no code implementations • 6 Apr 2024 • Nils Schlüter, Junsoo Kim, Moritz Schulze Darup
The growing interconnectivity in control systems due to robust wireless communication and cloud usage paves the way for exciting new opportunities such as data-driven control and service-based decision-making.
no code implementations • 3 Apr 2024 • Yeongjun Jang, Joowon Lee, Junsoo Kim, Hyungbo Shim
Implementing anomaly detection on encrypted control systems has been a challenge because it is hard to detect an anomaly from the encrypted residue signal without the secret key.
no code implementations • 31 Jul 2023 • Junsoo Kim
Homomorphic encryption (HE) applied to a networked controller enables secure operation, but in most cases it allows for addition and multiplication over integers only, because of computation efficiency.
no code implementations • 7 Jul 2023 • Joowon Lee, Donggil Lee, Junsoo Kim, Hyungbo Shim
In this paper, we present a method to encrypt dynamic controllers that can be implemented through most homomorphic encryption schemes, including somewhat, leveled fully, and fully homomorphic encryption.
no code implementations • 18 Apr 2023 • Junsoo Kim, Jin Gyu Lee, Henrik Sandberg, Karl H. Johansson
As a result, although a portion of measurements are compromised, they can be locally identified and excluded from the state estimation, and thus the true state can be recovered.
no code implementations • 22 Sep 2022 • Seongmin Hong, Seungjae Moon, Junsoo Kim, Sungjae Lee, Minsub Kim, Dongsoo Lee, Joo-Young Kim
DFX is also 8. 21x more cost-effective than the GPU appliance, suggesting that it is a promising solution for text generation workloads in cloud datacenters.
no code implementations • 12 Oct 2021 • Junsoo Kim, Farhad Farokhi, Iman Shames, Hyungbo Shim
In this note, we demonstrate that it is possible to run a dynamic controller over encrypted data for an infinite time horizon if the output of the controller can be represented as a function of a fixed number of previous inputs and outputs.
no code implementations • 15 Apr 2021 • Mariano Perez Chaher, Bayu Jayawardhana, Junsoo Kim
Simulation results show that, despite the use of encrypted data on the controller and errors introduced by the quantization process prior to the encryption, the formation is able to converge to the desired shape.
1 code implementation • CVPR 2021 • ByeoungDo Kim, Seong Hyeon Park, Seokhwan Lee, Elbek Khoshimjonov, Dongsuk Kum, Junsoo Kim, Jeong Soo Kim, Jun Won Choi
In this paper, we address the problem of predicting the future motion of a dynamic agent (called a target agent) given its current and past states as well as the information on its environment.
no code implementations • 16 Feb 2020 • Jin Gyu Lee, Junsoo Kim, Hyungbo Shim
In this paper, we present a scheme of fully distributed resilient state estimation for linear dynamical systems under sensor attacks.
no code implementations • 9 Dec 2019 • Junsoo Kim, Hyungbo Shim, Kyoohyung Han
In this paper, we present a dynamic feedback controller that computes the next state and the control signal over encrypted data using homomorphic properties of cryptosystems, whose performance is equivalent to the linear dynamic controllers over real-valued data.