Bruno Sinopoli

Orcid: 0000-0001-5778-4879

According to our database1, Bruno Sinopoli authored at least 183 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Robust-to-Early Termination Model Predictive Control.
IEEE Trans. Autom. Control., April, 2024

Toward Safe and Efficient Human-Robot Interaction via Behavior-Driven Danger Signaling.
IEEE Trans. Control. Syst. Technol., January, 2024

2023
CANE: A Cascade Control Approach for Network-Assisted Video QoE Management.
IEEE Trans. Control. Syst. Technol., November, 2023

A Supervisor-Based Control Architecture for Constrained Cyber-Physical Systems Subject to Network Attacks.
IEEE Trans. Control. Netw. Syst., September, 2023

Software Rejuvenation for Safe Operation of Cyber-Physical Systems in the Presence of Run-Time Cyberattacks.
IEEE Trans. Control. Syst. Technol., July, 2023

A multidisciplinary detection system for cyber attacks on Powertrain Cyber Physical Systems.
Future Gener. Comput. Syst., July, 2023

Optimal Active Fault Detection in Inverter-Based Grids.
IEEE Trans. Control. Syst. Technol., May, 2023

Runtime System Support for CPS Software Rejuvenation.
IEEE Trans. Emerg. Top. Comput., 2023

MPC-Based Emergency Vehicle-Centered Multi-Intersection Traffic Control.
IEEE Trans. Control. Syst. Technol., 2023

Beyond PCA: A Probabilistic Gram-Schmidt Approach to Feature Extraction.
CoRR, 2023

Towards Hyperparameter-Agnostic DNN Training via Dynamical System Insights.
CoRR, 2023

An Equivalent Circuit Workflow for Unconstrained Optimization.
CoRR, 2023

Model-Free Learning and Optimal Policy Design in Multi-Agent MDPs Under Probabilistic Agent Dropout.
CoRR, 2023

Corrected: On Confident Policy Evaluation for Factored Markov Decision Processes with Node Dropouts.
CoRR, 2023

Maximizing Reachability in Factored MDPs via Near-Optimal Clustering with Applications to Control of Multi-Agent Systems.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

Inferring Dynamics of Discrete-time, Fractional-Order Control-affine Nonlinear Systems.
Proceedings of the American Control Conference, 2023

2022
ROTEC: Robust to early termination command governor for systems with limited computing capacity.
Syst. Control. Lett., 2022

A Linear Programming Approach to Computing Safe Sets for Software Rejuvenation.
IEEE Control. Syst. Lett., 2022

ECCO: Equivalent Circuit Controlled Optimization.
CoRR, 2022

Reducing Attack Opportunities Through Decentralized Event-Triggered Control.
CoRR, 2022

Cluster-Based Control of Transition-Independent MDPs.
CoRR, 2022

Ensuring Resilience Against Stealthy Attacks on Cyber-Physical Systems.
CoRR, 2022

Exploring the consequences of cyber attacks on Powertrain Cyber Physical Systems.
CoRR, 2022

Reference Governor-based fault-tolerant constrained control.
Autom., 2022

Stochastic Multi-Armed Bandits with Non-Stationary Rewards Generated by a Linear Dynamical System.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

On Confident Policy Evaluation for Factored Markov Decision Processes with Node Dropouts.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

Identifying Impactful Agents Via Faux Adversarial Games.
Proceedings of the 58th Annual Allerton Conference on Communication, 2022

2021
A Moving Target Defense for Securing Cyber-Physical Systems.
IEEE Trans. Autom. Control., 2021

Strategic sensor placement on graphs.
Syst. Control. Lett., 2021

Physical watermarking for replay attack detection in continuous-time systems.
Eur. J. Control, 2021

Assessing Risks and Modeling Threats in the Internet of Things.
CoRR, 2021

Reducing Attack Vulnerabilities Through Decentralized Event-Triggered Control.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

Resilient Control in the Presence of Man-in-the-Middle Attacks.
Proceedings of the 2021 American Control Conference, 2021

