2019 IEEE 58th Conference on Decision and Control (CDC) 2019
DOI: 10.1109/cdc40024.2019.9030051
|View full text |Cite
|
Sign up to set email alerts
|

Resilient Distributed Optimization Algorithms for Resource Allocation

Abstract: Distributed algorithms provide flexibility over centralized algorithms for resource allocation problems, e.g., cyber-physical systems. However, the distributed nature of these algorithms often makes the systems susceptible to man-in-the-middle attacks, especially when messages are transmitted between price-taking agents and a central coordinator. We propose a resilient strategy for distributed algorithms under the framework of primal-dual distributed optimization. We formulate a robust optimization model that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…where f i is the local smooth objective function of agent i and h is a non-smooth regularization term that is shared across all the agents. Problem (1) is referred to as decentralized convex composite optimization [1], [2] and finds broad applications in optimal control of multi-agent systems [3], resource allocation [4], and large-scale machine learning [5], just to name a few.…”
Section: Introductionmentioning
confidence: 99%
“…where f i is the local smooth objective function of agent i and h is a non-smooth regularization term that is shared across all the agents. Problem (1) is referred to as decentralized convex composite optimization [1], [2] and finds broad applications in optimal control of multi-agent systems [3], resource allocation [4], and large-scale machine learning [5], just to name a few.…”
Section: Introductionmentioning
confidence: 99%
“…The present paper is a revised and extended version of the preliminary conference report [31]. This paper expands [31] into multiple attack scenarios and includes numerical studies. Paper Organization: The remainder of the paper is organized as follows.…”
Section: Introductionmentioning
confidence: 99%