Source Themes

Data-driven Vulnerability Analysis of Networked Pipeline System

This paper introduces an attack generation framework for evaluating the vulnerability of nonlinear networked pipeline systems. The vulnerability analysis is formulated as determining the presence of feasible attack sets, defined by boundary functions …

Model-based Loss Minimization Control of a Squirrel Cage Induction Motor Drive with shorted Rotor under Indirect Field Orientation

This paper presents the development of an energy saving scheme via indirect field oriented control (IFOC) at the optimum operating region. A model based steady state power loss analysis is carried out to determine the optimal speed and the optimal …

Robust Resilient Signal Reconstruction under Adversarial Attacks

We consider the problem of signal reconstruction for a system under sparse signal corruption by a malicious agent. The reconstruction problem follows the standard error coding problem that has been studied extensively in the literature. We include a …

Moving-horizon false data injection attack design against cyber-physical systems

Systematic attack design is essential to understanding the vulnerabilities of cyber–physical systems (CPSs), to better design for resiliency. In particular, false data injection attacks (FDIAs) are well-known and have been shown to be capable of …

Hierarchical Robust Control for Variable-pitch Wind Turbine with Actuator Faults

In this brief, we develop a fault tolerant control (FTC) using a hierarchical-robust methodology with guaranteed stability for a wind turbine (WT), which is subject to an exogenous input, and an actuator fault. The high-level control is designed to …

Hierarchical robust adaptive control for wind turbines with actuator fault

This paper solves the problem of regulating the rotor speed tracking error for wind turbines in the full-load region by an effective robust-adaptive control strategy. The developed controller compensates for the uncertainty in the control input …

Large-Scale Resilient Collaborative Machine Learning

The past few decades have seen a tremendous increase in the volume and complexity of data generated in scientific discovery processes. Moreover, due to the rapid growth in internet and networking technology, it is now common for these experiments to …

Resilient Observer Design for Cyber-Physical Systems with Data-Driven Measurement Pruning

Resilient observer design for Cyber-Physical Systems (CPS) in the presence of adversarial false data injection attacks (FDIA) is an active area of research. Existing state-of-the-art algorithms tend to break down as more and more knowledge of the …

Algorithm Design for Resilient Cyber-Physical Systems using an Automated Attack Generative Model

In this paper, we present an algorithm design for resilient cyber-physical system, the resiliency is significantly improved by including the proposed automated attack generation in the training of attack detection algorithm. Unlike traditional GANbased FDI attack generation, the automated attack generator does not require the prepared attack samples. This work is supported by U.S. Department of Energy’s Office of Cybersecurity, Energy Security, AND Emergency Response (CESER) under the award number DE-CR0000005.

Model and Load Predictive Control for Design and Energy Management of Shipboard Power Systems

In current Medium Voltage DC (MVDC) Shipboard Power Systems (SPSs), multiple sources exist to supply power to a common dc bus. Conventionally, the power management of such systems is performed by controlling Power Generation Modules (PGMs) which …