Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Convex functions
biblio
The Analysis and Application of Decentralized Cyber Layer and Distributed Security Control for Interconnected Conurbation Grids under Catastrophic Cascading Failures
Submitted by grigby1 on Wed, 03/02/2022 - 12:55pm
Geology
security
Resiliency
real-time systems
pubcrawl
power system reliability
Power system protection
Networked Control Systems Security
Metrics
interconnected conurbation grids
Control Theory
distributed security control
Decentralized Control
CPPS
Convex functions
composability
Cascading Failures
ADMM
resilience
biblio
Detection of False Data Injection Attack in Smart Grid Using Decomposed Nearest Neighbor Techniques
Submitted by grigby1 on Mon, 08/02/2021 - 2:42pm
Classification algorithms
Convex functions
Decomposed Nearest Neighbor algorithm
FDI attacks
machine learning
machine learning algorithms
Measurement
Metrics
metrics testing
Phasor measurement units
pubcrawl
Smart Grid
Smart Grids
Voltage measurement
biblio
Recycled ADMM: Improve Privacy and Accuracy with Less Computation in Distributed Algorithms
Submitted by aekwall on Mon, 09/28/2020 - 10:55am
iterative process
Scalability
Resiliency
recycled ADMM
R-ADMM
pubcrawl
privacy-utility tradeoff
privacy analysis
privacy
Perturbation methods
optimization
local data
linear approximation
alternating direction method of multiplier
Iterative methods
Human behavior
distributed algorithms
differential privacy
decentralized convex optimization problems
data privacy
convex programming
Convex functions
convergence
Computing Theory and Privacy
approximation theory
biblio
On the Design of Black-Box Adversarial Examples by Leveraging Gradient-Free Optimization and Operator Splitting Method
Submitted by grigby1 on Fri, 09/04/2020 - 3:10pm
distortion metrics
advanced AI platforms
alternating direction method of multipliers
Bayesian optimization
black-box adversarial attack generation methods
black-box adversarial examples
black-box attacks
BO-ADMM
competitive attack success rates
Convex functions
ADMM solution framework
gradient-free optimization
gradient-free regime
operator splitting method
query complexities
Robust machine learning
zeroth-order optimization
ZO-ADMM
Black Box Security
Complexity theory
optimisation
pubcrawl
composability
Metrics
Resiliency
resilience
learning (artificial intelligence)
optimization
security of data
distortion
Perturbation methods
image classification
Bayes methods
image retrieval
black-box adversarial attacks
Measurement
estimation
biblio
ADMM-based Beamforming Optimization for Physical Layer Security in a Full-duplex Relay System
Submitted by aekwall on Mon, 02/17/2020 - 1:23pm
optimization problems
semidefinite relaxation approach
SDR approach
relay beamformer
mathematical programming
Lagrangian functions
full-duplex relay system
full-duplex communication systems
Convex functions
Channel estimation
augmented Lagrangian
alternating direction of multiplier method
ADMM-based beamforming optimization
telecommunication security
full-duplex
relay networks (telecommunication)
Relays
signal processing security
physical layer security
array signal processing
privacy
optimization
Metrics
composability
pubcrawl
Resiliency
biblio
Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model
Submitted by grigby1 on Mon, 03/19/2018 - 12:59pm
Metrics
state estimation
Scalability
Resiliency
resilience
pubcrawl
power transmission control
power system state estimation
power grids
power grid state estimation
Phase measurement
phase angle measurements
optimization
Numerical models
AC power flow model
Mathematical model
load flow control
line failures detection problem
IEEE 300-bus systems
IEEE 118-bus systems
Human behavior
failure analysis
Cyber-physical attack
convex programming
convex optimization problem
Convex functions
Adversary Models
biblio
Periodic and event-triggered communication for distributed continuous-time convex optimization
Submitted by BrandonB on Thu, 04/30/2015 - 11:56am
event-triggered communication
Zeno behavior
Topology
synchronous periodic communication scheme
strongly connected weight-balanced directed graph
privacy preservation properties
privacy
periodic communication
Optimization algorithms
network theory (graphs)
network optimization problem
global cost function
Algorithm design and analysis
distributed continuous-time convex optimization
distributed continuous-time algorithm
directed graphs
cost functions
Cost function
convex programming
Convex functions
convex function
convergence
Control of networks
connected undirected graph
biblio
Periodic and event-triggered communication for distributed continuous-time convex optimization
Submitted by BrandonB on Thu, 04/30/2015 - 11:55am
event-triggered communication
Zeno behavior
Topology
synchronous periodic communication scheme
strongly connected weight-balanced directed graph
privacy preservation properties
privacy
periodic communication
Optimization algorithms
network theory (graphs)
network optimization problem
global cost function
Algorithm design and analysis
distributed continuous-time convex optimization
distributed continuous-time algorithm
directed graphs
cost functions
Cost function
convex programming
Convex functions
convex function
convergence
Control of networks
connected undirected graph