no code implementations • 19 Jun 2023 • Tianci Yang, Carlos Murguia, Dragan Nesic, Chau Yuen
Given enough system knowledge, adversaries are still able to launch a range of attacks that can surpass the detection scheme by hiding within the system disturbances and uncertainty -- we refer to this class of attacks as \textit{stealthy FDI attacks}.
no code implementations • 3 Sep 2021 • Tianci Yang, Carlos Murguia, Chen Lv
In this manuscript, we propose a novel attack detection scheme that leverage real-time sensor/network data and physics-based mathematical models of vehicles in the platoon.
no code implementations • 19 Jun 2021 • Tianci Yang, Carlos Murguia, Dragan Nešić, Chen Lv
The idea is to transmit acceleration commands multiple times through different communication networks (channels) to create redundancy at the receiver side.