How physicality enables trust: A new era of trust-centered cyberphysical systems
Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and
security. The unique characteristics of these systems prompt a reevaluation of their security …
security. The unique characteristics of these systems prompt a reevaluation of their security …
Robust distributed optimization with randomly corrupted gradients
In this paper, we propose a first-order distributed optimization algorithm that is provably
robust to Byzantine failures–arbitrary and potentially adversarial behavior, where all the …
robust to Byzantine failures–arbitrary and potentially adversarial behavior, where all the …
Online Optimization Under Randomly Corrupted Attacks
Existing algorithms in online optimization usually rely on trustful information, eg, reliable
knowledge of gradients, which makes them vulnerable to attacks. To take into account the …
knowledge of gradients, which makes them vulnerable to attacks. To take into account the …
Extremum seeking under persistent gradient deception: A switching systems approach
F Galarza-Jimenez, JI Poveda… - IEEE Control …, 2021 - ieeexplore.ieee.org
This letter focuses on extremum seeking (ES) controllers with adversarial attacks in the form
of deception signals. While a persistent attack in a feedback controller may be difficult to …
of deception signals. While a persistent attack in a feedback controller may be difficult to …
Online optimization of LTI systems under persistent attacks: Stability, tracking, and robustness
We study the stability properties of a closed-loop system composed of a dynamical plant and
a feedback controller, the latter generating control signals that can be compromised by a …
a feedback controller, the latter generating control signals that can be compromised by a …
On robustness of the normalized random block coordinate method for non-convex optimization
Large-scale optimization problems are usually characterized not only by large amounts of
data points but points living in a high-dimensional space. Block coordinate methods allow …
data points but points living in a high-dimensional space. Block coordinate methods allow …
Safe and Secure Optimization in Human-Cyber-Physical Systems
B Turan - 2023 - escholarship.org
In our rapidly evolving technological landscape, the proliferation of enabling technologies
for autonomous systems has given rise to a burgeoning realm of societal-scale smart …
for autonomous systems has given rise to a burgeoning realm of societal-scale smart …
[PDF][PDF] Extremum Seeking Under Persistent Gradient Deception: A Switching Systems Approach
E Dall'Anese - dial.uclouvain.be
This letter focuses on extremum seeking (ES) controllers with adversarial attacks in the form
of deception signals. While a persistent attack in a feedback controller may be difficult to …
of deception signals. While a persistent attack in a feedback controller may be difficult to …
[PDF][PDF] On Robustness of the Normalized Random Block Coordinate Method for Non-Convex
Large-scale optimization problems are usually characterized not only by large amounts of
data points but points living in a high-dimensional space. Block coordinate methods allow …
data points but points living in a high-dimensional space. Block coordinate methods allow …