Andrew Clark

According to our database1, Andrew Clark authored at least 90 papers between 2003 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Cyber-Physical Resilience: Definition and Assessment Metric.
IEEE Trans. Smart Grid, 2019

Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks.
IEEE Trans. Information Forensics and Security, 2019

Minimal Input and Output Selection for Stability of Systems With Uncertainties.
IEEE Trans. Automat. Contr., 2019

Workflow Automation for Cycling Systems.
Computing in Science and Engineering, 2019

Potential-Based Advice for Stochastic Policy Learning.
CoRR, 2019

Optimal Secure Control with Linear Temporal Logic Constraints.
CoRR, 2019

A Differentially Private Incentive Design for Traffic Offload to Public Transportation.
CoRR, 2019

Secure Control under Partial Observability with Temporal Logic Constraints.
CoRR, 2019

A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching.
Proceedings of the 2019 American Control Conference, 2019

Secure Control under Partial Observability with Temporal Logic Constraints.
Proceedings of the 2019 American Control Conference, 2019

LQG Reference Tracking with Safety and Reachability Guarantees under False Data Injection Attacks.
Proceedings of the 2019 American Control Conference, 2019

Control Barrier Functions for Complete and Incomplete Information Stochastic Systems.
Proceedings of the 2019 American Control Conference, 2019

2018
Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach.
IEEE Trans. Control of Network Systems, 2018

Combinatorial Algorithms for Control of Biological Regulatory Networks.
IEEE Trans. Control of Network Systems, 2018

A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats.
CoRR, 2018

Minimum Violation Control Synthesis on Cyber-Physical Systems under Attacks.
CoRR, 2018

Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks.
CoRR, 2018

Maximizing the smallest eigenvalue of a symmetric matrix: A submodular optimization approach.
Automatica, 2018

Cloaking the clock: emulating clock skew in controller area networks.
Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems, 2018

A Differentially Private and Truthful Incentive Mechanism for Traffic Offload to Public Transportation.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Multi-stage Dynamic Information Flow Tracking Game.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Minimum Violation Control Synthesis on Cyber-Physical Systems under Attacks.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Input Selection for Performance, Stabilizability, and Controllability of Structured Linear Descriptor Systems.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Modeling and Mitigating the Coremelt Attack.
Proceedings of the 2018 Annual American Control Conference, 2018

Secure Control Under Linear Temporal Logic Constraints.
Proceedings of the 2018 Annual American Control Conference, 2018

Linear Quadratic Gaussian Control Under False Data Injection Attacks.
Proceedings of the 2018 Annual American Control Conference, 2018

2017
Toward Synchronization in Networks With Nonlinear Dynamics: A Submodular Optimization Framework.
IEEE Trans. Automat. Contr., 2017

Input Selection for Performance and Controllability of Structured Linear Descriptor Systems.
SIAM J. Control and Optimization, 2017

Cloaking the Clock: Emulating Clock Skew in Controller Area Networks.
CoRR, 2017

Maximizing the Smallest Eigenvalue of a Symmetric Matrix: A Submodular Optimization Approach.
CoRR, 2017

On the Structure and Computation of Random Walk Times in Finite Graphs.
CoRR, 2017

Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API.
CoRR, 2017

Combinatorial Algorithms for Control of Biological Regulatory Networks.
CoRR, 2017

A submodular optimization approach to controlled islanding under cascading failure.
Proceedings of the 8th International Conference on Cyber-Physical Systems, 2017

Minimal input selection for robust control.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017

Discrete-time fractional-order multiple scenario-based sensor selection.
Proceedings of the 2017 American Control Conference, 2017

A submodular optimization approach to leader-follower consensus in networks with negative edges.
Proceedings of the 2017 American Control Conference, 2017

2016
Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach.
CoRR, 2016

Submodularity in Input Node Selection for Networked Systems.
CoRR, 2016

cl-dash: rapid configuration and deployment of Hadoop clusters for bioinformatics research in the cloud.
Bioinformatics, 2016

A System for a Hand Gesture-Manipulated Virtual Reality Environment.
Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2016

