Search Results for author: Yukang Cui

Found 5 papers, 0 papers with code

Resilient Output Containment Control of Heterogeneous Multiagent Systems Against Composite Attacks: A Digital Twin Approach

no code implementations22 Mar 2023 Yukang Cui, Lingbo Cao, Michael V. Basin, Jun Shen, TingWen Huang, Xin Gong

Third, according to the reconstructed leader dynamics, we design decentralized solvers that calculate the output regulator equations on CPL.

Resilient Output Consensus Control of Heterogeneous Multi-agent Systems against Byzantine Attacks: A Twin Layer Approach

no code implementations22 Mar 2023 Xin Gong, Yiwen Liang, Yukang Cui, Shi Liang, TingWen Huang

Inspired by the concept of Digital Twin, a new hierarchical protocol equipped with a virtual twin layer (TL) is proposed, which decouples the above problems into the defense scheme against Byzantine edge attacks on the TL and the defense scheme against Byzantine node attacks on the cyber-physical layer (CPL).

Data-Driven Leader-following Consensus for Nonlinear Multi-Agent Systems against Composite Attacks: A Twins Layer Approach

no code implementations22 Mar 2023 Xin Gong, Jintao Peng, Dong Yang, Zhan Shu, TingWen Huang, Yukang Cui

Consequently, the resilient control task against CAs can be divided into two parts: One is distributed estimation against DoS attacks on the TL and the other is resilient decentralized tracking control against actuation attacks on the CPL.

Optimal Resource Allocation between Two Nonfully Cooperative Wireless Networks under Malicious Attacks: A Gestalt Game Perspective

no code implementations22 Mar 2023 Yukang Cui, Xinru Yang, TingWen Huang, Xin Gong

In this paper, the problem of seeking optimal distributed resource allocation (DRA) policies on cellular networks in the presence of an unknown malicious adding-edge attacker is investigated.

Resilient Path Planning of UAVs against Covert Attacks on UWB Sensors

no code implementations23 Feb 2021 Jiayi He, Xin Gong, Yukang Cui, TingWen Huang

The UAV is equipped with two sensors, a GPS sensor, which is vulnerable to the spoofing attacker, and a well-functioning Ultra-Wideband (UWB) sensor, which is possible to be fooled.

Robotics

Cannot find the paper you are looking for? You can Submit a new open access paper.