no code implementations • 8 Dec 2023 • Sribalaji C. Anand, Michelle S. Chong, André M. H. Teixeira
Then, a data-driven algorithm is proposed to identify the attack-free sensors when the plant is controlled online.
1 code implementation • 10 Sep 2023 • M. Umar B. Niazi, Michelle S. Chong, Amr Alanwar, Karl H. Johansson
When a few number of sensors (less than half) can be compromised, we prove that the estimated set remains bounded by a contracting set that converges to a ball whose radius is solely determined by the noise magnitude and is independent of the attack signals.
no code implementations • 24 Jul 2023 • Cédric Escudero, Michelle S. Chong, Paolo Massioni, Eric Zamaï
Stealthy sensor injection attacks are serious threats for industrial plants as they can compromise the plant's integrity without being detected by traditional fault detectors.
no code implementations • 1 Dec 2022 • Yankai Lin, Michelle S. Chong, Carlos Murguia
To further ensure the safety of the states of the system, we choose a subset of sensors that can be locally secured and made free of attacks.
1 code implementation • 15 Nov 2022 • Muhammad Umar B. Niazi, Amr Alanwar, Michelle S. Chong, Karl Henrik Johansson
This paper considers the problem of set-based state estimation for linear time-invariant (LTI) systems under time-varying sensor attacks.
no code implementations • 13 Feb 2022 • Koen J. A. Scheres, Victor S. Dolk, Michelle S. Chong, Romain Postoyan, W. P. Maurice H. Heemels
We present a general emulation-based framework to address the distributed control of multi-agent systems over packet-based networks.
no code implementations • 10 Aug 2021 • Koen J. A. Scheres, Michelle S. Chong, Romain Postoyan, W. P. Maurice H. Heemels
We assume that the system has multiple sensor nodes, affected by measurement noise, which can transmit at discrete (non-equidistant) points in time.