2021 American Control Conference (ACC) 2021
DOI: 10.23919/acc50511.2021.9482948
|View full text |Cite
|
Sign up to set email alerts
|

Extremum Seeking Under Persistent Gradient Deception: A Switching Systems Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(7 citation statements)
references
References 24 publications
0
7
0
Order By: Relevance
“…Moreover, by condition (13), the defense mechanism prevents the emergence of Zeno behavior in the system, permitting only switches of σ that satisfy an average dwell-time constraint. Similar attack models have been considered in the literature; see [13,20,11]. Indeed, conditions ( 12)-( 13) are quite general: they capture periodic or aperiodic attacks, and they allow a finite number of consecutive switches in every interval of time of sufficiently large length.…”
Section: Detection and Mitigation Mechanismmentioning
confidence: 95%
See 4 more Smart Citations
“…Moreover, by condition (13), the defense mechanism prevents the emergence of Zeno behavior in the system, permitting only switches of σ that satisfy an average dwell-time constraint. Similar attack models have been considered in the literature; see [13,20,11]. Indeed, conditions ( 12)-( 13) are quite general: they capture periodic or aperiodic attacks, and they allow a finite number of consecutive switches in every interval of time of sufficiently large length.…”
Section: Detection and Mitigation Mechanismmentioning
confidence: 95%
“…On the other hand, gradient-flow controllers have been used to drive the equilibrium point of the traffic flows on the highway system towards the solution of a network-level problem as explained in, e.g., [30] and [36]. It then follows that the attack models consider in (11) can be used to capture adversarial jamming of the feedback gains of the ALINEA controller, or attacks acting on the control directions obtained from the gradient flow algorithm.…”
Section: Examplementioning
confidence: 99%
See 3 more Smart Citations