2018
DOI: 10.48550/arxiv.1807.08004
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Robust Resilient Signal Reconstruction under Adversarial Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4

Relationship

4
0

Authors

Journals

citations
Cited by 4 publications
(11 citation statements)
references
References 0 publications
0
11
0
Order By: Relevance
“…Failure of CPS is more complicated than random failures or well-defined uncertainty for which many results exist on reliability and robustness, since they may be caused by stealth malicious attacks. One of such powerful deception attacks, named false data injection attack (FDIA), has shown ability to bypass bad data detector (BDD), while compromising the integrity of observer and robust controller with sparse measurements corruption [4,5]. Consequently, much research attention have been directed to develop appropriate protection schemes.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…Failure of CPS is more complicated than random failures or well-defined uncertainty for which many results exist on reliability and robustness, since they may be caused by stealth malicious attacks. One of such powerful deception attacks, named false data injection attack (FDIA), has shown ability to bypass bad data detector (BDD), while compromising the integrity of observer and robust controller with sparse measurements corruption [4,5]. Consequently, much research attention have been directed to develop appropriate protection schemes.…”
Section: Introductionmentioning
confidence: 99%
“…Due to sparsity assumption of the attack vector |supp(e)| ≤ k, the resilient estimation problem has been cast as a classical error correction problem [5,11]. Consider a linear observation model y = Hx + e, where H ∈ R N×n denotes an observation matrix, then the resilient estimation is formulated as 0-norm minimization problem [12].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In this paper, we build on our previous works on enhancing the recoverability of resilient estimators by incorporating prior information, either in form of attack-support estimation [23] or through a more general set inclusion constraint [24]. Here, we provide theoretical guarantees of how certain boundedness property of the prior information set can improve the reconstruction error bound of the resulting resilient estimator.…”
Section: Introductionmentioning
confidence: 99%