Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








7 Hits in 5.5 sec

Trusted AI in Multi-agent Systems: An Overview of Privacy and Security for Distributed Learning [article]

Chuan Ma, Jun Li, Kang Wei, Bo Liu, Ming Ding, Long Yuan, Zhu Han, H. Vincent Poor
2023 arXiv   pre-print
We explore and analyze the potential of threats for each information exchange level based on an overview of the current state-of-the-art attack mechanisms, and then discuss the possible defense methods  ...  Finally, we complete the survey by providing an outlook on the challenges and possible directions for future research in this critical area.  ...  For the theoretical analysis, two standard victims with adversarial observations, i.e., tabular certainty equivalence learner in reinforcement learning and linear quadratic regulator in control, have been  ... 
arXiv:2202.09027v3 fatcat:fbcq4bjcd5ebdc526pgzsnjaiy

Final Program

2020 2020 International Conference on Unmanned Aircraft Systems (ICUAS)  
and future directions in unmanned aircraft systems.  ...  ., and in my capacity as the President of the Association, it is a privilege, a great pleasure and an honor to welcome you to the 2020 International Conference on Unmanned Aircraft Systems (ICUAS'20).  ...  In order to guarantee convergence of all the agents to the reference trajectory, linear matrix inequality (LMI)-based conditions are obtained for computing the controller and observer gains.  ... 
doi:10.1109/icuas48674.2020.9214039 fatcat:7jr6chhfija47kgtwoxqmfmmoe

2021 Index IEEE Transactions on Signal Processing Vol. 69

2021 IEEE Transactions on Signal Processing  
-that appeared in this periodical during 2021, and items from previous years that were commented upon or corrected in 2021.  ...  Note that the item title is found only under the primary entry in the Author Index.  ...  Millimeter Wave Fixed Wireless Access Links; TSP 2021 3268-3282 Zhang, J., and Sun, J., Optimal Stealthy Linear-Attack Schedules on Remote State Estimation; TSP 2021 2807-2817 Zhou, R., and Palomar, D.P  ... 
doi:10.1109/tsp.2022.3162899 fatcat:kcubj566gzb4zkj7xb5r5we3ri

2020 Index IEEE Transactions on Industrial Informatics Vol. 16

2020 IEEE Transactions on Industrial Informatics  
., Distributed Clock Synchronization Based on Intelligent Clustering in Local Area Industrial IoT Systems; TII June 2020 3697-3707 Jia, S., see Chen, C., 1873-1884 Jia, W., see Wang, T., 2054-2062 Jia  ...  Photovoltaic Arrays Using GBSSL Method and Proposing a Fault Correction System; TII Aug. 2020 5300-5308  ...  Demirci, S., +, TII July 2020 4365-4377 Linear quadratic Gaussian control Optimal Attack Strategy Against Wireless Networked Control Systems With Proactive Channel Hopping.  ... 
doi:10.1109/tii.2021.3053362 fatcat:blfvdtsc3fdstnk6qoaazskd3i

Stochastic Energy Management and Cyber-Physical Security of Battery Energy Storage Systems in Smart Distribution Systems

Peng Zhuang
2020
Moreover, due to the highly coupled cyber and physical systems in SDSs, the cyber-physical attacks that leverage common cyber attacks to stealthily cause cascaded physical failures seriously threaten the  ...  Battery energy storage systems (BESSs) are vital for improving the sustainability, efficiency, and resiliency of smart distribution systems (SDSs).  ...  By leveraging the linear FDIAs attack models in power transmission systems, the authors in [34] propose a fast screening method to detect the high-risk line in power transmission systems that is more  ... 
doi:10.7939/r3-pmee-ch65 fatcat:6556duumcjcrzcxull3ikb6yha

A Roadmap for Big Model [article]

Sha Yuan, Hanyu Zhao, Shuai Zhao, Jiahong Leng, Yangxiao Liang, Xiaozhi Wang, Jifan Yu, Xin Lv, Zhou Shao, Jiaao He, Yankai Lin, Xu Han (+88 others)
2022 arXiv   pre-print
We introduce 16 specific BM-related topics in those four parts, they are Data, Knowledge, Computing System, Parallel Training System, Language Model, Vision Model, Multi-modal Model, Theory&Interpretability  ...  Researchers have achieved various outcomes in the construction of BMs and the BM application in many fields.  ...  Further work also proposes other stealthy backdoor attacks [1012, 1013] . Clean-label Backdoor Attacks.  ... 
arXiv:2203.14101v4 fatcat:rdikzudoezak5b36cf6hhne5u4

Special Issue: Quantitative Risk Analysis Techniques for Security Applications

Christopher Kiekintveld, Janusz Marecki, Praveen Paruchuri, Katia Sycara, Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Editorial Board, Juan Carlos, Augusto (+23 others)
2010 unpublished
Acknowledgements The work described in this paper was supported in part by grant ARRS J2-9180 "Jezikoslovno označevanje slovenskega jezika: metode in viri" and EU 6FP-033917 SMART "Statistical Multilingual  ...  Acknowledgements The authors would like to thank James Pita and Vicki Bier for helpful suggestions, Prakhar Garag and Rahul Jain for assistance in running experiments, Sergeant Jim Holcomb for supplying  ...  Detection of stealthy attacks, such as malicious insider covert activity and terrorist preparations, can be complex and may require probes (i.e., actions designed to engender a response likely to provide  ... 
fatcat:bz2eljqpmvggjpg35q5w2j6afu