Name | Authors | Type | Date | Link |
---|---|---|---|---|
Minimizing Information Leakage of Abrupt Changes in Stochastic Systems | Alessio Russo, Alexandre Proutiere | Presentation | December ’21 | Link |
Method for Running Dynamic Systems over Encrypted Data for Infinite Time Horizon without Bootstrapping and Re-encryption | Junsoo Kim, Hyungbo Shim, Henrik Sandberg , Karl H. Johansson | Presentation | December ’21 | Link |
Data-Driven Control and Data-Poisoning attacks in Buildings: the KTH Live-In Lab case study | Alessio Russo, Alexandre Proutiere | Presentation | July ’21 | Link |
Poisoning Attacks on Data-Driven Control Methods | Alessio Russo, Alexandre Proutiere | Presentation | May ’21 | Link |
Optimal attacks on Reinforcement Learning policies | Alessio Russo, Alexandre Proutiere | Presentation | May ’21 | Link |
Design Procedure for Dynamic Controllers based on LWE-based Homomorphic Encryption to Operate for Infinite Time Horizon | Junsoo Kim, Hyungbo Shim and Kyoohyung Han | Presentation | December ’20 | Link |
Virtual testbed of the KTH Live-In Lab: development and validation | Marco Molinari, Davide Rolando | Presentation | December ’20 | Link |
A Game Theoretic Analysis of LQG Control under Adversarial Attack | Zuxing Li, György Dán, and Dong Liu | Presentation | December ’20 | Link |
Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach | Serkan Sarıtaş, Henrik Sandberg, Ezzeldin Shereen, György Dán | Presentation | November ’19 | Link |