Efficient Solutions for Targeted Control of Multi-Agent MDPs.
Proceedings of the 2021 American Control Conference, 2021

Active Attack Detection and Control in Constrained Cyber-Physical Systems Under Prevented Actuation Attack.
Proceedings of the 2021 American Control Conference, 2021

2020
Distributed Linear Estimation Via a Roaming Token.
IEEE Trans. Signal Process., 2020

Exploring Edge Computing for Multitier Industrial Control.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

Decentralized Event-Triggered Control in the Presence of Adversaries.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

An Explicit Reference Governor for Time-Varying Linear Constraints.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

Constrained Control of Semilinear Fractional-Order Systems: Application in Drug Delivery Systems.
Proceedings of the 2020 IEEE Conference on Control Technology and Applications, 2020

Robust Software Rejuvenation for CPS with State Estimation and Disturbances.
Proceedings of the 2020 American Control Conference, 2020

Secure Networked Control for Decentralized Systems via Software Rejuvenation.
Proceedings of the 2020 American Control Conference, 2020

LQ non-Gaussian Control with I/O packet losses.
Proceedings of the 2020 American Control Conference, 2020

2019
Resilient Control in Cyber-Physical Systems: Countering Uncertainty, Constraints, and Adversarial Behavior.
Found. Trends Syst. Control., 2019

The Design of UDOO Boards: Contributing to the Appropriation of Digital Technology.
Frontiers ICT, 2019

LQ Non-Gaussian Regulator With Markovian Control.
IEEE Control. Syst. Lett., 2019

Efficient Beacon Placement Algorithms for Time-of-Flight Indoor Localization.
Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2019

Safety and Liveness of Software Rejuvenation for Secure Tracking Control.
Proceedings of the 17th European Control Conference, 2019

Optimizing Robustness against Cascading Failures under Max-Load Targeted Attack.
Proceedings of the 17th European Control Conference, 2019

A Tutorial on Detecting Security Attacks on Cyber-Physical Systems.
Proceedings of the 17th European Control Conference, 2019

Control of Parametric Games.
Proceedings of the 17th European Control Conference, 2019

Attack Resilient Interconnected Second Order Systems: A Game-Theoretic Approach.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

Secure Networked Control via Software Rejuvenation.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

A Model Inversion Based Watermark for Replay Attack Detection with Output Tracking.
Proceedings of the 2019 American Control Conference, 2019

Design of Software Rejuvenation for CPS Security Using Invariant Sets.
Proceedings of the 2019 American Control Conference, 2019

An Optimal Design of a Moving Target Defense for Attack Detection in Control Systems.
Proceedings of the 2019 American Control Conference, 2019

Learning Transition Statistics in Networks of Interacting Agents.
Proceedings of the 57th Annual Allerton Conference on Communication, 2019

Feasibility and Detection of Replay Attack in Networked Constrained Cyber-Physical Systems.
Proceedings of the 57th Annual Allerton Conference on Communication, 2019

2018
Distributed Joint Attack Detection and Secure State Estimation.
IEEE Trans. Signal Inf. Process. over Networks, 2018

Software Rejuvenation for Secure Tracking Control.
CoRR, 2018

Distributed Estimation Via a Roaming Token.
CoRR, 2018

Enhancing indoor smartphone location acquisition using floor plans.
Proceedings of the 17th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2018

The future of IoT security: special session.
Proceedings of the International Conference on Embedded Software, 2018

On Partial Observability of Large Scale Linear Systems: A Structured Systems Approach.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Modeling Dynamical Phenomena in the Era of Big Data.
Proceedings of the Principles of Modeling, 2018

2017
A Graph-Theoretic Characterization of Perfect Attackability for Secure Design of Distributed Control Systems.
IEEE Trans. Control. Netw. Syst., 2017

Guest Editorial Special Issue on Secure Control of Cyber-Physical Systems.
IEEE Trans. Control. Netw. Syst., 2017

