This note addresses the problem of evaluating the impact of an attack on...
Encrypted control has been introduced to protect controller data by
encr...
We study stochastic policy gradient methods from the perspective of
cont...
This paper introduces a "green" routing game between multiple logistic
o...
We address the attack impact evaluation problem for control system secur...
Given a single trajectory of a dynamical system, we analyze the performa...
This paper addresses the question whether model knowledge can guide a
de...
This paper presents local minimax regret lower bounds for adaptively
con...
The privacy aspect of state estimation algorithms has been drawing high
...
This study investigates general model-based incident handler's asymptoti...
This study provides a model of cyber deception with asymmetric recogniti...
This paper presents local asymptotic minimax regret lower bounds for ada...
Set-based estimation has gained a lot of attention due to its ability to...
In this paper, we introduce the concept of two-way coding, which origina...
We consider an attacker-operator game for monitoring a large-scale netwo...
The problem of preserving the privacy of individual entries of a databas...