in nonlinear dynamical systems with applications to COVID‐19

R Alisic, PE Paré, H Sandberg - International Journal of Robust …, 2023 - Wiley Online Library
The impact that each individual non‐pharmaceutical intervention (NPI) had on the spread
rate of COVID‐19 is difficult to estimate, since several NPIs were implemented in rapid …

Privacy and security trade‐off in cyber‐physical systems: An information theory‐based framework

L Wu, H Wang, K Liu, L Zhao… - International Journal of …, 2024 - Wiley Online Library
This article investigates the trade‐off between privacy and security in cyber‐physical
systems, with the goal of designing a privacy‐preserving mechanism based on information …

Location Secrecy Enhancement in Adversarial Networks via Trajectory Control

MJ Khojasteh, AA Saucan, Z Liu… - IEEE Control Systems …, 2022 - ieeexplore.ieee.org
In networked environments, adversaries may exploit location information to perform carefully
crafted attacks on cyber-physical systems (CPS). To prevent such security breaches, this …

Preserving Privacy in Cloud-based Data-Driven Stabilization

T Hosseinalizadeh, N Monshizadeh - arXiv preprint arXiv:2410.17353, 2024 - arxiv.org
In the recent years, we have observed three significant trends in control systems: a renewed
interest in data-driven control design, the abundance of cloud computational services and …

Privacy-Preserving Optimal State Estimation with Low Complexity via Cram\'er-Rao Lower Bound Approach

L Guo, J Wang, Y Zhao, JF Zhang - arXiv preprint arXiv:2410.08756, 2024 - arxiv.org
This paper addresses the optimal state estimation problem for dynamic systems while
preserving private information against an adversary. To dominate the adversary's estimation …