{"id":"https://openalex.org/W4310902674","doi":"https://doi.org/10.1109/itw54588.2022.9965869","title":"Covertly Controlling a Linear System","display_name":"Covertly Controlling a Linear System","publication_year":2022,"publication_date":"2022-11-01","ids":{"openalex":"https://openalex.org/W4310902674","doi":"https://doi.org/10.1109/itw54588.2022.9965869"},"language":"en","primary_location":{"id":"doi:10.1109/itw54588.2022.9965869","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw54588.2022.9965869","pdf_url":null,"source":{"id":"https://openalex.org/S4363606450","display_name":"2022 IEEE Information Theory Workshop (ITW)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039614211","display_name":"Barak Amihood","orcid":"https://orcid.org/0000-0002-8386-1548"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Barak Amihood","raw_affiliation_strings":["Ben-Gurion University of the Negev,The School of Electrical and Computer Engineering,Beer-Sheva,Israel","The School of Electrical and Computer Engineering, Ben-Gurion University of the Negev, Beer-Sheva, Israel"],"affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev,The School of Electrical and Computer Engineering,Beer-Sheva,Israel","institution_ids":["https://openalex.org/I124227911"]},{"raw_affiliation_string":"The School of Electrical and Computer Engineering, Ben-Gurion University of the Negev, Beer-Sheva, Israel","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050033032","display_name":"Asaf Cohen","orcid":"https://orcid.org/0000-0002-9567-5793"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Asaf Cohen","raw_affiliation_strings":["Ben-Gurion University of the Negev,The School of Electrical and Computer Engineering,Beer-Sheva,Israel","The School of Electrical and Computer Engineering, Ben-Gurion University of the Negev, Beer-Sheva, Israel"],"affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev,The School of Electrical and Computer Engineering,Beer-Sheva,Israel","institution_ids":["https://openalex.org/I124227911"]},{"raw_affiliation_string":"The School of Electrical and Computer Engineering, Ben-Gurion University of the Negev, Beer-Sheva, Israel","institution_ids":["https://openalex.org/I124227911"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5039614211"],"corresponding_institution_ids":["https://openalex.org/I124227911"],"apc_list":null,"apc_paid":null,"fwci":1.7695,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86097068,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9807999730110168,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.7066682577133179},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.6513304114341736},{"id":"https://openalex.org/keywords/linear-system","display_name":"Linear system","score":0.6134898662567139},{"id":"https://openalex.org/keywords/observer","display_name":"Observer (physics)","score":0.5869383811950684},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.583834707736969},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.550709068775177},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5429967641830444},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.5149911046028137},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4771503806114197},{"id":"https://openalex.org/keywords/linear-control-systems","display_name":"Linear control systems","score":0.44356465339660645},{"id":"https://openalex.org/keywords/alice","display_name":"Alice (programming language)","score":0.4420281648635864},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.42471396923065186},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2445226013660431},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18581300973892212},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1536431610584259},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10484075546264648}],"concepts":[{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.7066682577133179},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.6513304114341736},{"id":"https://openalex.org/C6802819","wikidata":"https://www.wikidata.org/wiki/Q1072174","display_name":"Linear system","level":2,"score":0.6134898662567139},{"id":"https://openalex.org/C2780704645","wikidata":"https://www.wikidata.org/wiki/Q9251458","display_name":"Observer (physics)","level":2,"score":0.5869383811950684},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.583834707736969},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.550709068775177},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5429967641830444},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.5149911046028137},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4771503806114197},{"id":"https://openalex.org/C2987686001","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Linear