Privacy preservation in distributed optimization via dual decomposition and ADMM
K Tjell, R Wisniewski - 2019 IEEE 58th Conference on Decision …, 2019 - ieeexplore.ieee.org
In this work, we explore distributed optimization problems, as they are often stated in energy
and resource optimization. More precisely, we consider systems consisting of a number of …
and resource optimization. More precisely, we consider systems consisting of a number of …
Fault-tolerant control of robot manipulators with sensory faults using unbiased active inference
This work presents a novel fault-tolerant control scheme based on active inference.
Specifically, a new formulation of active inference which, unlike previous solutions, provides …
Specifically, a new formulation of active inference which, unlike previous solutions, provides …
Privatized distributed anomaly detection for large-scale nonlinear uncertain systems
In this article two limitations in current distributed model based approaches for anomaly
detection in large-scale uncertain nonlinear systems are addressed. The first limitation …
detection in large-scale uncertain nonlinear systems are addressed. The first limitation …
Differentially Private Anomaly Detection for Interconnected Systems
Detecting anomalies in large-scale distributed systems, such as cyber-attacks launched
against intelligent transportation systems and other critical infrastructures, or epidemics …
against intelligent transportation systems and other critical infrastructures, or epidemics …
Privacy-preserving of system model with perturbed state trajectories using differential privacy: with application to a supply chain network
Releasing state samples generated by a dynamical system model, for data aggregation
purposes, can allow an adversary to perform reverse engineering and estimate sensitive …
purposes, can allow an adversary to perform reverse engineering and estimate sensitive …
[BOOK][B] Secure and Privacy-Preserving Cyber-Physical Systems
KH Degue - 2021 - search.proquest.com
Dans cette thèse de doctorat, nous étudions le problème de conception d'estimateur et de
commande préservant la confidentialité de données dans un système multi-algent composé …
commande préservant la confidentialité de données dans un système multi-algent composé …
A two-stage architecture for differentially private Kalman filtering and LQG control
Large-scale monitoring and control systems enabling a more intelligent infrastructure
increasingly rely on sensitive data obtained from private agents, eg, location traces collected …
increasingly rely on sensitive data obtained from private agents, eg, location traces collected …
[PDF][PDF] Privacy-Preserving of System Model with Perturbed State Trajectories using Differential Privacy: With application to a Supply Chain Network
Releasing state samples generated by a dynamical system model, for data aggregation
purposes, can allow an adversary to perform reverse engineering and estimate sensitive …
purposes, can allow an adversary to perform reverse engineering and estimate sensitive …
[PDF][PDF] DISTRIBUTED DATA-DRIVEN DECISION MAKING IN UNCERTAIN NETWORKED SYSTEMS
VR SAMARIN - vandewouw.dc.tue.nl
Due to recent advances in technology and irreversible societal trends many applications in
control engineering become increasingly complex and interconnected. In addition to the …
control engineering become increasingly complex and interconnected. In addition to the …