The Internet of Things brings about many applications where networks of devices collectively gather and process data for insight. The devices, however, are vulnerable to cyber-attacks that compromise their processing capabilities and jeopardize their objectives. This thesis studies secure distributed inference in adversarial settings. We focus on distributed estimation, where networked entities measure an unknown parameter -- for example, a team of robots sensing an unknown environment, or a network of smart meters collecting data about the electricity grid -- and process their local measurements and information obtained from neighboring devices to estimate its value. Powerful adversaries manipulate the devices' processing and communication...
Distributed estimation of a deterministic scalar parameter by using quantized data in the presence o...
This article investigates the distributed secure state estimation problem for cyber-physical systems...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
The Internet of Things brings about many applications where networks of devices collectively gather ...
The Internet of Things (IoT) improves pervasive sensing and control capabilities via the aid of mode...
The design of a distributed architecture for the detection of covert attacks in interconnected Cyber...
Networked cyber-physical systems are prone to various types of cyber-attacks and disturbances. An ev...
Distributed estimation using quantized data in the presence of Byzantine attacks is considered. Seve...
This dissertation studies two topics related to the problem of estimation in networked systems, name...
This paper considers security issues of a cyber-physical system (CPS) under denial-of-service (DoS) ...
This paper considers distributed estimation of linear systems when the state observations are corrup...
This article has been accepted for publication in a future issue of this journal, but has not been f...
Publisher Copyright: Author Tallennetaan OA-artikkeli, kun julkaistuThis paper proposes a distribute...
In this study, distributed security estimation problems for networked stochastic uncertain systems s...
Herein, design of false data injection attack on a distributed cyber-physical system is considered. ...
Distributed estimation of a deterministic scalar parameter by using quantized data in the presence o...
This article investigates the distributed secure state estimation problem for cyber-physical systems...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
The Internet of Things brings about many applications where networks of devices collectively gather ...
The Internet of Things (IoT) improves pervasive sensing and control capabilities via the aid of mode...
The design of a distributed architecture for the detection of covert attacks in interconnected Cyber...
Networked cyber-physical systems are prone to various types of cyber-attacks and disturbances. An ev...
Distributed estimation using quantized data in the presence of Byzantine attacks is considered. Seve...
This dissertation studies two topics related to the problem of estimation in networked systems, name...
This paper considers security issues of a cyber-physical system (CPS) under denial-of-service (DoS) ...
This paper considers distributed estimation of linear systems when the state observations are corrup...
This article has been accepted for publication in a future issue of this journal, but has not been f...
Publisher Copyright: Author Tallennetaan OA-artikkeli, kun julkaistuThis paper proposes a distribute...
In this study, distributed security estimation problems for networked stochastic uncertain systems s...
Herein, design of false data injection attack on a distributed cyber-physical system is considered. ...
Distributed estimation of a deterministic scalar parameter by using quantized data in the presence o...
This article investigates the distributed secure state estimation problem for cyber-physical systems...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...