SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Abdalmoaty Mohamed 1986 ) srt2:(2023)"

Sökning: WFRF:(Abdalmoaty Mohamed 1986 ) > (2023)

  • Resultat 1-2 av 2
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Abdalmoaty, Mohamed, 1986-, et al. (författare)
  • Continuous Time-Delay Estimation From Sampled Measurements
  • 2023
  • Ingår i: IFAC-PapersOnLine. - : Elsevier. - 2405-8963. ; 56:2, s. 6982-6987
  • Tidskriftsartikel (refereegranskat)abstract
    • An algorithm for continuous time-delay estimation from sampled output data and a known input of finite energy is presented. The continuous time-delay modeling allows for the estimation of subsample delays. The proposed estimation algorithm consists of two steps. First, the continuous Laguerre spectrum of the output (delayed) signal is estimated from discretetime (sampled) noisy measurements. Second, an estimate of the delay value is obtained via a Laguerre domain model using a continuous-time description of the input. The second step of the algorithm is shown to be intrinsically biased, the bias sources are established, and the bias itself is modeled. The proposed delay estimation approach is compared in a Monte-Carlo simulation with state-of-the-art methods implemented in time, frequency, and Laguerre domain demonstrating comparable or higher accuracy in the considered scenario.
  •  
2.
  • Abdalmoaty, Mohamed, 1986-, et al. (författare)
  • Privacy and Security in Network Controlled Systems via Dynamic Masking
  • 2023
  • Ingår i: IFAC-PapersOnLine. - : Elsevier. - 2405-8963. ; 56:2, s. 991-996
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we propose a new architecture to enhance the privacy and security of networked control systems against malicious adversaries. We consider an adversary which first learns the system using system identification techniques (privacy), and then performs a data injection attack (security). In particular, we consider an adversary conducting zero-dynamics attacks (ZDA) which maximizes the performance cost of the system whilst staying undetected. Using the proposed architecture, we show that it is possible to (i) introduce significant bias in the system estimates obtained by the adversary: thus providing privacy, and (ii) efficiently detect attacks when the adversary performs a ZDA using the identified system: thus providing security. Through numerical simulations, we illustrate the efficacy of the proposed architecture
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-2 av 2
Typ av publikation
tidskriftsartikel (2)
Typ av innehåll
refereegranskat (2)
Författare/redaktör
Abdalmoaty, Mohamed, ... (2)
Medvedev, Alexander, ... (1)
Coimbatore Anand, Sr ... (1)
Teixeira, André, Ass ... (1)
Lärosäte
Uppsala universitet (2)
Språk
Engelska (2)
Forskningsämne (UKÄ/SCB)
Teknik (2)
År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy