{"id":"https://openalex.org/W1975136414","doi":"https://doi.org/10.1109/acc.2012.6315697","title":"One-shot control over an AVC-like adversarial channel","display_name":"One-shot control over an AVC-like adversarial channel","publication_year":2012,"publication_date":"2012-06-01","ids":{"openalex":"https://openalex.org/W1975136414","doi":"https://doi.org/10.1109/acc.2012.6315697","mag":"1975136414"},"language":"en","primary_location":{"id":"doi:10.1109/acc.2012.6315697","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acc.2012.6315697","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 American Control Conference (ACC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053297501","display_name":"C\u00e9dric Langbort","orcid":null},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"C. Langbort","raw_affiliation_strings":["Department of AeroSpace Engineering, University of Illinois, Urbana Champaign, USA","[Department of Aerospace Engineering, University of Illinois at Urbana-Champaign]"],"affiliations":[{"raw_affiliation_string":"Department of AeroSpace Engineering, University of Illinois, Urbana Champaign, USA","institution_ids":["https://openalex.org/I157725225"]},{"raw_affiliation_string":"[Department of Aerospace Engineering, University of Illinois at Urbana-Champaign]","institution_ids":["https://openalex.org/I157725225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109088249","display_name":"Valery Ugrinovskii","orcid":null},"institutions":[{"id":"https://openalex.org/I40053085","display_name":"Australian Defence Force Academy","ror":"https://ror.org/02j5s7g39","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571","https://openalex.org/I40053085","https://openalex.org/I4394709116"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"V. Ugrinovskii","raw_affiliation_strings":["School of Engineering and IT, University of New South Wales, Australian Defence Force Academy, Canberra, ACT, Australia","School of Engineering and IT, University of NSW at the Australian Defence Force Academy, Canberra, ACT, 2600, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and IT, University of New South Wales, Australian Defence Force Academy, Canberra, ACT, Australia","institution_ids":["https://openalex.org/I40053085","https://openalex.org/I31746571"]},{"raw_affiliation_string":"School of Engineering and IT, University of NSW at the Australian Defence Force Academy, Canberra, ACT, 2600, Australia","institution_ids":["https://openalex.org/I40053085"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5053297501"],"corresponding_institution_ids":["https://openalex.org/I157725225"],"apc_list":null,"apc_paid":null,"fwci":2.21122905,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.88389036,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"3528","last_page":"3533"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10046","display_name":"Stability and Control of Uncertain Systems","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10046","display_name":"Stability and Control of Uncertain Systems","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9753000140190125,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9749000072479248,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.676496148109436},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6608844995498657},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6181356906890869},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5683051347732544},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.551013708114624},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.4882502853870392},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.45355257391929626},{"id":"https://openalex.org/keywords/saddle-point","display_name":"Saddle point","score":0.450596421957016},{"id":"https://openalex.org/keywords/control-channel","display_name":"Control channel","score":0.4444964826107025},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.43407681584358215},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.4280813932418823},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.39605289697647095},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3368632197380066},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2667829692363739},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21056696772575378},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14341658353805542},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.11747777462005615}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.676496148109436},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6608844995498657},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6181356906890869},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5683051347732544},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.551013708114624},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.4882502853870392},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.45355257391929626},{"id":"https://openalex.org/C2681867","wikidata":"https://www.wikidata.org/wiki/Q690935","display_name":"Saddle point","level":2,"score":0.450596421957016},{"id":"https://openalex.org/C157607044","wikidata":"https://www.wikidata.org/wiki/Q5165851","display_name":"Control channel","level":3,"score":0.4444964826107025},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.43407681584358215},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.4280813932418823},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.39605289697647095},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3368632197380066},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2667829692363739},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21056696772575378},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14341658353805542},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.11747777462005615},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acc.2012.6315697","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acc.2012.6315697","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 American Control Conference (ACC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1554496325","https://openalex.org/W1571323288","https://openalex.org/W1578630563","https://openalex.org/W1977587316","https://openalex.org/W2015204845","https://openalex.org/W2022406843","https://openalex.org/W2053836930","https://openalex.org/W2065169455","https://openalex.org/W2098689083","https://openalex.org/W2114456964","https://openalex.org/W2142044905","https://openalex.org/W2147341361","https://openalex.org/W2156216606","https://openalex.org/W6634190070"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W1964724501"],"abstract_inverted_index":{"We":[0,106,131],"consider":[1],"a":[2,8,17,25,100,120,149,162],"one":[3],"step":[4],"control":[5,73,90,140],"problem":[6],"over":[7,141],"malicious":[9],"packet-dropping":[10],"link.":[11],"The":[12],"link":[13],"is":[14,83],"modeled":[15],"as":[16,99],"set":[18],"of":[19,23,47,57,70,72,139,151,169],"binary":[20],"channels":[21],"out":[22],"which":[24],"jammer":[26,82,113,145],"strategically":[27],"chooses":[28],"the":[29,55,68,81,89,108,144,152,166],"most":[30],"damaging":[31],"option":[32],"based":[33],"on":[34],"its":[35,124],"information":[36],"set,":[37],"and":[38,114,122],"subject":[39],"to":[40,77,87,94,136,159],"switching":[41],"costs":[42],"and/or":[43],"constraints.":[44],"This":[45],"model":[46],"an":[48],"adversarial":[49,142],"channel":[50],"bears":[51],"some":[52],"resemblance":[53],"with":[54],"framework":[56],"Arbitrarily":[58],"Varying":[59],"Channels":[60],"(AVC)":[61],"studied":[62],"in":[63,67,128,134,148,161],"Information":[64],"Theory":[65],"and,":[66],"context":[69],"security":[71],"systems,":[74],"allows":[75],"us":[76],"capture":[78],"scenarios":[79],"where":[80],"not":[84],"only":[85],"trying":[86],"disrupt":[88],"task,":[91],"but":[92,103],"also":[93],"remain":[95],"undetected,":[96],"by":[97],"\"masquerading\"":[98],"legitimate":[101],"non-malicious":[102],"imperfect":[104],"channel.":[105],"study":[107],"resulting":[109],"zero-sum":[110],"game":[111],"between":[112],"controller,":[115],"prove":[116],"that":[117,164],"it":[118],"admits":[119],"value,":[121],"compute":[123],"unique":[125],"saddle-point":[126],"equilibrium":[127],"mixed":[129],"strategies.":[130],"show":[132],"that,":[133],"contrast":[135],"previous":[137],"models":[138],"channels,":[143],"does":[146],"randomize":[147],"region":[150],"plant's":[153],"state":[154],"space,":[155],"thus":[156],"being":[157],"forced":[158],"act":[160],"way":[163],"matches":[165],"controller's":[167],"expectations":[168],"stochastic":[170],"packet":[171],"drops.":[172]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
