SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Nekouei Ehsan) srt2:(2019)"

Sökning: WFRF:(Nekouei Ehsan) > (2019)

  • Resultat 1-7 av 7
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Nekouei, Ehsan, et al. (författare)
  • Information-theoretic approaches to privacy in estimation and control
  • 2019
  • Ingår i: Annual Reviews in Control. - : PERGAMON-ELSEVIER SCIENCE LTD. - 1367-5788 .- 1872-9088. ; 47, s. 412-422
  • Forskningsöversikt (refereegranskat)abstract
    • Network control systems (NCSs) heavily rely on information and communication technologies for sharing information between sensors and controllers as well as controllers and actuators. When estimation, control or actuation tasks in a NCS are performed by an untrusted party, sharing information might result in the leakage of private information. The current paper reviews some of the recent results on the privacy-aware decision-making problems in NCSs. In particular, we focus on static and dynamic decision-making problems wherein privacy is measured using information-theoretic notions. We also review the applications of these problems in smart buildings and smart grids. 
  •  
2.
  • Nekouei, Ehsan, et al. (författare)
  • Optimal Decision Fusion Under Order Effects
  • 2019
  • Ingår i: IFAC PAPERSONLINE. - : ELSEVIER SCIENCE BV. - 2405-8963. ; , s. 53-60
  • Konferensbidrag (refereegranskat)abstract
    • This paper studies an optimal decision fusion problem with a group of human decision makers when an order effect is present. The order effect refers to situations wherein the process of decision making by a human is affected by the order of decisions. In our set-up, all human decision makers, called observers, receive the same data which is generated by a common but unknown hypothesis. Then, each observer independently generates a sequence of decisions which are modeled by employing non-commutative probabilistic models of the data and their relation to the unknown hypothesis. The use of non-commutative probability models is motivated by recent psychological studies which indicate that these non-commutative probability models are more suitable for capturing the order effect in human decision making, compared with the classical probability model. A central decision maker (CDM) receives (possibly a subset of) the observers' decisions and decides on the true hypothesis. The considered problem becomes an optimal decision fusion problem with observations modeled using a non-commutative (Von Neumann) probability model. The structure of the optimal decision rule at the CDM is studied under two scenarios. In the first scenario, the CDM receives the entire history of the observers' decisions whereas in the second scenario, the CDM receives only the last decision of each observer. The perfromance of the optimal fusion rule is numerically evaluated and compared with the optimal fusion rule derived when using a classical probability model.
  •  
3.
  • Pirani, Mohammad, et al. (författare)
  • A game-theoretic framework for security-aware sensor placement problem in networked control systems
  • 2019
  • Ingår i: Proceedings of the American Control Conference. - : Institute of Electrical and Electronics Engineers (IEEE). - 9781538679265 ; , s. 114-119
  • Konferensbidrag (refereegranskat)abstract
    • This paper studies the sensor placement problem in a networked control system for improving its security against cyber-physical attacks. The problem is formulated as a zero-sum game between an attacker and a detector. The attacker's decision is to select f nodes of the network to attack whereas the detector's decision is to place f sensors to detect the presence of the attack signals. In our formulation, the attacker minimizes its visibility, defined as the system L2 gain from the attack signals to the deployed sensors' outputs, and the detector maximizes the visibility of the attack signals. The equilibrium strategy of the game determines the optimal locations of the sensors. The existence of Nash equilibrium for the attacker-detector game is studied when the underlying connectivity graph is a directed or an undirected tree. When the game does not admit a Nash equilibrium, it is shown that the Stackelberg equilibrium of the game, with the detector as the game leader, can be computed efficiently. Our results show that, under the optimal sensor placement strategy, an undirected topology provides a higher security level for a networked control system compared with its corresponding directed topology.
  •  
4.
  • Pirani, Mohammad, et al. (författare)
  • Design of Attack-Resilient Consensus Dynamics : A Game-Theoretic Approach
  • 2019
  • Ingår i: Proceedings 2019 18th European Control Conference (ECC). - : IEEE. - 9783907144008 ; , s. 2227-2232
  • Konferensbidrag (refereegranskat)abstract
