ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2019
DOI: 10.1109/icassp.2019.8682919
|View full text |Cite
|
Sign up to set email alerts
|

Learning Requirements for Stealth Attacks

Abstract: The learning data requirements are analyzed for the construction of stealth attacks in state estimation. In particular, the training data set is used to compute a sample covariance matrix that results in a random matrix with a Wishart distribution. The ergodic attack performance is defined as the average attack performance obtained by taking the expectation with respect to the distribution of the training data set. The impact of the training data size on the ergodic attack performance is characterized by propo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 40 publications
0
6
0
Order By: Relevance
“…Given the Wishart distribution of the attack covariance matrix in (18), the KL divergence objective in (21) and the cost functions in (22) are both random variables. Following on the same steps as in [18], we defined the ergodic performance of the attack as the performance obtained by averaging over all realizations of the training data set, i.e. as E[F (Σ Ã Ã)].…”
Section: A Learning Scenario Settingmentioning
confidence: 99%
See 3 more Smart Citations
“…Given the Wishart distribution of the attack covariance matrix in (18), the KL divergence objective in (21) and the cost functions in (22) are both random variables. Following on the same steps as in [18], we defined the ergodic performance of the attack as the performance obtained by averaging over all realizations of the training data set, i.e. as E[F (Σ Ã Ã)].…”
Section: A Learning Scenario Settingmentioning
confidence: 99%
“…Under this scenario, only probabilistic bounds are available for the eigenvalues of random matrices. To that end, we can only provide upper and lower bounds on the non-asymptotic ergodic performance [18].…”
Section: A Learning Scenario Settingmentioning
confidence: 99%
See 2 more Smart Citations
“…The stealth attack construction proposed in the preceding text requires perfect knowledge of the covariance matrix of the state variables and the linearized Jacobian measurement matrix. In [23], the performance of the attack when the second-order statistics are not perfectly known by the attacker but the linearized Jacobian measurement matrix is known. Therein, the partial knowledge is modelled by assuming that the attacker has access to a sample covariance matrix of the state variables.…”
Section: Numerical Evaluation Of Stealth Attacksmentioning
confidence: 99%

Data-Injection Attacks

Esnaola,
Perlaza,
Sun
2021
Preprint
Self Cite