UP - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3 4 5
hits: 1,359
1.
  • Networked Control Under Ran... Networked Control Under Random and Malicious Packet Losses
    Cetinkaya, Ahmet; Ishii, Hideaki; Hayakawa, Tomohisa IEEE transactions on automatic control, 05/2017, Volume: 62, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    We study cyber security issues in networked control of a linear dynamical system. Specifically, the dynamical system and the controller are assumed to be connected through a communication channel ...
Full text

PDF
2.
  • Privacy-Preserving Distribu... Privacy-Preserving Distributed Machine Learning via Local Randomization and ADMM Perturbation
    Wang, Xin; Ishii, Hideaki; Du, Linkang ... IEEE transactions on signal processing, 2020, Volume: 68
    Journal Article
    Peer reviewed
    Open access

    With the proliferation of training data, distributed machine learning (DML) is becoming more competent for large-scale learning tasks. However, privacy concerns have to be given priority in DML, ...
Full text

PDF
3.
  • Event‐triggered control for... Event‐triggered control for discrete‐time multi‐agent average consensus
    Mishra, Rajiv Kumar; Ishii, Hideaki International journal of robust and nonlinear control, 10 January 2023, Volume: 33, Issue: 1
    Journal Article
    Peer reviewed

    We consider the average consensus problem for the multi‐agent system in the discrete‐time domain. Three triggering based control protocols are developed, which dictate the broadcast and control ...
Full text
4.
  • An Overview on Denial-of-Se... An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses
    Cetinkaya, Ahmet; Ishii, Hideaki; Hayakawa, Tomohisa Entropy (Basel, Switzerland), 02/2019, Volume: 21, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    In this paper, we provide an overview of recent research efforts on networked control systems under denial-of-service attacks. Our goal is to discuss the utility of different attack modeling and ...
Full text

PDF
5.
  • Networked Control Under DoS... Networked Control Under DoS Attacks: Tradeoffs Between Resilience and Data Rate
    Feng, Shuai; Cetinkaya, Ahmet; Ishii, Hideaki ... IEEE transactions on automatic control, 2021-Jan., 2021-1-00, 20210101, Volume: 66, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    In this article, we study communication-constrained networked control problems for linear time-invariant systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent ...
Full text

PDF
6.
  • Randomized Transmission Pro... Randomized Transmission Protocols for Protection against Jamming Attacks in Multi-Agent Consensus
    Cetinkaya, Ahmet; Kikuchi, Kaito; Hayakawa, Tomohisa ... Automatica (Oxford), July 2020, 2020-07-00, Volume: 117
    Journal Article
    Peer reviewed
    Open access

    Multi-agent consensus under jamming attacks is investigated. Specifically, inter-agent communications over a network are assumed to fail at certain times due to jamming of transmissions by a ...
Full text

PDF
7.
  • An event‐triggered approach... An event‐triggered approach to quantized resilient consensus
    Wang, Yuan; Ishii, Hideaki International journal of robust and nonlinear control, 25 July 2020, Volume: 30, Issue: 11
    Journal Article
    Peer reviewed

    Summary We consider an event‐triggered update scheme for the problem of multiagent consensus in the presence of faulty and malicious agents within the network. In particular, we focus on the case ...
Full text

PDF
8.
  • Event-Based Distributed Clo... Event-Based Distributed Clock Synchronization for Wireless Sensor Networks
    Kadowaki, Yuki; Ishii, Hideaki IEEE transactions on automatic control, 08/2015, Volume: 60, Issue: 8
    Journal Article
    Peer reviewed

    In wireless sensor networks, a high level of accuracy is required in time synchronization to maintain time consistency of sensed data and to reduce idle listening times. In this technical note, we ...
Full text
9.
  • Coordinated Cyber-Attacks o... Coordinated Cyber-Attacks on the Measurement Function in Hybrid State Estimation
    Chakhchoukh, Yacine; Ishii, Hideaki IEEE transactions on power systems, 09/2015, Volume: 30, Issue: 5
    Journal Article
    Peer reviewed

    The paper assesses the cyber-security of power systems static state estimation (SE) in the possible presence of phasor measurement units (PMUs). Attacks are considered in the Jacobian matrix or the ...
Full text
10.
  • Distributed Randomized Algo... Distributed Randomized Algorithms for the PageRank Computation
    Ishii, H; Tempo, R IEEE transactions on automatic control, 09/2010, Volume: 55, Issue: 9
    Journal Article
    Peer reviewed
    Open access

    In the search engine of Google, the PageRank algorithm plays a crucial role in ranking the search results. The algorithm quantifies the importance of each web page based on the link structure of the ...
Full text

PDF
1 2 3 4 5
hits: 1,359

Load filters