# Andrew Clark

According to our database

Collaborative distances:

^{1}, Andrew Clark authored at least 103 papers between 1997 and 2021.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2021

A Differentially Private Incentive Design for Traffic Offload to Public Transportation.

ACM Trans. Cyber Phys. Syst., 2021

Optimal Minimum Violation Control Synthesis of Cyber-Physical Systems Under Attacks.

IEEE Trans. Autom. Control., 2021

CoRR, 2021

CoRR, 2021

CoRR, 2021

LQG Reference Tracking with Safety and Reachability Guarantees under Unknown False Data Injection Attacks.

CoRR, 2021

2020

IEEE Trans. Control. Netw. Syst., 2020

IEEE Trans. Autom. Control., 2020

A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats.

IEEE Trans. Autom. Control., 2020

Secure Control in Partially Observable Environments to Satisfy LTL Specifications.

CoRR, 2020

Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach.

CoRR, 2020

Proceedings of the SAICSIT '20: Conference of the South African Institute of Computer Scientists and Information Technologists 2020, 2020

Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks.

Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020

Proceedings of the 59th IEEE Conference on Decision and Control, 2020

Proceedings of the 59th IEEE Conference on Decision and Control, 2020

Control Barrier Functions for Abstraction-Free Control Synthesis under Temporal Logic Constraints.

Proceedings of the 59th IEEE Conference on Decision and Control, 2020

Proceedings of the 59th IEEE Conference on Decision and Control, 2020

FRESH: Interactive Reward Shaping in High-Dimensional State Spaces using Human Feedback.

Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

2019

IEEE Trans. Smart Grid, 2019

Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks.

IEEE Trans. Inf. Forensics Secur., 2019

IEEE Trans. Autom. Control., 2019

IEEE Trans. Autom. Control., 2019

Comput. Sci. Eng., 2019

Linear Temporal Logic Satisfaction in Adversarial Environments Using Secure Control Barrier Certificates.

Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Proceedings of the 58th IEEE Conference on Decision and Control, 2019

Dynamic Information Flow Tracking Games for Simultaneous Detection of Multiple Attackers.

Proceedings of the 58th IEEE Conference on Decision and Control, 2019

Proceedings of the 58th IEEE Conference on Decision and Control, 2019

Proceedings of the 58th IEEE Conference on Decision and Control, 2019

A Submodular Optimization Approach to the Metric Traveling Salesman Problem with Neighborhoods.

Proceedings of the 58th IEEE Conference on Decision and Control, 2019

A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching.

Proceedings of the 2019 American Control Conference, 2019

Proceedings of the 2019 American Control Conference, 2019

LQG Reference Tracking with Safety and Reachability Guarantees under False Data Injection Attacks.

Proceedings of the 2019 American Control Conference, 2019

Control Barrier Functions for Complete and Incomplete Information Stochastic Systems.

Proceedings of the 2019 American Control Conference, 2019

2018

IEEE Trans. Control. Netw. Syst., 2018

IEEE Trans. Control. Netw. Syst., 2018

A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats.

CoRR, 2018

Maximizing the smallest eigenvalue of a symmetric matrix: A submodular optimization approach.

Autom., 2018

Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems, 2018

A Differentially Private and Truthful Incentive Mechanism for Traffic Offload to Public Transportation.

Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats.

Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Input Selection for Performance, Stabilizability, and Controllability of Structured Linear Descriptor Systems.

Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Proceedings of the 2018 Annual American Control Conference, 2018

Proceedings of the 2018 Annual American Control Conference, 2018

Proceedings of the 2018 Annual American Control Conference, 2018

2017

Toward Synchronization in Networks With Nonlinear Dynamics: A Submodular Optimization Framework.

IEEE Trans. Autom. Control., 2017

Input Selection for Performance and Controllability of Structured Linear Descriptor Systems.

SIAM J. Control. Optim., 2017

A submodular optimization approach to controlled islanding under cascading failure.

Proceedings of the 8th International Conference on Cyber-Physical Systems, 2017

Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API.

Proceedings of the 2017 on Multimedia Privacy and Security, 2017

Proceedings of the 2017 American Control Conference, 2017

A submodular optimization approach to leader-follower consensus in networks with negative edges.

Proceedings of the 2017 American Control Conference, 2017

2016

CoRR, 2016

cl-dash: rapid configuration and deployment of Hadoop clusters for bioinformatics research in the cloud.

Bioinform., 2016

Proceedings of the UKAIS 2016, 2016

Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2016

Towards Scalable Voltage Control in Smart Grid: A Submodular Optimization Approach.

Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

MinGen: Minimal generator set selection for small signal stability in power systems: A submodular framework.

Proceedings of the 55th IEEE Conference on Decision and Control, 2016

Distributed adaptive patching strategies against malware propagation: A passivity approach.

Proceedings of the 55th IEEE Conference on Decision and Control, 2016

2015

Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015

Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense.

Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Passivity framework for composition and mitigation of multi-virus propagation in networked systems.

Proceedings of the American Control Conference, 2015

Jamming-based adversarial control of network flow allocation: A passivity approach.

Proceedings of the American Control Conference, 2015

2014

A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems.

IEEE Trans. Autom. Control., 2014

A Supermodular Optimization Framework for Leader Selection Under Link Noise in Linear Multi-Agent Systems.

IEEE Trans. Autom. Control., 2014

Minimizing Convergence Error in Multi-Agent Systems Via Leader Selection: A Supermodular Optimization Approach.

IEEE Trans. Autom. Control., 2014

Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework.

CoRR, 2014

Proceedings of the 12th International Symposium on Modeling and Optimization in Mobile, 2014

2013

IEEE Trans. Mob. Comput., 2013

CoRR, 2013

CoRR, 2013

Modeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach.

Proceedings of the Control of Cyber-Physical Systems, 2013

Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

Proceedings of the American Control Conference, 2013

Joint leader and link weight selection for fast convergence in multi-agent systems.

Proceedings of the American Control Conference, 2013

2012

Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification.

IEEE Trans. Parallel Distributed Syst., 2012

SODEXO: A System Framework for Deployment and Exploitation of Deceptive Honeybots in Social Networks

CoRR, 2012

CoRR, 2012

Leader selection for minimizing convergence error in leader-follower systems: A supermodular optimization approach.

Proceedings of the 10th International Symposium on Modeling and Optimization in Mobile, 2012

Proceedings of the 1st International Conference on High Confidence Networked Systems (HiCoNS, 2012

Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Proceedings of the 51th IEEE Conference on Decision and Control, 2012

Proceedings of the 51th IEEE Conference on Decision and Control, 2012

Proceedings of the 51th IEEE Conference on Decision and Control, 2012

Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Using MOEAs To Outperform Stock Benchmarks In The Presence of Typical Investment Constraints

CoRR, 2011

Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

A submodular optimization framework for leader selection in linear multi-agent systems.

Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

2010

Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments.

J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

The power of primes: security of authentication based on a universal hash-function family.

J. Math. Cryptol., 2010

Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Proceedings of the Global Communications Conference, 2010

2006

Elements of an Interface Standard for Knowledge Sources in Knowledge-Based Engineering.

J. Comput. Inf. Sci. Eng., 2006

2005

Optimizing Web delivery over wireless links: design, implementation, and experiences.

IEEE J. Sel. Areas Commun., 2005

2003

Proceedings of the First International Conference on Mobile Systems, 2003

1997

Int. J. Law Inf. Technol., 1997