2014
DOI: 10.1109/tac.2014.2351671
|View full text |Cite
|
Sign up to set email alerts
|

Detection in Adversarial Environments

Abstract: We propose new game theoretic approaches to estimate a binary random variable based on sensor measurements that may have been corrupted by a cyber-attacker. The estimation problem is formulated as a zero-sum partial information game in which a detector attempts to minimize the probability of an estimation error and an attacker attempts to maximize this probability. While this problem can be solved exactly by reducing it to the computation of the value of a matrix, this approach is computationally feasible only… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
28
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
3
1

Relationship

3
4

Authors

Journals

citations
Cited by 99 publications
(28 citation statements)
references
References 14 publications
0
28
0
Order By: Relevance
“…Consider the controlled dynamical system given by (11) and (12) with the corrective signal Theorem 1.…”
Section: Adaptive Corrective Control Signalmentioning
confidence: 99%
See 2 more Smart Citations
“…Consider the controlled dynamical system given by (11) and (12) with the corrective signal Theorem 1.…”
Section: Adaptive Corrective Control Signalmentioning
confidence: 99%
“…10 These attack strategies rely on perfect system knowledge availability. In the work of Vamvoudakis et al, 12 new game theoretic approaches are proposed to estimate a binary random variable based on sensor measurements that may have been corrupted by a cyber-attacker. In the work of Vamvoudakis et al, 12 new game theoretic approaches are proposed to estimate a binary random variable based on sensor measurements that may have been corrupted by a cyber-attacker.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…We consider the problem of detecting a binary state using sequential analysis in the sense that stopping time is determined by observations while some other researches use a prescribed number of observed samples, e.g. one-shot scheme [19] [20] and fixed time analysis [16]. By making decision adapted to observations, Average Sample Number is saved (as can be seen in Remark 8) because sampling is stopped as soon as the existing observations possess enough preference on a certain hypothesis.…”
Section: Introductionmentioning
confidence: 99%
“…infectious diseases) [76] and social networks [10], [65], human/robot interaction systems [41], Internet [26], transportation systems [45], cyber-security (e.g. malware spreading) [2], [33], [70], [73], [82], [83], unmanned aerial/underwater vehicles [30], sensor networks [63], power networks [80] and mobile robotics [69]. Those systems are large, complex, dynamic, and highly nonlinear in their global behavior.…”
mentioning
confidence: 99%