Search
Now showing items 1-10 of 20
Crosstalk between HER2 and PD-1/PD-L1 in Breast Cancer: From Clinical Applications to Mathematical Models.
(
Springer
, 2020 , Article)
Breast cancer is one of the major causes of mortality in women worldwide. The most aggressive breast cancer subtypes are human epidermal growth factor receptor-positive (HER2) and triple-negative breast cancers. Therapies ...
Sensor data validation and fault diagnosis using Auto-Associative Neural Network for HVAC systems
(
Elsevier Ltd
, 2020 , Article)
The Heating, Ventilation, and Air conditioning (HVAC) system is a major system in buildings for conditioning the indoor environment. Sensor data validation and fault diagnosis for HVAC systems are essentially important to ...
Undetectable Cyber Attacks on Communication Links in Multi-Agent Cyber-Physical Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The objective in this paper is to study and develop conditions for a network of multi-agent cyber-physical systems (MAS) where a malicious adversary can utilize vulnerabilities in order to ensure and maintain cyber attacks ...
Covert attack in load frequency control of power systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The purpose of this work is to design a covert agent structure that can create a non-zero frequency deviation in the load frequency control (LFC) system and illustrate the necessity of a secure communication network for ...
Cyber Attack Detection for a Nonlinear Binary Crude Oil Distillation Column
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Cyber security for Industrial Control Systems (ICS) is increasingly becoming an area of research as advance network technology continues to evolve providing extended connectivity between cyber world and control system ...
Mitigation and resiliency of multi-agent systems subject to malicious cyber attacks on communication links
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
This paper aims at investigating a novel type of cyber attack that is injected to multi-agent systems (MAS) having an underlying directed graph. The cyber attack, which is designated as the controllability attack, is ...
Fault-tolerant fully distributed leader-following consensus for linear multi-agent systems with non-cooperative leader
(
Elsevier B.V.
, 2020 , Conference Paper)
In this paper, the problem of distributed fault-tolerant control for multi-agent systems is studied. In the proposed method, the communication graph of the network is not needed to be known by the agents. The leader agent ...
Monitoring and detection of malicious adversarial zero dynamics attacks in cyber-physical systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
This paper is mainly concerned with monitoring and detection of zero dynamics (ZD) cyber attacks that are injected by malicious hackers and adversaries to safety critical cyber-physical systems (CPS). We consider a CPS ...
Simultaneous Actuator Fault Estimation and Fault-tolerant Tracking Control for Multi-agent Systems: A Sliding-mode Observer-based Approach
(
Taylor and Francis Ltd.
, 2020 , Article)
This study is concerned with the design of a distributed simultaneous fault estimation and fault-tolerant control scheme for linear multi-agent systems subject to actuator faults. For each agent, a sliding-mode observer-based ...
Dynamical observer for continuous linear Roesser systems
(
Elsevier B.V.
, 2020 , Conference Paper)
Monitoring of industrial systems for anomalies such as faults and cyber-attacks as unknown and extremely undesirable inputs in the presence of other inputs (like disturbances) is an important issue for ensuring the safety ...