Secure-by-construction synthesis of cyber-physical systems
Correct-by-construction synthesis is a cornerstone of the confluence of formal methods and
control theory towards designing safety-critical systems. Instead of following the time-tested …
control theory towards designing safety-critical systems. Instead of following the time-tested …
A brief survey on encrypted control: From the first to the second generation and beyond
This article provides a comprehensive and illustrative presentation of the young field of
encrypted control. In particular, we survey the evolution of encrypted controllers from their …
encrypted control. In particular, we survey the evolution of encrypted controllers from their …
Privacy-preserving distributed economic dispatch for microgrids based on state decomposition with added noises
This paper devotes itself to the issue of privacy-preserving distributed economic dispatch
(ED) of microgrids. The desired algorithm in a distributed way not only ensures a balance …
(ED) of microgrids. The desired algorithm in a distributed way not only ensures a balance …
[HTML][HTML] Ensuring secure platooning of constrained intelligent and connected vehicles against Byzantine attacks: A distributed MPC framework
This study investigates resilient platoon control for constrained intelligent and connected
vehicles (ICVs) against F-local Byzantine attacks. We introduce a resilient distributed model …
vehicles (ICVs) against F-local Byzantine attacks. We introduce a resilient distributed model …
Hybrid cryptographic approach to enhance the mode of key management system in cloud environment
S Ahmad, S Mehfuz, J Beg - The Journal of Supercomputing, 2023 - Springer
Cloud computing has gained great attention among the individual user and the organization.
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …
Dynamic controller that operates over homomorphically encrypted data for infinite time horizon
In this article, we present a dynamic feedback controller that computes the next state and the
control signal over encrypted data using homomorphic properties of cryptosystems, whose …
control signal over encrypted data using homomorphic properties of cryptosystems, whose …
Privacy-preserved average consensus algorithms with edge-based additive perturbations
Y Xiong, Z Li - Automatica, 2022 - Elsevier
In this paper, we consider the privacy preservation problem in continuous-time average
consensus algorithms with strongly connected and balanced graphs, against either internal …
consensus algorithms with strongly connected and balanced graphs, against either internal …
Dynamics based privacy preservation in decentralized optimization
With decentralized optimization having increased applications in various domains ranging
from machine learning, control, to robotics, its privacy is also receiving increased attention …
from machine learning, control, to robotics, its privacy is also receiving increased attention …
Privacy-preserving dynamic average consensus via state decomposition: Case study on multi-robot formation control
Dynamic average consensus is a decentralized control/estimation framework where a group
of agents cooperatively track the average of local time-varying reference signals. In this …
of agents cooperatively track the average of local time-varying reference signals. In this …
[HTML][HTML] Designing communication networks for discrete-time consensus for performance and privacy guarantees
Discrete-time consensus plays a key role in multi-agent systems and distributed protocols.
Unfortunately, due to the self-loop dynamics of the agents (an agent's current state depends …
Unfortunately, due to the self-loop dynamics of the agents (an agent's current state depends …