    • We propose a game-theoretic framework for improving the resilience of multi-agent consensus dynamics in the presence of a strategic attacker. In this game, the attacker selects a set of network nodes to inject the attack signals. The attacker's objective is to minimize the required energy for steering the consensus towards its desired direction. This energy is captured by the trace of controllability Gramian of the system when the input is the attack signal. The defender improves the resilience of dynamics by adding self-feedback loops to certain nodes of the system and its objective is to maximize the trace of controllability Gramian. The Stackelberg equilibrium of the game is studied with the defender as the game leader. When the underlying network topology is a tree and the defender can select only one node, we show that the optimal strategy of the defender is determined by a specific distance-based network centrality measure, called network's f-center. In addition, we show that the degree-based centralities solutions may lead to undesirable payoffs for the defender. At the end, we discuss the case of multiple attack and defense nodes on general graphs.
  •  
5.
  • Umsonst, David, et al. (författare)
  • On the confidentiality of linear anomaly detector states
  • 2019
  • Ingår i: Proceedings of the American Control Conference. - : Institute of Electrical and Electronics Engineers (IEEE). - 9781538679265 ; , s. 397-403
  • Konferensbidrag (refereegranskat)abstract
    • A malicious attacker with access to the sensor channel in a feedback control system can severely affect the physical system under control, while simultaneously being hard to detect. A properly designed anomaly detector can restrict the impact of such attacks, however. Anomaly detectors with an internal state (stateful detectors) have gained popularity because they seem to be able to mitigate these attacks more than detectors without a state (stateless detectors). In the analysis of attacks against control systems with anomaly detectors, it has been assumed that the attacker has access to the detector's internal state, or designs its attack such that it is not detected regardless of the detector's state. In this paper, we show how an attacker can realize the first case by breaking the confidentiality of a stateful detector state evolving with linear dynamics, while remaining undetected and imitating the statistics of the detector under nominal conditions. The realization of the attack is posed in a convex optimization framework using the notion of Kullback-Leibler divergence. Further, the attack is designed such that the maximum mean estimation error of the Kalman filter is maximized at each time step by exploiting dual norms. A numerical example is given to illustrate the results.
  •  
6.
  • Umsonst, David, et al. (författare)
  • On the confidentiality of linear anomaly detector states
  • 2019
  • Ingår i: 2019 American Control Conference (ACC). - 9781538679265 - 9781538679272 - 9781538679289 - 9781538679012 ; , s. 397-403
  • Konferensbidrag (refereegranskat)abstract
    • A malicious attacker with access to the sensor channel in a feedback control system can severely affect the physical system under control, while simultaneously being hard to detect. A properly designed anomaly detector can restrict the impact of such attacks, however. Anomaly detectors with an internal state (stateful detectors) have gained popularity because they seem to be able to mitigate these attacks more than detectors without a state (stateless detectors). In the analysis of attacks against control systems with anomaly detectors, it has been assumed that the attacker has access to the detector's internal state, or designs its attack such that it is not detected regardless of the detector's state. In this paper, we show how an attacker can realize the first case by breaking the confidentiality of a stateful detector state evolving with linear dynamics, while remaining undetected and imitating the statistics of the detector under nominal conditions. The realization of the attack is posed in a convex optimization framework using the notion of Kullback-Leibler divergence. Further, the attack is designed such that the maximum mean estimation error of the Kalman filter is maximized at each time step by exploiting dual norms. A numerical example is given to illustrate the results.
  •  
7.
  • Wei, Jieqiang, et al. (författare)
  • Steady-state analysis of a human-social behavior model : A neural-cognition perspective
  • 2019
  • Ingår i: Proceedings of the American Control Conference. - : Institute of Electrical and Electronics Engineers (IEEE). - 9781538679265 ; , s. 199-204
  • Konferensbidrag (refereegranskat)abstract
    • We consider an extension of the Rescorla-Wagner model which bridges the gap between conditioning and learning on a neural-cognitive, individual psychological level, and the social population level. In this model, the interaction among individuals is captured by a Markov process. The resulting human-social behavior model is a recurrent iterated function system which behaves differently from the classical Rescorla-Wagner model due to randomness. A sufficient condition for the convergence of the forward process starting with arbitrary initial distribution is provided. Furthermore, the ergodicity properties of the internal states of agents in the proposed model are studied.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-7 av 7

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy