ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2010.00268
  4. Cited By
Encrypted control for networked systems -- An illustrative introduction
  and current challenges

Encrypted control for networked systems -- An illustrative introduction and current challenges

1 October 2020
M. S. Darup
A. Alexandru
Daniel E. Quevedo
G. J. Pappas
ArXiv (abs)PDFHTML

Papers citing "Encrypted control for networked systems -- An illustrative introduction and current challenges"

21 / 21 papers shown
Title
Asymptotic stabilization under homomorphic encryption: A re-encryption free method
Asymptotic stabilization under homomorphic encryption: A re-encryption free method
Shuai Feng
Qian Ma
Junsoo Kim
Shengyuan Xu
64
0
0
12 Apr 2025
Faithful and Privacy-Preserving Implementation of Average Consensus
K. Teranishi
K. Kogiso
Takashi Tanaka
FedML
65
0
0
12 Mar 2025
Client-Aided Secure Two-Party Computation of Dynamic Controllers
Kaoru Teranishi
Takashi Tanaka
85
0
0
04 Mar 2025
Switching multiplicative watermark design against covert attacks
Switching multiplicative watermark design against covert attacks
Alexander J. Gallo
S. C. Anand
André M. H. Teixeira
Riccardo M. G. Ferrari
64
3
0
26 Feb 2025
From Balance to Breach: Cyber Threats to Battery Energy Storage Systems
From Balance to Breach: Cyber Threats to Battery Energy Storage Systems
Frans Öhrström
Joakim Oscarsson
Zeeshan Afzal
János Dani
Mikael Asplund
72
1
0
10 Jan 2025
Encrypted system identification as-a-service via reliable encrypted
  matrix inversion
Encrypted system identification as-a-service via reliable encrypted matrix inversion
Janis Adamek
P. Binfet
Nils Schlüter
M. S. Darup
44
0
0
27 Oct 2024
On the design of stabilizing FIR controllers
On the design of stabilizing FIR controllers
Janis Adamek
Nils Schlüter
M. S. Darup
52
0
0
21 Aug 2024
Perfectly Undetectable Reflection and Scaling False Data Injection
  Attacks via Affine Transformation on Mobile Robot Trajectory Tracking Control
Perfectly Undetectable Reflection and Scaling False Data Injection Attacks via Affine Transformation on Mobile Robot Trajectory Tracking Control
Jun Ueda
H. Kwon
AAML
51
1
0
19 Aug 2024
A Verifiable Computing Scheme for Encrypted Control Systems
A Verifiable Computing Scheme for Encrypted Control Systems
Francesca Stabile
Walter Lúcia
Amr M. Youssef
G. Franzé
61
1
0
28 May 2024
Privacy-Preserving State Estimation in the Presence of Eavesdroppers: A
  Survey
Privacy-Preserving State Estimation in the Presence of Eavesdroppers: A Survey
Xinhao Yan
Guanzhong Zhou
Daniel E. Quevedo
Carlos Murguia
Bo Chen
Hailong Huang
63
1
0
24 Feb 2024
Homomorphically encrypted gradient descent algorithms for quadratic
  programming
Homomorphically encrypted gradient descent algorithms for quadratic programming
André Bertolace
Konstantinos Gatsis
Kostas Margellos
57
0
0
04 Sep 2023
Encrypted Dynamic Control exploiting Limited Number of Multiplications
  and a Method using Ring-LWE based Cryptosystem
Encrypted Dynamic Control exploiting Limited Number of Multiplications and a Method using Ring-LWE based Cryptosystem
Joowon Lee
Donggil Lee
Junsoo Kim
Hyun-Seung Shim
58
8
0
07 Jul 2023
Cryptanalysis of Random Affine Transformations for Encrypted Control
Cryptanalysis of Random Affine Transformations for Encrypted Control
Nils Schlüter
P. Binfet
M. S. Darup
47
4
0
13 Apr 2023
Optimal Security Parameter for Encrypted Control Systems Against
  Eavesdropper and Malicious Server
Optimal Security Parameter for Encrypted Control Systems Against Eavesdropper and Malicious Server
K. Teranishi
K. Kogiso
50
0
0
23 Mar 2023
Optimal Controller and Security Parameter for Encrypted Control Systems
  Under Least Squares Identification
Optimal Controller and Security Parameter for Encrypted Control Systems Under Least Squares Identification
K. Teranishi
K. Kogiso
50
3
0
23 Feb 2023
Towards Provably Secure Encrypted Control Using Homomorphic Encryption
Towards Provably Secure Encrypted Control Using Homomorphic Encryption
K. Teranishi
K. Kogiso
60
5
0
17 Oct 2022
Sample Identifying Complexity of Encrypted Control Systems Under Least
  Squares Identification
Sample Identifying Complexity of Encrypted Control Systems Under Least Squares Identification
K. Teranishi
K. Kogiso
59
1
0
17 Oct 2022
Comparison of encrypted control approaches and tutorial on dynamic
  systems using LWE-based homomorphic encryption
Comparison of encrypted control approaches and tutorial on dynamic systems using LWE-based homomorphic encryption
Junsoo Kim
Dongwoo Kim
Yongsoo Song
Hyun-Seung Shim
H. Sandberg
Karl H. Johansson
70
2
0
11 Oct 2022
Input-Output History Feedback Controller for Encrypted Control with
  Leveled Fully Homomorphic Encryption
Input-Output History Feedback Controller for Encrypted Control with Leveled Fully Homomorphic Encryption
K. Teranishi
T. Sadamoto
K. Kogiso
60
20
0
22 Sep 2021
Encrypted Distributed Lasso for Sparse Data Predictive Control
Encrypted Distributed Lasso for Sparse Data Predictive Control
A. Alexandru
Anastasios Tsiamis
George J. Pappas
74
10
0
23 Apr 2021
Private Computation of Polynomials over Networks
Private Computation of Polynomials over Networks
Teimour Hosseinalizadeh
Fatih Turkmen
N. Monshizadeh
61
6
0
03 Apr 2021
1