To build a photonic integration platform that incorporates monolithically integrated light sources which require minimized loss and reflection, a micro-meter scale passive layer is needed in addition to the III-V laye...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)is an indispensable functional module of ***,it has been demonstrated that malicious agents can manipulate data packets transmitted through unreliable channels of RSE,leading to severe estimation performance *** paper aims to present an overview of recent advances in cyber-attacks and defensive countermeasures,with a specific focus on integrity attacks against ***,two representative frameworks for the synthesis of optimal deception attacks with various performance metrics and stealthiness constraints are discussed,which provide a deeper insight into the vulnerabilities of ***,a detailed review of typical attack detection and resilient estimation algorithms is included,illustrating the latest defensive measures safeguarding RSE from ***,some prevalent attacks impairing the confidentiality and data availability of RSE are examined from both attackers'and defenders'***,several challenges and open problems are presented to inspire further exploration and future research in this field.
Delay-sensitive applications are becoming more and more in demand as a result of the development of information systems and the expansion of communication in cloud computing technologies. Some of these requests will b...
详细信息
Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)***,several security vulnerabilities and att...
详细信息
Unmanned Aerial Vehicles(UAVs)will be essential to support mission-critical applications of Ultra Reliable Low Latency Communication(URLLC)in futuristic Sixth-Generation(6G)***,several security vulnerabilities and attacks have plagued previous generations of communication systems;thus,physical layer security,especially against eavesdroppers,is vital,especially for upcoming 6G *** this regard,UAVs have appeared as a winning candidate to mitigate security *** this paper,we leverage UAVs to propose two *** first method utilizes a UAV as Decode-and-Forward(DF)relay,whereas the second method utilizes a UAV as a jammer to mitigate eavesdropping attacks for URLLC between transmitter and receiver ***,we present a low-complexity algorithm that outlines the two aforementioned methods of mitigating interception,*** secrecy rate,and we compare them with the benchmark null method in which there is a direct communication link between transmitter and receiver without the UAV DF ***,simulation results show the effectiveness of such methods by improving the secrecy rate and its dependency on UAV height,blocklength,decoding error probability and transmitter-receiver separation ***,we recommend the best method to enhance the secrecy rate in the presence of an eavesdropper based on our simulations.
This paper develops a novel decentralized algorithm for the coordination of multi-agent systems with uncertain 2nd-order dynamics under collision, connectivity, and prescribed-performance constraints. More specificall...
详细信息
This paper considers the problem of asymptotic stabilization of a class of MIMO control-affine systems with unknown nonlinear terms subject to prescribed transient constraints. We propose a novel control methodology, ...
详细信息
In order to bolster future wireless networks, there has been a great deal of interest in non-terrestrial networks, especially aerial platforms including high-altitude platform stations (HAPS) and uncrewed aerial vehic...
详细信息
Traditional analytical approaches for stability assessment of inverter-based resources(IBRs),often requiring detailed knowledge of IBR internals,become impractical due to IBRs’proprietary *** measurements,relying on ...
详细信息
Traditional analytical approaches for stability assessment of inverter-based resources(IBRs),often requiring detailed knowledge of IBR internals,become impractical due to IBRs’proprietary *** measurements,relying on electromagnetic transient simulation or laboratory settings,are not only time-intensive but also operationally inflexible,since various non-linear control loops make IBRs’admittance models operating-point ***,such admittance measurements must be performed repeatedly when operating point *** avoid time-consuming and cumbersome measurements,admittance estimation for arbitrary operating points is highly ***,existing admittance estimation algorithms usually face challenges in versatility,data demands,and *** this challenge,this letter presents a simple and efficient admittance estimation method for blackboxed IBRs,by utilizing a minimal set of seven operating points to solve a homogeneous linear equation *** studies demonstrate this proposed method ensures high accuracy across various types of *** accuracy is satisfying even when non-negligible measurement errors exist.
We consider the consensus problem for 2nd-order MIMO multi-agent systems with unknown nonlinear terms. We propose a novel control algorithm based on the Barrier Integral Control (BRIC) that combines reciprocal barrier...
详细信息
Across the world, the lack of proper healthcare resources in rural areas significantly impacts the physical and economic well-being of individuals living there. There is a need for multi-faceted solutions to help alle...
详细信息
暂无评论