Skip to content

Commit 1c56a00

Browse files
Update uscl_publications.bib
1 parent 5a2ead3 commit 1c56a00

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

_bibliography/uscl_publications.bib

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ @inproceedings{Dong_ACC2026
142142
title = {Fundamental limitations of sensitivity metrics for anomaly impact analysis in LTI systems},
143143
booktitle = {American Control Conference (Accepted)},
144144
abstract={This study establishes a connection between the output-to-output gain (OOG), a sensitivity metric quantifying the impact of stealthy attacks, and a novel input-to-input gain (IIG) introduced to evaluate fault sensitivity under disturbances, and investigates their fundamental performance limitations arising from the transmission zeros of the underlying dynamical system. Inspired by the OOG, which characterizes the maximum performance loss caused by stealthy attacks, the IIG is proposed as a new measure of robust fault sensitivity, and is defined as the maximum energy of undetectable faults for a given disturbance intensity. Then, using right (for OOG) and left (for IIG) co-prime factorizations, both metrics are expressed as the H-inf norm of a ratio of the numerator factors. This unified representation facilitates a systematic analysis of their fundamental limitations. Subsequently, by utilizing the Poisson integral relation, theoretical bounds for the IIG and OOG are derived, explicitly characterizing their fundamental limitations imposed by system \mbox{non-minimum} phase (NMP) zeros. Finally, a numerical example is employed to validate the results.},
145-
published={0},
145+
published={1},
146146
year={2026},
147147
arxiv={2509.11194},
148148
tag={10005}
@@ -153,7 +153,7 @@ @article{Nguyen_TAC2026
153153
journal = {IEEE Trans. Automatic Control (Accepted)},
154154
title = {Scalable and Optimal Security Allocation in Networks against Stealthy Injection Attacks},
155155
abstract={This paper addresses the security allocation problem in a networked control system under stealthy injection attacks. The networked system is comprised of interconnected subsystems which are represented by nodes in a digraph. An adversary compromises the system by injecting false data into several nodes with the aim of maximally disrupting the performance of the network while remaining stealthy to a defender. To minimize the impact of such stealthy attacks, the defender, with limited knowledge about attack policies and attack resources, allocates several sensors on nodes to impose the stealthiness constraint governing the attack policy. We provide an optimal security allocation algorithm to minimize the expected attack impact on the entire network. Furthermore, under a suitable local control design, the proposed security allocation algorithm can be executed in a scalable way. Finally, the obtained results are validated through several numerical examples.},
156-
published={0},
156+
published={1},
157157
year={2026},
158158
doi={10.1109/TAC.2025.3639126},
159159
arxiv={2411.15319},

0 commit comments

Comments
 (0)