Optimal Threshold Policies for Robust Data Center Control.
CoRR, 2017

Cyber Meets Control: A Novel Federated Approach for Resilient CPS Leveraging Real Cyber Threat Intelligence.
IEEE Commun. Mag., 2017

Physical watermarking for securing cyber physical systems via packet drop injections.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

Biases in Data-Driven Networking, and What to Do About Them.
Proceedings of the 16th ACM Workshop on Hot Topics in Networks, Palo Alto, CA, USA, 2017

Sequential source localization on graphs: A case study of cholera outbreak.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

Robust structural analysis and design of distributed control systems to prevent zero dynamics attacks.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

Worst-case analysis of joint attack detection and resilient state estimation.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

Active detection for exposing intelligent attacks in control systems.
Proceedings of the IEEE Conference on Control Technology and Applications, 2017

On the efficiency and fairness of multiplayer HTTP-based adaptive video streaming.
Proceedings of the 2017 American Control Conference, 2017

Using Viterbi and Kalman to detect topological changes in dynamic networks.
Proceedings of the 2017 American Control Conference, 2017

A Bernoulli-Gaussian physical watermark for detecting integrity attacks in control systems.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

Inferring link changes in dynamic networks through power spectral density variations.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

2016
Distributed Inference Over Directed Networks: Performance Limits and Optimal Design.
IEEE Trans. Signal Process., 2016

Extending the metric dimension to graphs with missing edges.
Theor. Comput. Sci., 2016

Multi-Sensor Scheduling for State Estimation With Event-Based, Stochastic Triggers.
IEEE Trans. Autom. Control., 2016

On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks.
IEEE Trans. Autom. Control., 2016

Networked Constrained Cyber-Physical Systems subject to malicious attacks: a resilient set-theoretic control approach.
CoRR, 2016

Joint attack detection and secure state estimation of cyber-physical systems.
CoRR, 2016

CS2P: Improving Video Bitrate Selection and Adaptation with Data-Driven Throughput Prediction.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Beacon placement for range-based indoor localization.
Proceedings of the International Conference on Indoor Positioning and Indoor Navigation, 2016

A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks.
Proceedings of the 2016 Science of Security for Cyber-Physical Systems Workshop, 2016

Accountability in cyber-physical systems.
Proceedings of the 2016 Science of Security for Cyber-Physical Systems Workshop, 2016

Information flow for security in control systems.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

Sensor placement for reliable observability: a structured systems approach.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

A Bayesian approach to joint attack detection and resilient state estimation.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

A graph theoretic characterization of perfect attackability and detection in Distributed Control Systems.
Proceedings of the 2016 American Control Conference, 2016

A moving target approach for identifying malicious sensors in control systems.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

2015
Secure Estimation in the Presence of Integrity Attacks.
IEEE Trans. Autom. Control., 2015

Stochastic Event-Triggered Sensor Schedule for Remote State Estimation.
IEEE Trans. Autom. Control., 2015

Analyzing TCP Throughput Stability and Predictability with Implications for Adaptive Video Streaming.
CoRR, 2015

Minimum Sensor Placement for Robust Observability of Structured Complex Networks.
CoRR, 2015

Is your commute driving you crazy?: a study of misbehavior in vehicular platoons.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

A Control-Theoretic Approach for Dynamic Adaptive Video Streaming over HTTP.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Demo: ALPS - The Acoustic Location Processing System.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

ALPS: A Bluetooth and Ultrasound Platform for Mapping and Localization.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Ultrasonic time synchronization and ranging on smartphones.
Proceedings of the 21st IEEE Real-Time and Embedded Technology and Applications Symposium, 2015

Selecting observers for source localization via error exponents.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Toward design of risk-based real-time dispatch at value.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

Sequential observer selection for source localization.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

Detecting integrity attacks on control systems using a moving target approach.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Secure detection with correlated binary sensors.
Proceedings of the American Control Conference, 2015

2014
Resilient Detection in the Presence of Integrity Attacks.
IEEE Trans. Signal Process., 2014

Detecting Integrity Attacks on SCADA Systems.
IEEE Trans. Control. Syst. Technol., 2014

