Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secure-by-construction synthesis of cyber-physical systems
Correct-by-construction synthesis is a cornerstone of the confluence of formal methods and
control theory towards designing safety-critical systems. Instead of following the time-tested …
control theory towards designing safety-critical systems. Instead of following the time-tested …
Neural prompt search
The size of vision models has grown exponentially over the last few years, especially after
the emergence of Vision Transformer. This has motivated the development of parameter …
the emergence of Vision Transformer. This has motivated the development of parameter …
A brief survey on encrypted control: From the first to the second generation and beyond
This article provides a comprehensive and illustrative presentation of the young field of
encrypted control. In particular, we survey the evolution of encrypted controllers from their …
encrypted control. In particular, we survey the evolution of encrypted controllers from their …
Hybrid cryptographic approach to enhance the mode of key management system in cloud environment
S Ahmad, S Mehfuz, J Beg - The Journal of Supercomputing, 2023 - Springer
Cloud computing has gained great attention among the individual user and the organization.
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …
[HTML][HTML] Ensuring secure platooning of constrained intelligent and connected vehicles against Byzantine attacks: A distributed MPC framework
This study investigates resilient platoon control for constrained intelligent and connected
vehicles (ICVs) against F-local Byzantine attacks. We introduce a resilient distributed model …
vehicles (ICVs) against F-local Byzantine attacks. We introduce a resilient distributed model …
Privacy-preserving distributed economic dispatch for microgrids based on state decomposition with added noises
This paper devotes itself to the issue of privacy-preserving distributed economic dispatch
(ED) of microgrids. The desired algorithm in a distributed way not only ensures a balance …
(ED) of microgrids. The desired algorithm in a distributed way not only ensures a balance …
A new privacy-preserving average consensus algorithm with two-phase structure: Applications to load sharing of microgrids
This paper is concerned with the privacy-preserving average consensus problem for
discrete-time multi-agent systems. The main goal of this paper is to develop a privacy …
discrete-time multi-agent systems. The main goal of this paper is to develop a privacy …
Privacy-preserved average consensus algorithms with edge-based additive perturbations
Y **ong, Z Li - Automatica, 2022 - Elsevier
In this paper, we consider the privacy preservation problem in continuous-time average
consensus algorithms with strongly connected and balanced graphs, against either internal …
consensus algorithms with strongly connected and balanced graphs, against either internal …
Dynamic controller that operates over homomorphically encrypted data for infinite time horizon
In this article, we present a dynamic feedback controller that computes the next state and the
control signal over encrypted data using homomorphic properties of cryptosystems, whose …
control signal over encrypted data using homomorphic properties of cryptosystems, whose …
Dynamics based privacy preservation in decentralized optimization
With decentralized optimization having increased applications in various domains ranging
from machine learning, control, to robotics, its privacy is also receiving increased attention …
from machine learning, control, to robotics, its privacy is also receiving increased attention …