Privacy and security trade-off in interconnected systems with known or unknown privacy noise covariance
This paper is concerned with the security problem for interconnected systems, where each
subsystem is required to detect local attacks. Moreover, we consider that there exists an …
subsystem is required to detect local attacks. Moreover, we consider that there exists an …
On the trade-offs between accuracy, privacy, and resilience in average consensus algorithms
G Ramos, AMH Teixeira… - 2023 62nd IEEE …, 2023 - ieeexplore.ieee.org
There can be none. In this paper, we address the problem of a set of discrete-time
networked agents reaching average consensus privately and resiliently in the presence of a …
networked agents reaching average consensus privately and resiliently in the presence of a …
[HTML][HTML] Privacy-preserving anomaly detection in stochastic dynamical systems: Synthesis of optimal gaussian mechanisms
We present a framework for designing distorting mechanisms that allow the remote
operation of anomaly detectors while preserving privacy. We consider a problem setting in …
operation of anomaly detectors while preserving privacy. We consider a problem setting in …
Opacity vs. Security in Linear Dynamical Systems
VM John, V Katewa - IEEE Transactions on Automatic Control, 2024 - ieeexplore.ieee.org
Opacity is a notion of privacy that is wellstudied in computer science and discrete-event
systems. It describes an eavesdropper's inability to infer a system's “secret” states by …
systems. It describes an eavesdropper's inability to infer a system's “secret” states by …
Privacy and security trade‐off in cyber‐physical systems: An information theory‐based framework
L Wu, H Wang, K Liu, L Zhao… - International Journal of …, 2024 - Wiley Online Library
This article investigates the trade‐off between privacy and security in cyber‐physical
systems, with the goal of designing a privacy‐preserving mechanism based on information …
systems, with the goal of designing a privacy‐preserving mechanism based on information …
Opacity and its Trade-offs with Security in Linear Systems
VM John, V Katewa - 2022 IEEE 61st Conference on Decision …, 2022 - ieeexplore.ieee.org
Opacity and attack detectability are important properties for any system as they allow the
states to remain private and malicious attacks to be detected, respectively. In this paper, we …
states to remain private and malicious attacks to be detected, respectively. In this paper, we …
I can read your mind: Control mechanism secrecy of networked dynamical systems under inference attacks
Recent years have witnessed the fast advance of security research for networked dynamical
system (NDS). Considering the latest inference attacks that enable stealthy and precise …
system (NDS). Considering the latest inference attacks that enable stealthy and precise …
On Connections between Opacity and Security in Linear Systems
VM John, V Katewa - arXiv preprint arXiv:2206.06074, 2022 - arxiv.org
Opacity and attack detectability are important properties for any system as they allow the
states to remain private and malicious attacks to be detected, respectively. In this paper, we …
states to remain private and malicious attacks to be detected, respectively. In this paper, we …
Towards the design of personal data protection-aware artificial intelligence applications in ubiquitous smart environments
EA Morales-Vanegas, BAÁ Magallán… - Avances en …, 2023 - revistaaihc.mx
Protecting personal data in ubiquitous smart environments is crucial to ensure user privacy
and trust in artificial intelligence (AI) applications. This paper explores approaches and …
and trust in artificial intelligence (AI) applications. This paper explores approaches and …
Design of Privacy Mechanism for Cyber Physical Systems: A Nash Q-learning Approach
Q Zhang, S Meng, K Liu, W Dai - 2022 China Automation …, 2022 - ieeexplore.ieee.org
This paper studies the problem of designing optimal privacy mechanism with less energy
cost. The eavesdropper and the defender with limited resources should choose which …
cost. The eavesdropper and the defender with limited resources should choose which …