2020
DOI: 10.1016/j.cherd.2020.04.018
|View full text |Cite
|
Sign up to set email alerts
|

Post cyber-attack state reconstruction for nonlinear processes using machine learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(20 citation statements)
references
References 18 publications
0
20
0
Order By: Relevance
“…Also inspired by [38], Proposition 3 demonstrates the fact that the nonlinear system of Eq. 1 can be rendered negative for all times, so that the actual state x can be driven towards the origin under implementation of the stabilizing controller h(x), which utilizes the estimated state, derived from the updated parameters θ(t k ) computed by the RL agent of Algorithm 1.…”
Section: Closed-loop Stability Analysis Of Rl-based Empcmentioning
confidence: 95%
See 1 more Smart Citation
“…Also inspired by [38], Proposition 3 demonstrates the fact that the nonlinear system of Eq. 1 can be rendered negative for all times, so that the actual state x can be driven towards the origin under implementation of the stabilizing controller h(x), which utilizes the estimated state, derived from the updated parameters θ(t k ) computed by the RL agent of Algorithm 1.…”
Section: Closed-loop Stability Analysis Of Rl-based Empcmentioning
confidence: 95%
“…Inspired by the work in [38], Proposition 2 provides an upper bound on the deviation between the actual state and the estimated state obtained from the RL agent in Algorithm 1.…”
Section: Closed-loop Stability Analysis Of Rl-based Empcmentioning
confidence: 99%
“…Proof: The proof of Proposition 1 follows the same lines of the proof of Proposition 2 in [32] and it is omitted for the sake for brevity.…”
Section: Remarkmentioning
confidence: 99%
“…[13] Integrated cyberattack detection and advanced control methods using model predictive control (MPC [14] ) also have been developed as an attempt to identify attacks while guaranteeing closed-loop stability even in the presence of cyberattacks. [15,16] In ref. [15], a neural network-based detection method combined with a model predictive controller for nonlinear systems was designed to potentially detect sensor tampering.…”
Section: Introductionmentioning
confidence: 99%
“…After the detection of cyberattacks, to retain control of the system and ensure safe operation ref. [16] proposes a state reconstruction algorithm using machine learning methods based on the falsified state measurements. Moreover, cyberattack detection and MPC techniques with economics‐based objective functions, named economic model predictive controllers (EMPC [ 17 ] ), have been investigated in light of Lyapunov‐based constraint properties (Lyapunov‐based EMPC or LEMPC [ 18 ] ) to maintain closed‐loop stability of the system, under sufficient conditions, both in the absence of and in the presence of cyberattacks.…”
Section: Introductionmentioning
confidence: 99%