2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton) 2018
DOI: 10.1109/allerton.2018.8635839
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Stopping Criterion for Ratio Consensus

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 14 publications
0
12
0
Order By: Relevance
“…To this end, we propose a distributed gradient-descent method to solve problem (2) over directed graphs. Our scheme is a combination of a finite-time consensus protocol of [23] and the gradient descent method. We will refer to our protocol as gradient-consensus method.…”
Section: Problem Formulationmentioning
confidence: 99%
“…To this end, we propose a distributed gradient-descent method to solve problem (2) over directed graphs. Our scheme is a combination of a finite-time consensus protocol of [23] and the gradient descent method. We will refer to our protocol as gradient-consensus method.…”
Section: Problem Formulationmentioning
confidence: 99%
“…To realize distributed stopping when the precision of iterations has met the requirement, we utilize the max/minconsensus-based stopping mechanism in [29] after the K 2th iteration. Note that the scheme in [29] deals with static digraphs, but it can be easily extended to the settings with time-varying digraphs, given that in this case the max/min consensus protocols can still converge in finite time. The following assumption is required by this mechanism.…”
Section: B Privacy-preserving Information Disseminationmentioning
confidence: 99%
“…j∈V x j (0) = N α (as j∈V y j (0) = N ). It is sufficient to prove that under the attack strategy (9) j∈V x j (k) = N α − N θ. Consider i to be the intruder node and let k 1 , k 2 , .…”
Section: Data Manipulation Attacksmentioning
confidence: 99%
“…In this section, we propose a cyber-secured framework for networks running distributed consensus algorithms. We first present the max-min protocols to obtain global maximum and minimum values of the network and use the monotonicity property of these protocols [9] to devise the proposed distributed intruder detection algorithm. Define the maximum and minimum value of the ratio of numerator and denominator states given by (1a) and (1b) over all nodes at any time instant k as, for all nodes j ∈ N + i .…”
Section: Frameworkmentioning
confidence: 99%
See 1 more Smart Citation