{"id":"https://openalex.org/W4386647019","doi":"https://doi.org/10.48550/arxiv.2309.05075","title":"Secure Set-Based State Estimation for Linear Systems under Adversarial Attacks on Sensors","display_name":"Secure Set-Based State Estimation for Linear Systems under Adversarial Attacks on Sensors","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4386647019","doi":"https://doi.org/10.48550/arxiv.2309.05075"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2309.05075","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false},"type":"preprint","type_crossref":"posted-content","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/abs/2309.05075","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005138358","display_name":"Muhammad Umar B. Niazi","orcid":"https://orcid.org/0000-0001-7932-3109"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Niazi, Muhammad Umar B.","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083231405","display_name":"M. S. Chong","orcid":"https://orcid.org/0000-0002-7324-1660"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chong, Michelle S.","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102709386","display_name":"Amr Alanwar","orcid":"https://orcid.org/0000-0003-2941-519X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alanwar, Amr","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5045975901","display_name":"Karl Henrik Johansson","orcid":"https://orcid.org/0000-0001-9940-5929"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Johansson, Karl H.","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":65},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9726,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9726,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.74099207},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.72510684},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.65378255},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.64494216},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6390405},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.62253773},{"id":"https://openalex.org/C185429906","wikidata":"https://www.wikidata.org/wiki/Q1130160","display_name":"Estimator","level":2,"score":0.49787045},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42460304},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.41403788},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.30057234},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28607535},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.25150692},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16365835},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.08155471},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2309.05075","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/2309.05075","pdf_url":"http://arxiv.org/pdf/2309.05075","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":false,"landing_page_url":"https://api.datacite.org/dois/10.48550/arxiv.2309.05075","pdf_url":null,"source":{"id":"https://openalex.org/S4393179698","display_name":"DataCite API","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I4210145204","host_organization_name":"DataCite","host_organization_lineage":["https://openalex.org/I4210145204"],"host_organization_lineage_names":["DataCite"],"type":"metadata"},"license":null,"license_id":null,"version":null}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2309.05075","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.7,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4320855730","https://openalex.org/W4320018150","https://openalex.org/W4246396837","https://openalex.org/W4239582170","https://openalex.org/W2918664383","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W2135200719","https://openalex.org/W2040808657","https://openalex.org/W106056076"],"abstract_inverted_index":{"When":[0],"a":[1,9,14,112,144,210,248],"strategic":[2],"adversary":[3,44,84],"can":[4,23,45],"attack":[5,188,212],"multiple":[6],"sensors":[7,18,204],"of":[8,17,51,55,68,97,101,146,162,171,186,202,250,256],"system":[10,152],"and":[11,156,183,193,261],"freely":[12],"choose":[13],"different":[15,20,254],"set":[16,180,201],"at":[19,123,205],"times,":[21],"how":[22],"we":[24,175,208,216],"ensure":[25],"that":[26,42,73,115,129,150,177,218,252],"the":[27,33,43,52,98,106,130,137,151,169,178,187,191,200,229,239],"state":[28,65,132],"estimate":[29],"remains":[30],"uncorrupted":[31],"by":[32,110,143,246],"attacker?":[34],"The":[35],"existing":[36],"literature":[37],"addressing":[38],"this":[39,244],"problem":[40],"mandates":[41],"only":[46],"corrupt":[47],"less":[48,94],"than":[49,95],"half":[50,96],"total":[53,99],"number":[54,100,170],"sensors.":[56,79,102,173],"This":[57,103],"limitation":[58,109],"is":[59,133,141,153,181],"fundamental":[60,108],"to":[61,92,168],"all":[62,119],"point-based":[63],"secure":[64,182],"estimators":[66],"because":[67],"their":[69],"dependence":[70],"on":[71,75,118],"algorithms":[72],"rely":[74],"majority":[76],"voting":[77],"among":[78],"However,":[80,215],"in":[81,136,228,235,238],"reality,":[82],"an":[83],"with":[85,165],"ample":[86],"resources":[87],"may":[88,223],"not":[89,224],"be":[90,225],"limited":[91],"attacking":[93],"paper":[104],"avoids":[105],"above-mentioned":[107],"proposing":[111],"set-based":[113],"approach":[114],"allows":[116],"attacks":[117,222],"but":[120],"one":[121],"sensor":[122,163],"any":[124],"given":[125],"time.":[126],"We":[127,242],"guarantee":[128],"true":[131],"always":[134],"contained":[135],"estimated":[138,179],"set,":[139],"which":[140],"represented":[142],"collection":[145],"constrained":[147],"zonotopes,":[148],"provided":[149],"bounded-input-bounded-state":[154],"stable":[155,184],"redundantly":[157],"observable":[158],"via":[159],"every":[160],"combination":[161],"subsets":[164],"size":[166],"equal":[167],"uncompromised":[172],"Additionally,":[174],"show":[176],"irrespective":[185],"signals":[189],"if":[190],"process":[192],"measurement":[194],"noises":[195],"are":[196],"bounded.":[197],"To":[198],"detect":[199],"attacked":[203],"each":[206],"time,":[207],"propose":[209],"simple":[211],"detection":[213],"technique.":[214],"acknowledge":[217],"intelligently":[219],"designed":[220],"stealthy":[221],"detected":[226],"and,":[227],"worst-case":[230],"scenario,":[231],"could":[232],"even":[233],"result":[234],"exponential":[236],"growth":[237],"algorithm's":[240],"complexity.":[241,262],"alleviate":[243],"shortcoming":[245],"presenting":[247],"range":[249],"strategies":[251],"offer":[253],"levels":[255],"trade-offs":[257],"between":[258],"estimation":[259],"performance":[260]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4386647019","counts_by_year":[],"updated_date":"2025-04-14T06:38:15.457319","created_date":"2023-09-13"}