Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Venkatraman Renganathan"'
Publikováno v:
IEEE Transactions on Control Systems Technology. 30:803-810
Publikováno v:
IEEE Control Systems Letters. 6:211-216
The identification of anomalies is a critical component of operating complex, and possibly large-scale and geo-graphically distributed cyber-physical systems. While designing anomaly detectors, it is common to assume Gaussian noise models to maintain
Autor:
Venkatraman Renganathan, Sleiman Safaoui, Aadi Kothari, Benjamin Gravell, Iman Shames, Tyler Summers
Robust autonomy stacks require tight integration of perception, motion planning, and control layers, but these layers often inadequately incorporate inherent perception and prediction uncertainties, either ignoring them altogether or making questiona
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::11316edb7bf3d87bef0131b179b0ffb4
http://arxiv.org/abs/2201.01483
http://arxiv.org/abs/2201.01483
State estimators are crucial components of anomaly detectors that are used to monitor cyber-physical systems. Many frequently-used state estimators are susceptible to model risk as they rely critically on the availability of an accurate state-space m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::760f821c1d52724ca883e2604268cd51
Publikováno v:
ACC
Designing resilient control strategies for mitigating stealthy attacks is a crucial task in emerging cyber-physical systems. In the design of anomaly detectors, it is common to assume Gaussian noise models to maintain tractability; however, this assu
Publikováno v:
ACC
The performance of hierarchical Model Predictive Control (MPC) is highly dependent on the mechanisms used to coordinate the decisions made by controllers at different levels of the hierarchy. Conventionally, reference tracking serves as the primary c
Safely deploying robots in uncertain and dynamic environments requires a systematic accounting of various risks, both within and across layers in an autonomy stack from perception to motion planning and control. Many widely used motion planning algor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8670edff442157eb5bfd8e6c33fe2f3b
Publikováno v:
MRS
As cyber-physical networks become increasingly equipped with embedded sensing, communication, computation, and actuation capabilities, they are made vulnerable to malicious attacks by increasing the number of access points which are available for att