1 code implementation • 22 Apr 2024 • Yu-Xin Zhang, Jie Gui, Xiaofeng Cong, Xin Gong, Wenbing Tao
Point cloud registration (PCR) involves determining a rigid transformation that aligns one point cloud to another.
no code implementations • 22 Mar 2023 • Xin Gong, Yiwen Liang, Yukang Cui, Shi Liang, TingWen Huang
Inspired by the concept of Digital Twin, a new hierarchical protocol equipped with a virtual twin layer (TL) is proposed, which decouples the above problems into the defense scheme against Byzantine edge attacks on the TL and the defense scheme against Byzantine node attacks on the cyber-physical layer (CPL).
no code implementations • 22 Mar 2023 • Xin Gong, Jintao Peng, Dong Yang, Zhan Shu, TingWen Huang, Yukang Cui
Consequently, the resilient control task against CAs can be divided into two parts: One is distributed estimation against DoS attacks on the TL and the other is resilient decentralized tracking control against actuation attacks on the CPL.
no code implementations • 22 Mar 2023 • Yukang Cui, Xinru Yang, TingWen Huang, Xin Gong
In this paper, the problem of seeking optimal distributed resource allocation (DRA) policies on cellular networks in the presence of an unknown malicious adding-edge attacker is investigated.
no code implementations • 22 Mar 2023 • Yukang Cui, Lingbo Cao, Michael V. Basin, Jun Shen, TingWen Huang, Xin Gong
Third, according to the reconstructed leader dynamics, we design decentralized solvers that calculate the output regulator equations on CPL.
no code implementations • 23 Feb 2021 • Jiayi He, Xin Gong, Yukang Cui, TingWen Huang
The UAV is equipped with two sensors, a GPS sensor, which is vulnerable to the spoofing attacker, and a well-functioning Ultra-Wideband (UWB) sensor, which is possible to be fooled.
Robotics