Towards Scalable Voltage Control in Smart Grid: A Submodular Optimization Approach.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

MinGen: Minimal generator set selection for small signal stability in power systems: A submodular framework.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

Distributed adaptive patching strategies against malware propagation: A passivity approach.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

2015
Scalable and distributed submodular maximization with matroid constraints.
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015

Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

A host takeover game model for competing malware.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Input selection for disturbance rejection in networked cyber-physical systems.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Passivity framework for composition and mitigation of multi-virus propagation in networked systems.
Proceedings of the American Control Conference, 2015

Jamming-based adversarial control of network flow allocation: A passivity approach.
Proceedings of the American Control Conference, 2015

2014
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems.
IEEE Trans. Automat. Contr., 2014

A Supermodular Optimization Framework for Leader Selection Under Link Noise in Linear Multi-Agent Systems.
IEEE Trans. Automat. Contr., 2014

Minimizing Convergence Error in Multi-Agent Systems Via Leader Selection: A Supermodular Optimization Approach.
IEEE Trans. Automat. Contr., 2014

Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework.
CoRR, 2014

Distributed online submodular maximization in resource-constrained networks.
Proceedings of the 12th International Symposium on Modeling and Optimization in Mobile, 2014

2013
Toward a Statistical Framework for Source Anonymity in Sensor Networks.
IEEE Trans. Mob. Comput., 2013

Ring Theory, Group Actions, Evolutionary Algorithms, and Global Optimization
CoRR, 2013

A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems.
CoRR, 2013

Using Social Information for Flow Allocation in MANETs.
CoRR, 2013

Minimizing Convergence Error in Multi-Agent Systems via Leader Selection: A Supermodular Optimization Approach.
CoRR, 2013

Modeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach.
Proceedings of the Control of Cyber-Physical Systems, 2013

Deployment and exploitation of deceptive honeybots in social networks.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

Effectiveness of IP address randomization in decoy-based moving target defense.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

An impact-aware defense against Stuxnet.
Proceedings of the American Control Conference, 2013

Joint leader and link weight selection for fast convergence in multi-agent systems.
Proceedings of the American Control Conference, 2013

2012
Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification.
IEEE Trans. Parallel Distrib. Syst., 2012

A Supermodular Optimization Framework for Leader Selection under Link Noise in Linear Multi-Agent Systems
CoRR, 2012

SODEXO: A System Framework for Deployment and Exploitation of Deceptive Honeybots in Social Networks
CoRR, 2012

Piecewise Linear Topology, Evolutionary Algorithms, and Optimization Problems
CoRR, 2012

Leader selection for minimizing convergence error in leader-follower systems: A supermodular optimization approach.
Proceedings of the 10th International Symposium on Modeling and Optimization in Mobile, 2012

Leader selection games under link noise injection attacks.
Proceedings of the 1st International Conference on High Confidence Networked Systems (HiCoNS, 2012

Deceptive Routing in Relay Networks.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Deceptive routing games.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

On leader selection for performance and controllability in multi-agent systems.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

Leader selection in multi-agent systems for smooth convergence via fast mixing.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

A passivity-based framework for composing attacks on networked control systems.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
HTTP Session Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Using MOEAs To Outperform Stock Benchmarks In The Presence of Typical Investment Constraints
CoRR, 2011

Maximizing Influence in Competitive Environments: A Game-Theoretic Approach.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

A submodular optimization framework for leader selection in linear multi-agent systems.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

2010
Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments.
JoWUA, 2010

The power of primes: security of authentication based on a universal hash-function family.
J. Mathematical Cryptology, 2010

A Metric for Quantifying Key Exposure Vulnerability in Wireless Sensor Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Statistical Framework for Source Anonymity in Sensor Networks.
Proceedings of the Global Communications Conference, 2010

Scalable RFID systems: a privacy-preserving protocol with constant-time identification.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2005
Optimizing Web delivery over wireless links: design, implementation, and experiences.
IEEE Journal on Selected Areas in Communications, 2005

2003
GPRSWeb: Optimizing the Web for GPRS Links.
Proceedings of the First International Conference on Mobile Systems, 2003


  Loading...