logo

SCIENCE CHINA Information Sciences, Volume 64 , Issue 7 : 176201(2021) https://doi.org/10.1007/s11432-020-3240-8

Privacy security in control systems

More info
  • ReceivedDec 16, 2020
  • AcceptedFeb 26, 2021
  • PublishedApr 20, 2021

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported by National Key RD Program of China (Grant No. 2018YFA0703800) and National Natural Science Foundation of China (Grant No. 61877057).


References

[1] Shen S, Zhang K, Zhou Y. Security in edge-assisted Internet of Things: challenges and solutions. Sci China Inf Sci, 2020, 63: 220302 CrossRef Google Scholar

[2] Langer R. To kill a centrifuge: a technical analysis of what Stuxnet's creators tried to achieve. The Langner Group, 2013. https://cyber-peace.org/wp-content/uploads/2013/06/To-kill-a-centrifuge.pdf. Google Scholar

[3] Sultangazin A, Tabuada P. Symmetries and Isomorphisms for Privacy in Control Over the Cloud. IEEE Trans Automat Contr, 2021, 66: 538-549 CrossRef Google Scholar

[4] Wang Y. Privacy-Preserving Average Consensus via State Decomposition. IEEE Trans Automat Contr, 2019, 64: 4711-4716 CrossRef Google Scholar

[5] Altafini C. A system-theoretic framework for privacy preservation in continuous-time multiagent dynamics. Automatica, 2020, 122: 109253 CrossRef Google Scholar

[6] Lu Y, Zhu M. Privacy preserving distributed optimization using homomorphic encryption. Automatica, 2018, 96: 314-325 CrossRef Google Scholar

[7] Xu C B, Zhao Y L, Zhang J F. System identification under information security. In: Proceedings of International Federation of Automatic Control, Toulouse, 2017. 3756--3761. Google Scholar

[8] Le Ny J, Pappas G J. Differentially Private Filtering. IEEE Trans Automat Contr, 2014, 59: 341-354 CrossRef Google Scholar

[9] Liu X K, Zhang J F, Wang J. Differentially private consensus algorithm for continuous-time heterogeneous multi-agent systems. Automatica, 2020, 122: 109283 CrossRef Google Scholar

qqqq

Contact and support