Detection in Adversarial Environments.
IEEE Trans. Autom. Control., 2014

On infinite-horizon sensor scheduling.
Syst. Control. Lett., 2014

Toward a Principled Framework to Design Dynamic Adaptive Streaming Algorithms over HTTP.
Proceedings of the 13th ACM Workshop on Hot Topics in Networks, 2014

Network observability for source localization in graphs with unobserved edges.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

Network observability and localization of sources of diffusion in tree networks with missing edges.
Proceedings of the 22nd European Signal Processing Conference, 2014

Modeling impact of attacks, recovery, and attackability conditions for situational awareness.
Proceedings of the IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2014

Adaptive robust optimization for coordinated capacity and load control in data centers.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

Detecting integrity attacks on control systems using robust physical watermarking.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

2013
Consensus and Products of Random Stochastic Matrices: Exact Rate for Convergence in Probability.
IEEE Trans. Signal Process., 2013

LQG control with Markovian packet loss.
Proceedings of the 12th European Control Conference, 2013

Robust estimation in the presence of integrity attacks.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

Stochastic event-triggered sensor scheduling for remote state estimation.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

Performance analysis of linear estimators with unknown changes in sensors characteristics.
Proceedings of the American Control Conference, 2013

Network observability and localization of the source of diffusion based on a subset of nodes.
Proceedings of the 51st Annual Allerton Conference on Communication, 2013

2012
Large Deviations Performance of Consensus+Innovations Distributed Detection With Non-Gaussian Observations.
IEEE Trans. Signal Process., 2012

Kalman Filtering With Intermittent Observations: Tail Distribution and Critical Value.
IEEE Trans. Autom. Control., 2012

Kalman Filtering With Intermittent Observations: Weak Convergence to a Stationary Distribution.
IEEE Trans. Autom. Control., 2012

On Optimal Partial Broadcasting of Wireless Sensor Networks for Kalman Filtering.
IEEE Trans. Autom. Control., 2012

LQG Control for MIMO Systems Over Multiple Erasure Channels With Perfect Acknowledgment.
IEEE Trans. Autom. Control., 2012

A Cyber-Physical Systems Approach to Data Center Modeling and Control for Energy Efficiency.
Proc. IEEE, 2012

Cyber-Physical Security of a Smart Grid Infrastructure.
Proc. IEEE, 2012

Integrity attacks on cyber-physical systems.
Proceedings of the 1st International Conference on High Confidence Networked Systems (HiCoNS, 2012

Collaborative diffusive source localization in wireless sensor networks.
Proceedings of the 20th European Signal Processing Conference, 2012

Adversarial detection as a zero-sum game.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

Infinite-horizon sensor scheduling for estimation over lossy networks.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

Exact rate for convergence in probability of averaging processes via generalized min-cut.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

Robust detection in the presence of integrity attacks.
Proceedings of the American Control Conference, 2012

Stochastic sensor scheduling in Wireless Sensor Networks with general graph topology.
Proceedings of the American Control Conference, 2012

Products of stochastic matrices: Large deviation rate for Markov chain temporal dependencies.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Sensor Selection for Event Detection in Wireless Sensor Networks.
IEEE Trans. Signal Process., 2011

Distributed Detection via Gaussian Running Consensus: Large Deviations Asymptotic Analysis.
IEEE Trans. Signal Process., 2011

Integrity Data Attacks in Power Market Operations.
IEEE Trans. Smart Grid, 2011

Stochastic Sensor Scheduling for Energy Constrained Estimation in Multi-Hop Wireless Sensor Networks.
IEEE Trans. Autom. Control., 2011

Sensor scheduling over a packet-delaying network.
Autom., 2011

Sensor selection strategies for state estimation in energy constrained wireless sensor networks.
Autom., 2011

Nonlinear estimation using Mean Field Games.
Proceedings of the 5th International Conference on NETwork Games, COntrol and OPtimization, 2011

