Remote state estimation problems in the presence of eavesdroppers have recently been investigated in the literature. For unstable systems, it has been shown that it is possible to keep the expected estimation error covariance bounded, while the expected eavesdropper error covariance becomes unbounded in the infinite horizon. In this note, we consider an alternative notion of security based on the amount of information revealed to the eavesdropper. Upper and lower bounds on the information revealed are derived. In particular, in the infinite horizon, it is shown that with unstable systems, any transmission policy (within the class of stationary deterministic policies where the sensor at each time step can either transmit its local state esti...
We study the maximum information gain that an adversary may obtain through hacking without being det...
We consider remote state estimation in the presence of an active eavesdropper. A sensor forward loca...
We study the problem of remote state estimation in the presence of a passive eavesdropper, under the...
Remote state estimation problems in the presence of eavesdroppers have recently been investigated in...
In this chapter, we study a remote state estimation problem in the presence of an eavesdropper. A se...
This paper studies a remote state estimation problem in the presence of an eavesdropper. A sensor tr...
Remote state estimation problems in the presence of an eavesdropper have recently been studied. In t...
The problem of remote state estimation in the presence of eavesdroppers has recently been investiga...
This paper studies transmission scheduling for remote state estimation in the presence of an eavesdr...
This paper studies transmission scheduling for remote state estimation in the presence of an eavesdr...
This paper studies transmission scheduling for remote state estimation in the presence of an eavesd...
We study the problem of remote state estimation in the presence of an eavesdropper. A sensor transmi...
We consider a secure remote state estimation problem where the observations transmitted from the sen...
We study the problem of remote state estimation in the presence of a passive eavesdropper. An author...
We assume that the states of an unstable dynamical system are encoded and sent to an estimator throu...
We study the maximum information gain that an adversary may obtain through hacking without being det...
We consider remote state estimation in the presence of an active eavesdropper. A sensor forward loca...
We study the problem of remote state estimation in the presence of a passive eavesdropper, under the...
Remote state estimation problems in the presence of eavesdroppers have recently been investigated in...
In this chapter, we study a remote state estimation problem in the presence of an eavesdropper. A se...
This paper studies a remote state estimation problem in the presence of an eavesdropper. A sensor tr...
Remote state estimation problems in the presence of an eavesdropper have recently been studied. In t...
The problem of remote state estimation in the presence of eavesdroppers has recently been investiga...
This paper studies transmission scheduling for remote state estimation in the presence of an eavesdr...
This paper studies transmission scheduling for remote state estimation in the presence of an eavesdr...
This paper studies transmission scheduling for remote state estimation in the presence of an eavesd...
We study the problem of remote state estimation in the presence of an eavesdropper. A sensor transmi...
We consider a secure remote state estimation problem where the observations transmitted from the sen...
We study the problem of remote state estimation in the presence of a passive eavesdropper. An author...
We assume that the states of an unstable dynamical system are encoded and sent to an estimator throu...
We study the maximum information gain that an adversary may obtain through hacking without being det...
We consider remote state estimation in the presence of an active eavesdropper. A sensor forward loca...
We study the problem of remote state estimation in the presence of a passive eavesdropper, under the...