2014 European Control Conference (ECC) 2014
DOI: 10.1109/ecc.2014.6862519
|View full text |Cite
|
Sign up to set email alerts
|

Adversary control strategies for discrete-time systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Using (4) and (9), it is inferred that H(z(k),t(k)) = z(k) Qz (k) +t(k) Ȓt (k) +z(k + 1) Pz (k + 1) − z(k) Pz (k). Based on (5) and (6), this can be detailed as…”
Section: A Optimal Control Solutionmentioning
confidence: 99%
See 1 more Smart Citation
“…Using (4) and (9), it is inferred that H(z(k),t(k)) = z(k) Qz (k) +t(k) Ȓt (k) +z(k + 1) Pz (k + 1) − z(k) Pz (k). Based on (5) and (6), this can be detailed as…”
Section: A Optimal Control Solutionmentioning
confidence: 99%
“…In the last decade, set-theoretic and optimization tools have been employed widely to design the control for MAS subject to anti-collision constraints, notable [3], [4], [5]. In these works, the constraints are described such that the sets characterizing each agent/obstacle do not overlap, therefore the nature of such constraints is non-convex.…”
Section: Introductionmentioning
confidence: 99%
“…Solving respectively (10), (11), (13) in real time provides the interpolation factor and implicitly the control u.…”
Section: A Feasible Fixed Pointxmentioning
confidence: 99%
“…The authors of [8] show that regulating a single system subject to obstacle avoidance constraints is equivalent to control it around an equilibrium point outside of its domain of attraction. This can be also obtained by using adversary control [11]. In the context of MAS, a feedback control w.r.t the obstacle avoidance constraints for one agent is proposed in [12].…”
Section: Introductionmentioning
confidence: 99%
“…The application of game theory to formulate security policies in cyber-physical control systems was addressed in [25]. The setup introduced in [26] closely resembles the game of resource takeover in dynamical system FlipDyn [27]. However, the authors in [26] do not address the action of takeovers; they assume takeovers can occur periodically and focus solely on deriving control policies for both the defender and adversary, limited to a one-dimensional control input.…”
Section: Introductionmentioning
confidence: 99%