Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Distributed Optimization Under Adversarial Nodes - MaRDI portal

Distributed Optimization Under Adversarial Nodes

From MaRDI portal
Publication:4629864

DOI10.1109/TAC.2018.2836919zbMath1482.90233arXiv1606.08939OpenAlexW2962775700WikidataQ129811806 ScholiaQ129811806MaRDI QIDQ4629864

Bahman Gharesifard, Shreyas Sundaram

Publication date: 28 March 2019

Published in: IEEE Transactions on Automatic Control (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/1606.08939




Related Items (23)

Online optimization of LTI systems under persistent attacks: stability, tracking, and robustnessSecure rendezvous and static containment in multi-agent systems with adversarial intrudersByzantine-resilient distributed state estimation: a min-switching approachA distributed optimization algorithm over Markov switching topology under adversarial attackDifferentially private resilient distributed cooperative online estimation over digraphsGraph-theoretic approaches for analyzing the resilience of distributed control systems: a tutorial and surveyA resilient distributed optimization strategy against false data injection attacksResilient consensus‐based distributed optimization under deception attacksGradient-based local formulations of the Vickrey-Clarke-Groves mechanism for truthful minimization of social convex objectivesResilient penalty function method for distributed constrained optimization under Byzantine attackDistributed strategies for mixed equilibrium problems: continuous-time theoretical approachesDistributed secure state estimation for linear systems against malicious agents through sorting and filteringA trust‐based resilient consensus algorithm for distributed optimization considering node and edge attacksSubmodularity-based false data injection attack scheme in multi-agent dynamical systemsMaximizing the coverage of roadmap graph for optimal motion planningResilient Distributed Field EstimationDistributed secure state estimation for cyber-physical systems under sensor attacksDetermining \(r\)- and \((r,s)\)-robustness of digraphs using mixed integer linear programmingResilient distributed vector consensus using centerpointResilient output regulation in heterogeneous networked systems under Byzantine agentsDistributed algorithm for resource allocation problems under persistent attacksResilient multi-dimensional consensus in adversarial environmentGeneral resilient consensus algorithms




This page was built for publication: Distributed Optimization Under Adversarial Nodes