This paper considers the problem of set-based state estimation for linear time-invariant (LTI) systems under time-varying sensor attacks. Provided that the LTI system is stable and observable via every single sensor and that at least one sensor is uncompromised, we guarantee that the true state is always contained in the estimated set. We use zonotopes to represent these sets for computational efficiency. However, we show that intelligently designed stealthy attacks may cause exponential growth in the algorithm's worst-case complexity. We present several strategies to handle this complexity issue and illustrate our resilient zonotope-based state estimation algorithm on a rotating target system.</p
The state estimation of continuous-time nonlinear systems in which a subset of sensor outputs can be...
International audienceThis paper presents an improved technique for guaranteed zonotopic state estim...
Motivated by the need to secure cyber-physical systems against attacks, we consider the problem of e...
This paper considers the problem of set-based state estimation for linear time-invariant (LTI) syste...
This paper considers the problem of set-based state estimation for linear time-invariant (LTI) syste...
When a strategic adversary can attack multiple sensors of a system and freely choose a different set...
When a strategic adversary can attack multiple sensors of a system and freely choose a different set...
We consider the problem of estimating the state of a noisy linear dynamical system when an unknown s...
This paper addresses the problem of state estimation for linear dynamic systems that is resilient ag...
We consider the problem of attack-resilient state estimation in the presence of noise. We focus on t...
International audienceThis paper proposes a methodology for guaranteed state estimation of linear di...
This talk focuses on guaranteed state estimation by zonotopes [1], [2] applied to multivariable line...
We study estimation of the state of a dynamical system via a network of nodes (or sensors). Such net...
We address the problem of detecting and mitigating the effect of malicious attacks on the sensors of...
This paper presents a distributed attack-resilient state estimation scheme for continuous-time linea...
The state estimation of continuous-time nonlinear systems in which a subset of sensor outputs can be...
International audienceThis paper presents an improved technique for guaranteed zonotopic state estim...
Motivated by the need to secure cyber-physical systems against attacks, we consider the problem of e...
This paper considers the problem of set-based state estimation for linear time-invariant (LTI) syste...
This paper considers the problem of set-based state estimation for linear time-invariant (LTI) syste...
When a strategic adversary can attack multiple sensors of a system and freely choose a different set...
When a strategic adversary can attack multiple sensors of a system and freely choose a different set...
We consider the problem of estimating the state of a noisy linear dynamical system when an unknown s...
This paper addresses the problem of state estimation for linear dynamic systems that is resilient ag...
We consider the problem of attack-resilient state estimation in the presence of noise. We focus on t...
International audienceThis paper proposes a methodology for guaranteed state estimation of linear di...
This talk focuses on guaranteed state estimation by zonotopes [1], [2] applied to multivariable line...
We study estimation of the state of a dynamical system via a network of nodes (or sensors). Such net...
We address the problem of detecting and mitigating the effect of malicious attacks on the sensors of...
This paper presents a distributed attack-resilient state estimation scheme for continuous-time linea...
The state estimation of continuous-time nonlinear systems in which a subset of sensor outputs can be...
International audienceThis paper presents an improved technique for guaranteed zonotopic state estim...
Motivated by the need to secure cyber-physical systems against attacks, we consider the problem of e...