Zobrazeno 1 - 10
of 161
pro vyhledávání: '"Akyol, Emrah"'
Autor:
Anand, Anju, Akyol, Emrah
We consider the problem of estimation from survey data gathered from strategic and boundedly-rational agents with heterogeneous objectives and available information. Particularly, we consider a setting where there are three different types of survey
Externí odkaz:
http://arxiv.org/abs/2409.13845
This paper analyzes stealthy attacks, particularly the zero-dynamics attack (ZDA) in networked control systems. ZDA hides the attack signal in the null-space of the state-space representation of the control system and hence it cannot be detected via
Externí odkaz:
http://arxiv.org/abs/1909.06938
This paper considers the defense strategy of strategic topology switching for the second-order multi-agent system under zero-dynamics attack (ZDA) whose attack-starting time is allowed to be not the initial time. We first study the detectability of Z
Externí odkaz:
http://arxiv.org/abs/1909.06936
This paper studies novel attack and defense strategies, based on a class of stealthy attacks, namely the zero-dynamics attack (ZDA), for multi-agent control systems. ZDA poses a formidable security challenge since its attack signal is hidden in the n
Externí odkaz:
http://arxiv.org/abs/1908.09466
Autor:
Mao, Yanbing, Akyol, Emrah
This paper studies topology inference, from agent states, of a directed cyber-social network with opinion spreading dynamics model that explicitly takes confirmation bias into account. The cyber-social network comprises a set of partially connected d
Externí odkaz:
http://arxiv.org/abs/1908.09472
This paper investigates the impact of confirmation bias on competitive information spread in the cyber-social network that comprises individuals in a social network and competitive information sources in cyber layer. We formulate the problem as a zer
Externí odkaz:
http://arxiv.org/abs/1908.09812
This paper considers a sequential sensor scheduling and remote estimation problem with multiple communication channels. Departing from the classical remote estimation paradigm, which involves one communication channel (noiseless or noisy), we conside
Externí odkaz:
http://arxiv.org/abs/1804.02609
This paper provides a model to investigate information spreading over cyber-social network of agents communicating with each other. The cyber-social network considered here comprises individuals and news agencies. Each individual holds a belief repre
Externí odkaz:
http://arxiv.org/abs/1803.06377
In this two-part paper, we consider strategic topology switching for the second-order multi-agent systems under a special class of stealthy attacks, namely the "zero-dynamics" attack (ZDA). The main mathematical tool proposed here is to strategically
Externí odkaz:
http://arxiv.org/abs/1711.11183
This two-part paper considers strategic topology switching for security in the second-order multi-agent system. In Part II, we propose a strategy on switching topologies to detect zero-dynamics attack (ZDA), whose attack-starting time is allowed to b
Externí odkaz:
http://arxiv.org/abs/1711.11181