Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Formal synthesis of controllers for safety-critical autonomous systems: Developments and challenges
In recent years, formal methods have been extensively used in the design of autonomous
systems. By employing mathematically rigorous techniques, formal methods can provide …
systems. By employing mathematically rigorous techniques, formal methods can provide …
Secure-by-construction synthesis of cyber-physical systems
Correct-by-construction synthesis is a cornerstone of the confluence of formal methods and
control theory towards designing safety-critical systems. Instead of following the time-tested …
control theory towards designing safety-critical systems. Instead of following the time-tested …
Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations
R Su - Automatica, 2018 - Elsevier
One of the major challenges about cyber–physical systems is how to protect system integrity
from cyber attacks. There has been a large number of different types of attacks discussed in …
from cyber attacks. There has been a large number of different types of attacks discussed in …
A uniform approach for synthesizing property-enforcing supervisors for partially-observed discrete-event systems
The problem under consideration in this paper is that of enforcement by supervisory control
of a given property on a partially-observed discrete-event system. We present a general …
of a given property on a partially-observed discrete-event system. We present a general …
Reachability analysis of networked finite state machine with communication losses: A switched perspective
Networked finite state machine takes into account communication losses in industrial
communication interfaces due to the limited bandwidth. The reachability analysis of …
communication interfaces due to the limited bandwidth. The reachability analysis of …
Synthesis of covert actuator and sensor attackers
In this work, we shall investigate the problem of covert attacker synthesis in the framework of
supervisory control of discrete-event systems. Intuitively, the covertness property says that …
supervisory control of discrete-event systems. Intuitively, the covertness property says that …
Optimal supervisory control of discrete event systems for cyclic tasks
In this paper, we investigate the problem of optimal supervisory control for cyclic tasks in the
context of discrete-event systems (DES). We consider the completion of each single task as …
context of discrete-event systems (DES). We consider the completion of each single task as …
Current-state opacity enforcement in discrete event systems under incomparable observations
In this paper we tackle the opacity enforcement problem in discrete event systems using
supervisory control theory. In particular, we consider the case where the intruder and the …
supervisory control theory. In particular, we consider the case where the intruder and the …
Security of cyber-physical systems: Design of a security supervisor to thwart attacks
Cyber-physical systems (CPSs) integrate computing and communication capabilities to
monitor and control physical processes. In order to do so, communication networks are …
monitor and control physical processes. In order to do so, communication networks are …
Molecular Origins of Long-Term Changes in a Competitive Continuous Biosensor with Single-Molecule Resolution
S Cajigas, AM de Jong, J Yan, MWJ Prins - ACS sensors, 2024 - ACS Publications
Biosensing by particle motion is a biosensing technology that relies on single-molecule
interactions and enables the continuous monitoring of analytes from picomolar to …
interactions and enables the continuous monitoring of analytes from picomolar to …