control systems","level":3,"score":0.44356465339660645},{"id":"https://openalex.org/C2778222013","wikidata":"https://www.wikidata.org/wiki/Q1136926","display_name":"Alice (programming language)","level":2,"score":0.4420281648635864},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.42471396923065186},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2445226013660431},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18581300973892212},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1536431610584259},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10484075546264648},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itw54588.2022.9965869","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw54588.2022.9965869","pdf_url":null,"source":{"id":"https://openalex.org/S4363606450","display_name":"2022 IEEE Information Theory Workshop (ITW)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W135467536","https://openalex.org/W581334404","https://openalex.org/W1536023576","https://openalex.org/W1559751367","https://openalex.org/W1897081267","https://openalex.org/W1975181717","https://openalex.org/W1980201978","https://openalex.org/W2000226542","https://openalex.org/W2022381648","https://openalex.org/W2052267390","https://openalex.org/W2060500262","https://openalex.org/W2084796966","https://openalex.org/W2098346479","https://openalex.org/W2166828385","https://openalex.org/W2295172321","https://openalex.org/W2400117891","https://openalex.org/W2402911760","https://openalex.org/W2408848108","https://openalex.org/W2478624307","https://openalex.org/W2530103553","https://openalex.org/W2555431798","https://openalex.org/W2613841561","https://openalex.org/W2783055168","https://openalex.org/W2793580536","https://openalex.org/W2810713150","https://openalex.org/W2883287107","https://openalex.org/W2889042096","https://openalex.org/W2918065873","https://openalex.org/W2964303506","https://openalex.org/W3010831766","https://openalex.org/W3103270291","https://openalex.org/W4206107164","https://openalex.org/W4253000688","https://openalex.org/W4310902674","https://openalex.org/W6645235741","https://openalex.org/W6747814159","https://openalex.org/W6816148063"],"related_works":["https://openalex.org/W2409612194","https://openalex.org/W4224042389","https://openalex.org/W20460883","https://openalex.org/W174282171","https://openalex.org/W789579324","https://openalex.org/W1587013156","https://openalex.org/W2047558453","https://openalex.org/W4239080508","https://openalex.org/W4386075149","https://openalex.org/W2326198059"],"abstract_inverted_index":{"Consider":[0],"the":[1,19,34,44,47,54,67,95,137,144,155,163,173,179,186,193],"problem":[2],"of":[3,97,175,188],"covertly":[4,82,92,98],"controlling":[5],"a":[6,22,71,113,128],"linear":[7,23,77,88],"system.":[8],"In":[9],"this":[10,191],"problem,":[11,45],"Alice":[12,117,132],"desires":[13],"to":[14,31,120,135],"control":[15,159,181],"(stabilize":[16],"or":[17,40],"change":[18],"parameters":[20],"of)":[21],"system,":[24],"while":[25],"keeping":[26],"an":[27,74,85,166],"observer,":[28],"Willie,":[29],"unable":[30],"decide":[32],"if":[33],"system":[35,78,89],"is":[36,118,133,146,157,192],"indeed":[37],"being":[38],"controlled":[39],"not.We":[41],"formally":[42,196],"define":[43],"under":[46],"model":[48],"when":[49,64],"Willie":[50,65],"can":[51,79,90],"only":[52,122],"observe":[53],"system\u2019s":[55,68],"output.":[56,139],"Focusing":[57],"on":[58],"AR(1)":[59],"systems,":[60],"we":[61,103],"show":[62],"that":[63],"observes":[66],"output":[69],"through":[70],"clean":[72],"channel,":[73],"inherently":[75,86],"unstable":[76],"not":[80],"be":[81,91],"stabilized.":[83],"However,":[84],"stable":[87],"controlled,":[93],"in":[94,152,170],"sense":[96],"changing":[99],"its":[100],"parameter.":[101],"Moreover,":[102],"give":[104],"positive":[105],"and":[106,127,149,151,160,183],"negative":[107],"results":[108,164],"for":[109],"two":[110],"important":[111],"controllers:":[112],"minimal-information":[114],"controller,":[115,130,180],"where":[116,131,143],"allowed":[119,134],"use":[121],"1":[123],"bit":[124],"per":[125],"sample,":[126],"maximal-information":[129],"view":[136],"real-valued":[138],"Unlike":[140],"covert":[141,171,198],"communication,":[142],"trade-off":[145,156],"between":[147,158],"rate":[148],"covertness;":[150],"cyber-physical":[153],"systems":[154],"attack":[161],"detection,":[162],"reveal":[165],"interesting":[167],"three\u2013fold":[168],"trade\u2013off":[169],"control:":[172],"amount":[174],"information":[176],"used":[177],"by":[178],"performance":[182],"covertness.":[184],"To":[185],"best":[187],"our":[189],"knowledge,":[190],"first":[194],"study":[195],"defining":[197],"control.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
