Graph-theoretic approaches for analyzing the resilience of distributed control systems: A tutorial and survey
As the scale of distributed control systems over networks increases and interactions
between different subsystems become more sophisticated, questions of the resilience of …
between different subsystems become more sophisticated, questions of the resilience of …
Resilient control strategy and attack detection on platooning of smart vehicles under DoS attack
Intent on the smart vehicles of a platoon to follow their correct routes, they must exchange
their state information with each other based on a communication graph. Meanwhile …
their state information with each other based on a communication graph. Meanwhile …
Impact of network topology on the resilience of vehicle platoons
This paper presents a comprehensive study on the impact of information flow topologies on
the resilience of distributed algorithms that are widely used for estimation and control in …
the resilience of distributed algorithms that are widely used for estimation and control in …
[HTML][HTML] Cooperative control of heterogeneous multi-agent systems under spatiotemporal constraints
A current trend in research on multi-agent control systems is to consider high-level task
specifications that go beyond traditional control objectives and take into account the …
specifications that go beyond traditional control objectives and take into account the …
Planning and distributed control for cooperative transportation of a non-uniform slung-load by multiple quadrotors
This paper presents a novel control and planning algorithm for cooperative slung-load
transportation using multiple quadrotors. Each aerial robot modeled as a quadrotor is …
transportation using multiple quadrotors. Each aerial robot modeled as a quadrotor is …
Deception attack detection and resilient control in platoon of smart vehicles
Platooning of smart vehicles would be an important application of multi-agent systems. Each
member of a multi-agent system is vulnerable to malicious attacks. Cyber attacks including …
member of a multi-agent system is vulnerable to malicious attacks. Cyber attacks including …
Internal stability and string stability of connected vehicle systems with time delays
Y Liu, H Gao, C Zhai, W **e - IEEE Transactions on Intelligent …, 2020 - ieeexplore.ieee.org
The leader-following consensus method is studied in the connected vehicle systems (CVSs)
with the constant time delay. Based on the neighboring vehicle information, the distributed …
with the constant time delay. Based on the neighboring vehicle information, the distributed …
Protocol selection for second-order consensus against disturbance
Noticing that both the absolute and the relative velocity protocols can solve the second-order
consensus of multi-agent systems, this paper aims to investigate which of the above two …
consensus of multi-agent systems, this paper aims to investigate which of the above two …
A Graph-Theoretic Equilibrium Analysis of Attacker-Defender Game on Consensus Dynamics Under Performance Metric
In this paper, we propose a game-theoretic framework for improving the resilience of the
consensus algorithm, under the performance metric, in the presence of a strategic attacker …
consensus algorithm, under the performance metric, in the presence of a strategic attacker …
System-theoretic performance metrics for low-inertia stability of power networks
As bulk synchronous generators in the power grid are replaced by distributed generation
interfaced through power electronics, inertia is removed from the system, prompting …
interfaced through power electronics, inertia is removed from the system, prompting …