Asymptotic performance of distributed detection over random networks.
Proceedings of the IEEE International Conference on Acoustics, 2011

Unsupervised learning of finite mixture models using mean field games.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

Large deviations analysis of consensus+innovations detection in random networks.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

Collaborative sequential-based detection in wireless sensor networks.
Proceedings of the Conference Record of the Forty Fifth Asilomar Conference on Signals, 2011

2010
Distributed Detection over Random Networks: Large Deviations Performance Analysis
CoRR, 2010

A cyber-physical systems approach to energy management in data centers.
Proceedings of the ACM/IEEE 1st International Conference on Cyber-Physical Systems, 2010

A hierarchical approach to energy management in data centers.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

False data injection attacks against state estimation in wireless sensor networks.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

Sensor scheduling for energy constrained estimation in multi-hop Wireless Sensor Networks.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

Dynamic power allocation in server farms: A Real Time Optimization approach.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

Nonlinear modeling of butterfly valves and flow rate control using the Circle Criterion Bode plot.
Proceedings of the American Control Conference, 2010

A random dynamical systems approach to filtering in large-scale networks.
Proceedings of the American Control Conference, 2010

Distributed detection over time varying networks: Large deviations analysis.
Proceedings of the 48th Annual Allerton Conference on Communication, 2010

2009
Multiple Source Detection and Localization in Advection-Diffusion Processes Using Wireless Sensor Networks.
Proceedings of the 30th IEEE Real-Time Systems Symposium, 2009

Sensor selection for hypothesis testing in wireless sensor networks: a Kullback-Leibler based approach.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

Secure control against replay attacks.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

A convex optimization approach of multi-step sensor selection under correlated noise.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

Robust linear dimensionality reduction for hypothesis testing with application to sensor selection.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

2008
A testbed for secure and robust SCADA systems.
SIGBED Rev., 2008

A Relaxation Approach to Dynamic Sensor Selection in Large-Scale Wireless Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

A characterization of the critical value for Kalman filtering with intermittent observations.
Proceedings of the 47th IEEE Conference on Decision and Control, 2008

LQG control over lossy TCP-like networks with probabilistic packet acknowledgements.
Proceedings of the 47th IEEE Conference on Decision and Control, 2008

Distributed sensor localization in Euclidean spaces: Dynamic environments.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

Optimal sensor density for remote estimation over Wireless Sensor Networks.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

2007
Foundations of Control and Estimation Over Lossy Networks.
Proc. IEEE, 2007

LQG control for distributed systems over TCP-like erasure channels.
Proceedings of the 46th IEEE Conference on Decision and Control, 2007

Estimation over Wireless Sensor Networks.
Proceedings of the American Control Conference, 2007

Optimal Sensing Rate for Estimation over Shared Communication Links.
Proceedings of the American Control Conference, 2007

Effective Sensor Scheduling Schemes in a Sensor Network by Employing Feedback in the Communication Loop.
Proceedings of the IEEE International Conference on Control Applications, 2007

2006
Optimal Linear LQG Control Over Lossy Networks Without Packet Acknowledgment.
Proceedings of the 45th IEEE Conference on Decision and Control, 2006

2005
A kernel-based learning approach to ad hoc sensor network localization.
ACM Trans. Sens. Networks, 2005

An LQG Optimal Linear Controller for Control Systems with Packet Losses.
Proceedings of the 44th IEEE IEEE Conference on Decision and Control and 8th European Control Conference Control, 2005

Optimal control with unreliable communication: the TCP case.
Proceedings of the American Control Conference, 2005

2004
Kalman filtering with intermittent observations.
IEEE Trans. Autom. Control., 2004

Time varying optimal control with packet losses.
Proceedings of the 43rd IEEE Conference on Decision and Control, 2004

2003
Distributed control applications within sensor networks.
Proc. IEEE, 2003

2001
Vision Based Navigation for an Unmanned Aerial Vehicle.
Proceedings of the 2001 IEEE International Conference on Robotics and Automation, 2001


  Loading...