constraint-based synthesis
biblio
Submitted by grigby1 on Fri, 10/27/2017 - 9:55am
biblio
Submitted by grigby1 on Wed, 05/17/2017 - 12:28pm
file
We present a controller synthesis algorithm for a discrete time reach-avoid problem in the presence of adversaries. Our model of the adversary captures typical malicious attacks envisioned on cyber-physical systems such as sensor spoong, controller corruption, and actuator intrusion. After formulating the problem in a general setting, we present a sound and complete algorithm for the case with linear dynamics and an adversary with a budget on the total L2-norm of its actions.
biblio
Submitted by amyclay on Tue, 11/17/2015 - 2:28pm