SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Abdalmoaty Mohamed 1986 ) srt2:(2023)"

Search: WFRF:(Abdalmoaty Mohamed 1986 ) > (2023)

  • Result 1-2 of 2
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Abdalmoaty, Mohamed, 1986-, et al. (author)
  • Continuous Time-Delay Estimation From Sampled Measurements
  • 2023
  • In: IFAC-PapersOnLine. - : Elsevier. - 2405-8963. ; 56:2, s. 6982-6987
  • Journal article (peer-reviewed)abstract
    • An algorithm for continuous time-delay estimation from sampled output data and a known input of finite energy is presented. The continuous time-delay modeling allows for the estimation of subsample delays. The proposed estimation algorithm consists of two steps. First, the continuous Laguerre spectrum of the output (delayed) signal is estimated from discretetime (sampled) noisy measurements. Second, an estimate of the delay value is obtained via a Laguerre domain model using a continuous-time description of the input. The second step of the algorithm is shown to be intrinsically biased, the bias sources are established, and the bias itself is modeled. The proposed delay estimation approach is compared in a Monte-Carlo simulation with state-of-the-art methods implemented in time, frequency, and Laguerre domain demonstrating comparable or higher accuracy in the considered scenario.
  •  
2.
  • Abdalmoaty, Mohamed, 1986-, et al. (author)
  • Privacy and Security in Network Controlled Systems via Dynamic Masking
  • 2023
  • In: IFAC-PapersOnLine. - : Elsevier. - 2405-8963. ; 56:2, s. 991-996
  • Journal article (peer-reviewed)abstract
    • In this paper, we propose a new architecture to enhance the privacy and security of networked control systems against malicious adversaries. We consider an adversary which first learns the system using system identification techniques (privacy), and then performs a data injection attack (security). In particular, we consider an adversary conducting zero-dynamics attacks (ZDA) which maximizes the performance cost of the system whilst staying undetected. Using the proposed architecture, we show that it is possible to (i) introduce significant bias in the system estimates obtained by the adversary: thus providing privacy, and (ii) efficiently detect attacks when the adversary performs a ZDA using the identified system: thus providing security. Through numerical simulations, we illustrate the efficacy of the proposed architecture
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-2 of 2
Type of publication
journal article (2)
Type of content
peer-reviewed (2)
Author/Editor
Abdalmoaty, Mohamed, ... (2)
Medvedev, Alexander, ... (1)
Coimbatore Anand, Sr ... (1)
Teixeira, André, Ass ... (1)
University
Uppsala University (2)
Language
English (2)
Research subject (UKÄ/SCB)
Engineering and Technology (2)
Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view