2015 54th IEEE Conference on Decision and Control (CDC) 2015
DOI: 10.1109/cdc.2015.7402810
|View full text |Cite
|
Sign up to set email alerts
|

Secure state reconstruction in differentially flat systems under sensor attacks using satisfiability modulo theory solving

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 20 publications
0
18
0
Order By: Relevance
“…Instead of imposing restrictions on the attack signal a i (t) itself, we assume q-sparsity on the set of attack signals {a i } i∈ [p] , motivated by the rationale that the attack resource is limited so that only a portion of the sensors is compromised (see [9]- [11], [13], [14]).…”
Section: A Problem Formulationmentioning
confidence: 99%
“…Instead of imposing restrictions on the attack signal a i (t) itself, we assume q-sparsity on the set of attack signals {a i } i∈ [p] , motivated by the rationale that the attack resource is limited so that only a portion of the sensors is compromised (see [9]- [11], [13], [14]).…”
Section: A Problem Formulationmentioning
confidence: 99%
“…PROOF. To formalize the result, we make use of the fact that any undetectable attack (7) can be written in the form…”
Section: Design Of Optimal Undetectable Attacksmentioning
confidence: 99%
“…Related Work: Concerns about safety and security of CPS are not new, as the numerous manuscripts on systems attack/fault detection, isolation, and recovery testify -e.g., [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54]. Currently, there exist several approaches to designing monitors ranging from simple sensor thresholding techniques to more complex data-driven learning approaches.…”
Section: Introductionmentioning
confidence: 99%