Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents
From MaRDI portal
Publication:5347764
DOI10.1109/TAC.2010.2088690zbMath1368.93140MaRDI QIDQ5347764
Shreyas Sundaram, Christoforos N. Hadjicostis
Publication date: 25 August 2017
Published in: IEEE Transactions on Automatic Control (Search for Journal in Brave)
Sensitivity (robustness) (93B35) Linear systems in control theory (93C05) Fault detection; testing in circuits and networks (94C12)
Related Items
An overview of structural systems theory ⋮ Topology selection for multi-agent systems with opposite leaders ⋮ Robust high-gain observers based liquid levels and leakage flow rate estimation ⋮ On the robust synthesis of logical consensus algorithms for distributed intrusion detection ⋮ A Framework for the Analysis of Supervised Discrete Event Systems Under Attack ⋮ Game-theory-based consensus learning of double-integrator agents in the presence of worst-case adversaries ⋮ Resilient stabilization of multi-hop control networks subject to malicious attacks ⋮ Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach ⋮ Multi-armed bandit based distributed resilient consensus and its applications in social networks ⋮ Observer-based fault detection for high-order nonlinear multi-agent systems ⋮ Random grouping based resilient beamforming ⋮ Delayed unknown input observers for discrete-time linear systems with guaranteed performance ⋮ Byzantine-resilient distributed state estimation: a min-switching approach ⋮ Secure consensus with distributed detection via two-hop communication ⋮ Security index based on perfectly undetectable attacks: graph-theoretic conditions ⋮ Resilient consensus of second-order agent networks: asynchronous update rules with delays ⋮ A switching-based moving target defense against sensor attacks in control systems ⋮ Secure gossip against intermittently malicious agents ⋮ Differentially private resilient distributed cooperative online estimation over digraphs ⋮ State and input observability of multi-agent systems: a necessary and sufficient condition ⋮ Secure multi-dimensional consensus algorithm against malicious attacks ⋮ Graph-theoretic approaches for analyzing the resilience of distributed control systems: a tutorial and survey ⋮ Secure consensus control for multi‐agent systems against attacks on actuators and sensors ⋮ Optimal resilient sensor placement problem for secure state estimation ⋮ A unified filter for simultaneous input and state estimation of linear discrete-time stochastic systems ⋮ Distributed secure state estimation for linear systems against malicious agents through sorting and filtering ⋮ An internal model approach to estimation of systems with arbitrary unknown inputs ⋮ Byzantine-resilient distributed observers for LTI systems ⋮ Optimal denial-of-service attack energy management against state estimation over an SINR-based network ⋮ Adaptive consensus for heterogeneous multi-agent systems under sensor and actuator attacks ⋮ Sparse stable systems ⋮ Security concepts for the dynamics of autonomous vehicle networks ⋮ Consensus of second-order multi-agent systems in the presence of locally bounded faults ⋮ Switched projected gradient descent algorithms for secure state estimation under sparse sensor attacks ⋮ Estimating unbounded unknown inputs in nonlinear systems ⋮ Stochastic and deterministic fault detection for randomized gossip algorithms ⋮ Consensus of discrete-time multi-agent systems with adversaries and time delays ⋮ A control-theoretic approach to disseminating values and overcoming malicious links in wireless networks ⋮ Distributed formation control of networked Euler-Lagrange systems with fault diagnosis ⋮ Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data ⋮ Relative tempo of distributed averaging on networks ⋮ Resilient consensus for multi-agent systems subject to differential privacy requirements ⋮ Distributed decision-making algorithms with multiple manipulative actors ⋮ Distributed secure state estimation for cyber-physical systems under sensor attacks ⋮ Distributed fault detection and isolation for leader-follower multi-agent systems with disturbances using observer techniques ⋮ Fuzzy adaptive fault-tolerant control of multi-agent systems with interactions between physical coupling graph and communication graph ⋮ Resilient consensus of multi-agent systems against malicious data injections ⋮ Resilient synchronization of distributed multi-agent systems under attacks ⋮ Malicious adversaries against secure state estimation: Sparse sensor attack design ⋮ On the computational complexity of the secure state-reconstruction problem ⋮ A hybrid fault detection and isolation strategy for a team of cooperating unmanned vehicles ⋮ Time-varying formation control for nonlinear multi-agent systems against actuator attacks ⋮ Control of multiagent networks with misbehaving nodes