no code implementations • 31 Mar 2022 • Jingshi Yao, Xiang Yin, ShaoYuan Li
Specifically, we consider an active attacker that can tamper with the observations received by the supervisor by, e. g., hacking on the communication channel between the sensors and the supervisor.