{"id":"https://openalex.org/W2743096689","doi":"https://doi.org/10.1109/icca.2017.8003106","title":"Resilient distributed optimization algorithm against adversary attacks","display_name":"Resilient distributed optimization algorithm against adversary attacks","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2743096689","doi":"https://doi.org/10.1109/icca.2017.8003106","mag":"2743096689"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icca.2017.8003106","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076460898","display_name":"Chengcheng Zhao","orcid":"https://orcid.org/0000-0002-6816-6459"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]},{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengcheng Zhao","raw_affiliation_strings":["The State Key Lab. of Industrial Control Technology, Zhejiang University, China"],"affiliations":[{"raw_affiliation_string":"The State Key Lab. of Industrial Control Technology, Zhejiang University, China","institution_ids":["https://openalex.org/I4391767838","https://openalex.org/I55712492"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004668792","display_name":"Jianping He","orcid":"https://orcid.org/0000-0002-6253-7802"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianping He","raw_affiliation_strings":["Department of Automation, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023304066","display_name":"Wang Qing-guo","orcid":null},"institutions":[{"id":"https://openalex.org/I24027795","display_name":"University of Johannesburg","ror":"https://ror.org/04z6c2n17","country_code":"ZA","type":"education","lineage":["https://openalex.org/I24027795"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Qing-Guo Wang","raw_affiliation_strings":["Distinguished Professor, University of Johannesburg, Johannesburg, South Africa"],"affiliations":[{"raw_affiliation_string":"Distinguished Professor, University of Johannesburg, Johannesburg, South Africa","institution_ids":["https://openalex.org/I24027795"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.124,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":9,"citation_normalized_percentile":{"value":0.639425,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":84,"max":85},"biblio":{"volume":null,"issue":null,"first_page":"473","last_page":"478"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9976,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9952,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/local-optimum","display_name":"Local optimum","score":0.49392396}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7112507},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7045394},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5948632},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5366027},{"id":"https://openalex.org/C130120984","wikidata":"https://www.wikidata.org/wiki/Q2835898","display_name":"Distributed algorithm","level":2,"score":0.5208593},{"id":"https://openalex.org/C141934464","wikidata":"https://www.wikidata.org/wiki/Q3305386","display_name":"Local optimum","level":2,"score":0.49392396},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.4763998},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.46107697},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.43914923},{"id":"https://openalex.org/C182365436","wikidata":"https://www.wikidata.org/wiki/Q50701","display_name":"Variable (mathematics)","level":2,"score":0.43327135},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2378749},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1993669},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08243561},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icca.2017.8003106","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.68,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":21,"referenced_works":["https://openalex.org/W1970063032","https://openalex.org/W1973184571","https://openalex.org/W2003530067","https://openalex.org/W2029404717","https://openalex.org/W2044212084","https://openalex.org/W2100953052","https://openalex.org/W2112668583","https://openalex.org/W2122078451","https://openalex.org/W2126924915","https://openalex.org/W2137435346","https://openalex.org/W2148087609","https://openalex.org/W2229219728","https://openalex.org/W2322494928","https://openalex.org/W2547323087","https://openalex.org/W2555951933","https://openalex.org/W2568900560","https://openalex.org/W2809963048","https://openalex.org/W2962775700","https://openalex.org/W3101665129","https://openalex.org/W4302460564","https://openalex.org/W4394661609"],"related_works":["https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W3207760230","https://openalex.org/W2573831620","https://openalex.org/W2536018345","https://openalex.org/W2358353312","https://openalex.org/W2296488620","https://openalex.org/W17155033","https://openalex.org/W1590307681","https://openalex.org/W1496222301"],"abstract_inverted_index":{"In":[0],"the":[1,9,22,39,49,68,90,94,98,103,110,119,124,137,147,151,157,160],"distributed":[2,26],"optimization,":[3],"multiple":[4],"agents":[5,86,96,115,142],"aim":[6],"to":[7,17,118],"minimize":[8],"average":[10,126],"of":[11,42,83,102,113,123,127,139,159],"all":[12,84,128],"local":[13,81,131],"cost":[14],"functions":[15],"corresponding":[16],"one":[18],"decision":[19],"variable.":[20],"Recently,":[21],"resilient":[23,62],"algorithms":[24],"for":[25],"optimization":[27,64],"against":[28],"attacks":[29,44],"have":[30],"received":[31],"some":[32],"attention,":[33],"where":[34],"it":[35],"is":[36,45,143],"assumed":[37],"that":[38,80,109,136],"maximum":[40],"number":[41],"tolerable":[43,140],"strictly":[46],"limited":[47,145],"by":[48,66,75,146],"network":[50,148],"connectivity.":[51],"To":[52],"relax":[53],"this":[54,57],"assumption,":[55],"in":[56],"paper,":[58],"we":[59,107],"propose":[60],"a":[61],"distribution":[63],"algorithm":[65,92],"exploiting":[67],"trusted":[69,95],"agents,":[70],"which":[71],"cannot":[72],"be":[73],"compromised":[74],"adversary":[76,141],"attacks.":[77],"We":[78,133],"prove":[79],"variables":[82],"normal":[85,114,129],"can":[87],"converge":[88,117],"under":[89,150],"proposed":[91,152,161],"if":[93],"induce":[97],"connected":[99],"dominating":[100],"set":[101,122],"original":[104],"network.":[105],"Furthermore,":[106],"exploit":[108],"final":[111],"solution":[112],"will":[116],"convex":[120],"optima":[121],"weighted":[125],"agents'":[130],"functions.":[132],"also":[134],"show":[135],"amount":[138],"not":[144],"connectivity":[149],"algorithm.":[153,162],"Numerical":[154],"results":[155],"demonstrate":[156],"effectiveness":[158]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2743096689","counts_by_year":[{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2024-12-15T10:23:02.360002","created_date":"2017-08-17"}