Name
Affiliation
Papers
YILIN MO
Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213-3890, USA
63
Collaborators
Citations 
PageRank 
66
891
51.51
Referers 
Referees 
References 
1744
522
389
Search Limit
1001000
Title
Citations
PageRank
Year
Joint Sensor and Actuator Placement for Infinite-Horizon LQG Control10.352022
Resilient multi-dimensional consensus in adversarial environment00.342022
Fundamental Identification Limit of Single-Input and Single-Output Linear Time-Invariant Systems00.342022
Local Decomposition of Kalman Filters and its Application for Secure State Estimation00.342021
The Vulnerability of Cyber-Physical System Under Stealthy Attacks20.372021
Asynchronous Stochastic Gradient Descent over Decentralized Datasets00.342020
Resilient Vector Consensus: An Event-Based Approach00.342020
On the Performance Analysis of Reset Attack in Cyber-Physical Systems20.372020
Remote State Estimation With Stochastic Event-Triggered Sensor Schedule and Packet Drops30.372020
Whittle Index Policy for Dynamic Multichannel Allocation in Remote State Estimation40.402020
Secure State Estimation With Byzantine Sensors: A Probabilistic Approach30.382020
Distributed Consensus Over Markovian Packet Loss Channels10.362020
An Online Approach to Physical Watermark Design20.362020
A Tutorial on Detecting Security Attacks on Cyber-Physical Systems.00.342019
Secure State Estimation with Byzantine Sensors: A Probabilistic Approach.00.342019
Resilient Control in Cyber-Physical Systems: Countering Uncertainty, Constraints, and Adversarial Behavior.00.342019
Secure Pose Estimation For Autonomous Vehicles Under Cyber Attacks00.342019
Secure Detection: Performance Metric and Sensor Deployment Strategy.00.342018
Multiple Hypothesis Testing In Adversarial Environments: A Game-Theoretic Approach00.342018
Attack-Resilient ℋ, ℋ, and ℓ State Estimator.90.622018
An On-line Design of Physical Watermarks00.342018
Binary Hypothesis Testing With Byzantine Sensors: Fundamental Tradeoff Between Security and Efficiency.10.372018
Security Analysis Of Continuous-Time Cyber-Physical System Against Sensor Attacks00.342017
On Stochastic Sensor Network Scheduling for Multiple Processes.30.372017
Secure Detection: Efficiency Versus Security.00.342017
Mean Square Stabilization of Linear Discrete-Time Systems Over Power-Constrained Fading Channels.100.642017
Sequential detection in adversarial environment00.342017
Towards A Unified Resilience Analysis: State Estimation Against Integrity Attacks10.352016
An Opportunistic Sensor Scheduling Solution to Remote State Estimation Over Multiple Channels.00.342016
Secure Dynamic State Estimation Via Local Estimators10.342016
Robust State Estimation against Sparse Integrity Attacks.10.362016
Stochastic Sensor Scheduling For Multiple Dynamical Processes Over A Shared Channel00.342016
On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks.581.632016
Multi-Sensor Scheduling for State Estimation with Event-Based, Stochastic Triggers.140.652015
Convex Optimization Based State Estimation against Sparse Integrity Attacks40.422015
Secure Estimation in the Presence of Integrity Attacks80.482015
Privacy preserving average consensus260.852014
Detecting integrity attacks on control systems using robust physical watermarking211.062014
Resilient Detection in the Presence of Integrity Attacks.00.342014
Stochastic event-triggered sensor scheduling for remote state estimation601.762014
Modeling impact of attacks, recovery, and attackability conditions for situational awareness20.402014
Optimal DoS attacks on Bayesian quickest change detection30.462014
On infinite-horizon sensor scheduling.100.742014
Detection in Adversarial Environments40.492014
Detecting Integrity Attacks on SCADA Systems170.982014
LQG control with Markovian packet loss90.492013
LQG control with Markovian packet loss90.492013
Stochastic online sensor scheduler for remote state estimation00.342013
Kalman Filtering With Intermittent Observations: Tail Distribution and Critical Value441.522012
Adversarial detection as a zero-sum game30.412012
  • 1
  • 2