This paper introduces an attack generation framework for evaluating the vulnerability of nonlinear networked pipeline systems. The vulnerability analysis is formulated as determining the presence of feasible attack sets, defined by boundary functions …
This paper presents the development of an energy saving scheme via indirect field oriented control (IFOC) at the optimum operating region. A model based steady state power loss analysis is carried out to determine the optimal speed and the optimal …
In this paper, we present an algorithm design for resilient cyber-physical system, the resiliency is significantly improved by including the proposed automated attack generation in the training of attack detection algorithm. Unlike traditional GANbased FDI attack generation, the automated attack generator does not require the prepared attack samples. This work is supported by U.S. Department of Energy’s Office of Cybersecurity, Energy Security, AND Emergency Response (CESER) under the award number DE-CR0000005.
This paper considers the problem of optimal estimation for linear system with the measurement vector subject to arbitrary corruption by an adversarial agent. This problem is relevant to cyber-physical systems where, due to the tight coupling of …
Automatic generation of georeferenced trajectories for vehicular traffic is critical for situational awareness and monitoring for both manned and unmanned platforms, irrespective of their level of autonomy. The goal is to estimate the world …
The synthesis problem for the compositional performance certification of interconnected systems is considered. A fairly unified description of control synthesis problem is given using integral quadratic constraints (IQC) and dissipativity. Starting …
This paper presents a control architecture in which a direct adaptive control technique is used within the model predictive control framework, using the concurrent learning based approach, to compensate for model uncertainties. At each time step, the …