2020
DOI: 10.1016/j.jfranklin.2020.04.004
|View full text |Cite
|
Sign up to set email alerts
|

Distributed algorithm for resource allocation problems under persistent attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 24 publications
0
14
0
Order By: Relevance
“…Next, we will analyze the stability of the hybrid system (21). To do this, we construct the following Lyapunov function…”
Section: Stability Analysis Of the Proposed Algorithmmentioning
confidence: 99%
See 3 more Smart Citations
“…Next, we will analyze the stability of the hybrid system (21). To do this, we construct the following Lyapunov function…”
Section: Stability Analysis Of the Proposed Algorithmmentioning
confidence: 99%
“…Since the trajectory 𝜉(t, j) of the hybrid system (21) can characterize the solution of the switched algorithm (6), from (28), we can show that (6) can exponentially converge to the set  1 . Furthermore, under the variable change v = ȳ + 1 N ⊗ 𝜔(x), the algorithm (3) is transformed into (6).…”
Section: Stability Analysis Of the Proposed Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…The attacker is stealthy as it will not modify the node's preference information in an arbitrary manner but considers threshold and magnitude constraints during decisionmaking. The considered scenario is related to the resilient resource allocation under adversarial attacks in literature, including jamming attack [6], network topology attack [7], and data falsification attack [8].…”
Section: Introductionmentioning
confidence: 99%