• Publications
  • Influence
Kalman filtering with intermittent observations
TLDR
This work studies the statistical convergence properties of the estimation error covariance, showing the existence of a critical value for the arrival rate of the observations, beyond which a transition to an unbounded error occurs. Expand
A Control-Theoretic Approach for Dynamic Adaptive Video Streaming over HTTP
TLDR
A principled control-theoretic model is developed that can optimally combine throughput and buffer occupancy information to outperform traditional approaches in bitrate adaptation in client-side players and is presented as a novel model predictive control algorithm. Expand
Foundations of Control and Estimation Over Lossy Networks
TLDR
This paper considers control and estimation problems where the sensor signals and the actuator signals are transmitted to various subsystems over a network and shows that for network protocols where successful transmissions of packets is acknowledged at the receiver, there exists a critical threshold of network reliability below which the optimal controller fails to stabilize the system. Expand
Kalman filtering with intermittent observations
TLDR
This work addresses the problem of performing Kalman filtering with intermittent observations by showing the existence of a critical value for the arrival rate of the observations, beyond which a transition to an unbounded state error covariance occurs. Expand
Secure control against replay attacks
  • Yilin Mo, B. Sinopoli
  • Computer Science
  • 47th Annual Allerton Conference on Communication…
  • 30 September 2009
TLDR
This paper analyzes the effect of replay attacks on a control system and proposes a countermeasure that guarantees a desired probability of detection by trading off either detection delay or LQG performance, either by decreasing control accuracy or increasing control effort. Expand
Cyber–Physical Security of a Smart Grid Infrastructure
TLDR
It is argued that the “smart” grid, replacing its incredibly successful and reliable predecessor, poses a series of new security challenges, among others, that require novel approaches to the field of cyber security. Expand
False Data Injection Attacks in Control Systems
This paper analyzes the effects of false data injection attacks on Control System. We assume that the system, equipped with a Kalman filter and LQG controller, is used to monitor and control aExpand
Challenges for Securing Cyber Physical Systems
TLDR
Security mechanisms for prevention, detection and recovery, resilience and deterrence of attacks, and identifying the unique properties of cyber-physical systems and their differences from traditional IT security are analyzed. Expand
False data injection attacks against state estimation in wireless sensor networks
TLDR
An ellipsoidal algorithm is provided to compute its inner and outer approximations of the set of all the estimation biases that an attacker can inject into the system without being detected, providing a quantitative measure of the resilience of the system to such attacks. Expand
CS2P: Improving Video Bitrate Selection and Adaptation with Data-Driven Throughput Prediction
TLDR
A prototype system and a prototype system are developed that show that CS2P outperforms state-of-art by 40% and 50% median pre- diction error respectively for initial and midstream through- put and improves QoE by 14% over buffer-based adaptation algorithm. Expand
...
1
2
3
4
5
...