Graph-theoretic approaches for analyzing the resilience of distributed control systems: A tutorial and survey

M Pirani, A Mitra, S Sundaram - Automatica, 2023 - Elsevier
As the scale of distributed control systems over networks increases and interactions
between different subsystems become more sophisticated, questions of the resilience of …

Resilient control strategy and attack detection on platooning of smart vehicles under DoS attack

H Mokari, E Firouzmand, I Sharifi, A Doustmohammadi - ISA transactions, 2024 - Elsevier
Intent on the smart vehicles of a platoon to follow their correct routes, they must exchange
their state information with each other based on a communication graph. Meanwhile …

Impact of network topology on the resilience of vehicle platoons

M Pirani, S Baldi, KH Johansson - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper presents a comprehensive study on the impact of information flow topologies on
the resilience of distributed algorithms that are widely used for estimation and control in …

[HTML][HTML] Cooperative control of heterogeneous multi-agent systems under spatiotemporal constraints

F Chen, M Sewlia, DV Dimarogonas - Annual Reviews in Control, 2024 - Elsevier
A current trend in research on multi-agent control systems is to consider high-level task
specifications that go beyond traditional control objectives and take into account the …

Planning and distributed control for cooperative transportation of a non-uniform slung-load by multiple quadrotors

F Arab, FA Shirazi, MRH Yazdi - Aerospace Science and Technology, 2021 - Elsevier
This paper presents a novel control and planning algorithm for cooperative slung-load
transportation using multiple quadrotors. Each aerial robot modeled as a quadrotor is …

Deception attack detection and resilient control in platoon of smart vehicles

H Mokari, E Firouzmand, I Sharifi… - 2022 30th …, 2022 - ieeexplore.ieee.org
Platooning of smart vehicles would be an important application of multi-agent systems. Each
member of a multi-agent system is vulnerable to malicious attacks. Cyber attacks including …

Internal stability and string stability of connected vehicle systems with time delays

Y Liu, H Gao, C Zhai, W **e - IEEE Transactions on Intelligent …, 2020 - ieeexplore.ieee.org
The leader-following consensus method is studied in the connected vehicle systems (CVSs)
with the constant time delay. Based on the neighboring vehicle information, the distributed …

Protocol selection for second-order consensus against disturbance

J Wang, L Zhou, D Zhang, J Liu, F **ao, Y Zheng - Automatica, 2024 - Elsevier
Noticing that both the absolute and the relative velocity protocols can solve the second-order
consensus of multi-agent systems, this paper aims to investigate which of the above two …

A Graph-Theoretic Equilibrium Analysis of Attacker-Defender Game on Consensus Dynamics Under Performance Metric

M Pirani, E Nekouei, H Sandberg… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we propose a game-theoretic framework for improving the resilience of the
consensus algorithm, under the performance metric, in the presence of a strategic attacker …

System-theoretic performance metrics for low-inertia stability of power networks

M Pirani, JW Simpson-Porco… - 2017 IEEE 56th Annual …, 2017 - ieeexplore.ieee.org
As bulk synchronous generators in the power grid are replaced by distributed generation
interfaced through power electronics, inertia is removed from the system, prompting …