Secure Estimation Under Causative Attacks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure State Estimation of Cyber-Physical Systems under Switching Attacks

This paper deals with secure state estimation against switching mode and signal attacks on cyber-physical systems, possibly affected by adversarial extra fake measurement injection. A stochastic Bayesian approach is undertaken by exploiting Bernoulli and Poisson random sets for modeling the attack existence and, respectively, fake measurements, as well as multiple models for handling the variou...

متن کامل

Secure Computation Under Network and Physical Attacks

Secure computation enables many parties to jointly compute a function of their private inputs. The security requirement is that the input privacy of any honest party is preserved even if other parties participating in the protocol collude or deviate from the protocol. In concurrent and physical attacks, adversarial parties try to break the privacy of honest parties by exploiting the network con...

متن کامل

Secure Estimation for Unmanned Aerial Vehicles against Adversarial Cyber Attacks

In the coming years, usage of Unmanned Aerial Vehicles (UAVs) is expected to grow tremendously. Maintaining security of UAVs under cyber attacks is an important yet challenging task, as these attacks are often erratic and difficult to predict. Secure estimation problems study how to estimate the states of a dynamical system from a set of noisy and maliciously corrupted sensor measurements. The ...

متن کامل

Lattice-Based Identification Schemes Secure Under Active Attacks

There is an inherent difficulty in building 3-move ID schemes based on combinatorial problems without much algebraic structure. A consequence of this, is that most standard ID schemes today are based on the hardness of number theory problems. Not having schemes based on alternate assumptions is a cause for concern since improved number theoretic algorithms or the realization of quantum computin...

متن کامل

Secure Estimation for Unmanned Aerial Vehicles against Adversarial Attacks

On February 15, 2015, the Federal Aviation Administration proposed to allow routine use of certain small, non-recreational Unmanned Aerial Vehicles (UAVs) in today’s aviation system [1]. Thus in the near future, we may see UAVs such as Amazon Prime Air [2] and Google Project Wing vehicles [3] sharing the airspace. In order to manage this UAV traffic, we may imagine a scenario in which each UAV ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Theory

سال: 2020

ISSN: 0018-9448,1557-9654

DOI: 10.1109/tit.2020.2985956