2013
DOI: 10.1007/978-3-319-03964-0_11
|View full text |Cite
|
Sign up to set email alerts
|

Structural Controllability of Networks for Non-interactive Adversarial Vertex Removal

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
26
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
3

Relationship

3
3

Authors

Journals

citations
Cited by 15 publications
(26 citation statements)
references
References 20 publications
0
26
0
Order By: Relevance
“…Lin [15] defines G(A, B) = (V, E) as a digraph where V = V A ∪ V B is the set of vertices and E = E A ∪ E B is the set of edges. In this representation, V B comprises the nodes capable of injecting control signals into the entire network, also known as driver nodes (denoted as n d ) corresponding to input vector u in Equation (1). The identification of these nodes has so far been studied in relation to general networks.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Lin [15] defines G(A, B) = (V, E) as a digraph where V = V A ∪ V B is the set of vertices and E = E A ∪ E B is the set of edges. In this representation, V B comprises the nodes capable of injecting control signals into the entire network, also known as driver nodes (denoted as n d ) corresponding to input vector u in Equation (1). The identification of these nodes has so far been studied in relation to general networks.…”
Section: Introductionmentioning
confidence: 99%
“…This paper concentrates on power-law networks, most pertinent to a number of large-scale infrastructure networks. To identify the minimum driver node subsets N D , we follow the approach based on the power dominating set (PDS) problem, which is described in more detail in [1,2]. This interest is primarily because PDS-based networks have similar logical structures as real-world monitoring systems, where driver nodes can represent, for example, remote terminal units that control industrial sensors and actuators.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…An interesting approach is developed in [32], [33] to restore/maintain controllability of networks in the presence of adversarial attacks or failure that remove some nodes/links. The authors apply a novel computationally efficient sub-optimal approximation for the restoration of the Power Dominating Set (PDS) 1 .…”
mentioning
confidence: 99%
“…The authors apply a novel computationally efficient sub-optimal approximation for the restoration of the Power Dominating Set (PDS) 1 . The authors apply their restoration strategy over different random models including Erdos-Renyi (ER), Small-World (SW), and Scale-Free (SF) graphs [32] and also provide a thorough complexity analysis of their method [33]. Further, this restoration strategy is applied for cloud-based monitoring of Cyber-Physical-Systems (CPS) [35], where a local attack detection technique based on the opinion dynamics 1 A set SG is a Dominating Set of the graph G = {V, E } if every node in V \ SG has a neighbor node in SG.…”
mentioning
confidence: 99%