Andrew Clark

According to our database1, Andrew Clark authored at least 90 papers between 2003 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Sensor Placement for Optimal Control of Infinite-Dimensional Systems.
IEEE Trans. Control. Netw. Syst., 2020

Optimal Secure Control With Linear Temporal Logic Constraints.
IEEE Trans. Autom. Control., 2020

Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach.
CoRR, 2020

Submodular Input Selection for Synchronization in Kuramoto Networks.
CoRR, 2020

Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks.
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020

FRESH: Interactive Reward Shaping in High-Dimensional State Spaces using Human Feedback.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

2019
Cyber-Physical Resilience: Definition and Assessment Metric.
IEEE Trans. Smart Grid, 2019

Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks.
IEEE Trans. Information Forensics and Security, 2019

Minimal Input and Output Selection for Stability of Systems With Uncertainties.
IEEE Trans. Autom. Control., 2019

On the Structure and Computation of Random Walk Times in Finite Graphs.
IEEE Trans. Autom. Control., 2019

Workflow Automation for Cycling Systems.
Comput. Sci. Eng., 2019

A Differentially Private Incentive Design for Traffic Offload to Public Transportation.
CoRR, 2019

Linear Temporal Logic Satisfaction in Adversarial Environments Using Secure Control Barrier Certificates.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

A Framework for Joint Attack Detection and Control Under False Data Injection.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Potential-Based Advice for Stochastic Policy Learning.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

Dynamic Information Flow Tracking Games for Simultaneous Detection of Multiple Attackers.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

Robust Maximization of Correlated Submodular Functions.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

Resilient Trajectory Planning in Adversarial Environments.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

A Submodular Optimization Approach to the Metric Traveling Salesman Problem with Neighborhoods.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching.
Proceedings of the 2019 American Control Conference, 2019

Secure Control under Partial Observability with Temporal Logic Constraints.
Proceedings of the 2019 American Control Conference, 2019

LQG Reference Tracking with Safety and Reachability Guarantees under False Data Injection Attacks.
Proceedings of the 2019 American Control Conference, 2019

Control Barrier Functions for Complete and Incomplete Information Stochastic Systems.
Proceedings of the 2019 American Control Conference, 2019

2018
Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach.
IEEE Trans. Control. Netw. Syst., 2018

Combinatorial Algorithms for Control of Biological Regulatory Networks.
IEEE Trans. Control. Netw. Syst., 2018

A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats.
CoRR, 2018

Maximizing the smallest eigenvalue of a symmetric matrix: A submodular optimization approach.
Autom., 2018

Cloaking the clock: emulating clock skew in controller area networks.
Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems, 2018

A Differentially Private and Truthful Incentive Mechanism for Traffic Offload to Public Transportation.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Multi-stage Dynamic Information Flow Tracking Game.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Minimum Violation Control Synthesis on Cyber-Physical Systems under Attacks.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Input Selection for Performance, Stabilizability, and Controllability of Structured Linear Descriptor Systems.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Modeling and Mitigating the Coremelt Attack.
Proceedings of the 2018 Annual American Control Conference, 2018

Secure Control Under Linear Temporal Logic Constraints.
Proceedings of the 2018 Annual American Control Conference, 2018

Linear Quadratic Gaussian Control Under False Data Injection Attacks.
Proceedings of the 2018 Annual American Control Conference, 2018

2017
Toward Synchronization in Networks With Nonlinear Dynamics: A Submodular Optimization Framework.
IEEE Trans. Autom. Control., 2017

Input Selection for Performance and Controllability of Structured Linear Descriptor Systems.
SIAM J. Control. Optim., 2017

A submodular optimization approach to controlled islanding under cascading failure.
Proceedings of the 8th International Conference on Cyber-Physical Systems, 2017

Minimal input selection for robust control.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017

Discrete-time fractional-order multiple scenario-based sensor selection.
Proceedings of the 2017 American Control Conference, 2017

A submodular optimization approach to leader-follower consensus in networks with negative edges.
Proceedings of the 2017 American Control Conference, 2017

