In this thesis, we consider three different problems related to control using communication channel as a medium to transfer control signal in a networked control system. In particular, we are interested in control in the presence of an intelligent and strategic jammer who is maliciously altering the control signal or observation signal in the communication network connecting the controller and the plant. The first formulation considers a dynamic zero-sum game between a controller and a jammer for two different scenarios. The first player acts as a controller for a discrete time LTI plant, while the second player acts to jam the communication between the controller and the plant. The number of jamming actions is limited, which captures th...
International audienceIn this paper we suggest a development of the channel capacity concept for a d...
This paper develops a game-theoretic defense approach against jamming attacks targeting access point...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
In this thesis, we consider three different problems related to control using communication channel ...
This dissertation considers a system consisting of self-interested users of a common multiple-input ...
The process of communication jamming can be modeled as a two-person zero-sum noncooperative dynamic ...
In this paper, we address the issue of malicious intrusion in the communication network present in a...
Cognitive radio networks are more susceptible to jamming attacks due to the nature of unlicensed use...
We consider a binary communication system where the transmitted signal amplitude varies according to...
Cognitive radio networks are more susceptible to jamming attacks due to the nature of unlicensed use...
This paper considers a game-theoretic formulation of the covert communications problem with finite b...
Consider a parallel Gaussian channel with M subchannels each of which experiences independent flat f...
In this paper, we investigate the performance of power line communication (PLC) network in the prese...
This paper considers a zero-sum game between a team of delay-constrained encoder and decoder, and a ...
International audienceIn this paper we suggest a development of the channel capacity concept for a d...
International audienceIn this paper we suggest a development of the channel capacity concept for a d...
This paper develops a game-theoretic defense approach against jamming attacks targeting access point...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...
In this thesis, we consider three different problems related to control using communication channel ...
This dissertation considers a system consisting of self-interested users of a common multiple-input ...
The process of communication jamming can be modeled as a two-person zero-sum noncooperative dynamic ...
In this paper, we address the issue of malicious intrusion in the communication network present in a...
Cognitive radio networks are more susceptible to jamming attacks due to the nature of unlicensed use...
We consider a binary communication system where the transmitted signal amplitude varies according to...
Cognitive radio networks are more susceptible to jamming attacks due to the nature of unlicensed use...
This paper considers a game-theoretic formulation of the covert communications problem with finite b...
Consider a parallel Gaussian channel with M subchannels each of which experiences independent flat f...
In this paper, we investigate the performance of power line communication (PLC) network in the prese...
This paper considers a zero-sum game between a team of delay-constrained encoder and decoder, and a ...
International audienceIn this paper we suggest a development of the channel capacity concept for a d...
International audienceIn this paper we suggest a development of the channel capacity concept for a d...
This paper develops a game-theoretic defense approach against jamming attacks targeting access point...
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and tran...