A survey on attack detection and resilience for connected and automated vehicles: From vehicle dynamics and control perspective
Recent advances in attack/anomaly detection and resilience strategies for connected and
automated vehicles (CAVs) are reviewed from vehicle dynamics and control perspective …
automated vehicles (CAVs) are reviewed from vehicle dynamics and control perspective …
[HTML][HTML] Digital twin of electric vehicle battery systems: Comprehensive review of the use cases, requirements, and platforms
Transportation electrification has been fueled by recent advancements in the technology
and manufacturing of battery systems, but the industry yet is facing serious challenges that …
and manufacturing of battery systems, but the industry yet is facing serious challenges that …
Byzantine machine learning: A primer
The problem of Byzantine resilience in distributed machine learning, aka Byzantine machine
learning, consists of designing distributed algorithms that can train an accurate model …
learning, consists of designing distributed algorithms that can train an accurate model …
Optimal denial-of-service attack scheduling with energy constraint over packet-drop** networks
The recent years have seen a surge of security issues of cyber-physical systems (CPS). In
this paper, denial-of-service (DoS) attack scheduling is investigated in depth. Specifically …
this paper, denial-of-service (DoS) attack scheduling is investigated in depth. Specifically …
Brief survey on attack detection methods for cyber-physical systems
In recent years, cyber-physical systems (CPSs) have attracted intense attention due to their
potential applications in many areas. However, the strong reliance on communication …
potential applications in many areas. However, the strong reliance on communication …
State of the art of cyber-physical systems security: An automatic control perspective
Cyber-physical systems are integrations of computation, networking, and physical
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
Secure state estimation for cyber-physical systems under sensor attacks: A satisfiability modulo theory approach
Secure state estimation is the problem of estimating the state of a dynamical system from a
set of noisy and adversarially corrupted measurements. Intrinsically a combinatorial …
set of noisy and adversarially corrupted measurements. Intrinsically a combinatorial …
An intelligent secured framework for cyberattack detection in electric vehicles' CAN bus using machine learning
Electric Vehicles' Controller Area Network (CAN) bus serves as a legacy protocol for in-
vehicle network communication. Simplicity, robustness, and suitability for real-time systems …
vehicle network communication. Simplicity, robustness, and suitability for real-time systems …
Coding schemes for securing cyber-physical systems against stealthy data injection attacks
This paper considers a method of coding the sensor outputs in order to detect stealthy false
data injection attacks. An intelligent attacker can design a sequence of data injection to …
data injection attacks. An intelligent attacker can design a sequence of data injection to …
Attack-resilient state estimation for noisy dynamical systems
Several recent incidents have clearly illustrated the susceptibility of cyberphysical systems
(CPS) to attacks, raising attention to security challenges in these systems. The tight …
(CPS) to attacks, raising attention to security challenges in these systems. The tight …