2016
Submodularity in Input Node Selection for Networked Systems.
CoRR, 2016

cl-dash: rapid configuration and deployment of Hadoop clusters for bioinformatics research in the cloud.
Bioinform., 2016

An Exploration of Community and Culture Related Fire injury Risks.
Proceedings of the UKAIS 2016, 2016

A System for a Hand Gesture-Manipulated Virtual Reality Environment.
Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, 2016

Towards Scalable Voltage Control in Smart Grid: A Submodular Optimization Approach.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

MinGen: Minimal generator set selection for small signal stability in power systems: A submodular framework.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

Distributed adaptive patching strategies against malware propagation: A passivity approach.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

2015
Scalable and distributed submodular maximization with matroid constraints.
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015

Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

A host takeover game model for competing malware.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Input selection for disturbance rejection in networked cyber-physical systems.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Passivity framework for composition and mitigation of multi-virus propagation in networked systems.
Proceedings of the American Control Conference, 2015

Jamming-based adversarial control of network flow allocation: A passivity approach.
Proceedings of the American Control Conference, 2015

2014
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems.
IEEE Trans. Autom. Control., 2014

A Supermodular Optimization Framework for Leader Selection Under Link Noise in Linear Multi-Agent Systems.
IEEE Trans. Autom. Control., 2014

Minimizing Convergence Error in Multi-Agent Systems Via Leader Selection: A Supermodular Optimization Approach.
IEEE Trans. Autom. Control., 2014

Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework.
CoRR, 2014

Distributed online submodular maximization in resource-constrained networks.
Proceedings of the 12th International Symposium on Modeling and Optimization in Mobile, 2014

2013
Toward a Statistical Framework for Source Anonymity in Sensor Networks.
IEEE Trans. Mob. Comput., 2013

Ring Theory, Group Actions, Evolutionary Algorithms, and Global Optimization
CoRR, 2013

Using Social Information for Flow Allocation in MANETs.
CoRR, 2013

Modeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach.
Proceedings of the Control of Cyber-Physical Systems, 2013

Deployment and exploitation of deceptive honeybots in social networks.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

Effectiveness of IP address randomization in decoy-based moving target defense.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

An impact-aware defense against Stuxnet.
Proceedings of the American Control Conference, 2013

Joint leader and link weight selection for fast convergence in multi-agent systems.
Proceedings of the American Control Conference, 2013

2012
Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification.
IEEE Trans. Parallel Distrib. Syst., 2012

SODEXO: A System Framework for Deployment and Exploitation of Deceptive Honeybots in Social Networks
CoRR, 2012

Piecewise Linear Topology, Evolutionary Algorithms, and Optimization Problems
CoRR, 2012

Leader selection for minimizing convergence error in leader-follower systems: A supermodular optimization approach.
Proceedings of the 10th International Symposium on Modeling and Optimization in Mobile, 2012

Leader selection games under link noise injection attacks.
Proceedings of the 1st International Conference on High Confidence Networked Systems (HiCoNS, 2012

Deceptive Routing in Relay Networks.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Deceptive routing games.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

On leader selection for performance and controllability in multi-agent systems.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

Leader selection in multi-agent systems for smooth convergence via fast mixing.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

A passivity-based framework for composing attacks on networked control systems.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
HTTP Session Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Using MOEAs To Outperform Stock Benchmarks In The Presence of Typical Investment Constraints
CoRR, 2011

Maximizing Influence in Competitive Environments: A Game-Theoretic Approach.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

A submodular optimization framework for leader selection in linear multi-agent systems.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

2010
Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

The power of primes: security of authentication based on a universal hash-function family.
J. Mathematical Cryptology, 2010

A Metric for Quantifying Key Exposure Vulnerability in Wireless Sensor Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Statistical Framework for Source Anonymity in Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2005
Optimizing Web delivery over wireless links: design, implementation, and experiences.
IEEE J. Sel. Areas Commun., 2005

2003
GPRSWeb: Optimizing the Web for GPRS Links.
Proceedings of the First International Conference on Mobile Systems, 2003


  Loading...