{"id":"https://openalex.org/W4413371355","doi":"https://doi.org/10.1109/tcns.2025.3600875","title":"Distributed Detection of Adversarial Attacks for Resilient Cooperation of Multirobot Systems With Intermittent Communication","display_name":"Distributed Detection of Adversarial Attacks for Resilient Cooperation of Multirobot Systems With Intermittent Communication","publication_year":2025,"publication_date":"2025-08-20","ids":{"openalex":"https://openalex.org/W4413371355","doi":"https://doi.org/10.1109/tcns.2025.3600875"},"language":"en","primary_location":{"id":"doi:10.1109/tcns.2025.3600875","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcns.2025.3600875","pdf_url":null,"source":{"id":"https://openalex.org/S2502544478","display_name":"IEEE Transactions on Control of Network Systems","issn_l":"2325-5870","issn":["2325-5870","2372-2533"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Control of Network Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027948323","display_name":"Mohammad Bahrami","orcid":"https://orcid.org/0000-0002-7583-2229"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Rayan Bahrami","raw_affiliation_strings":["Department of Mechanical Engineering, University of Maryland, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"Department of Mechanical Engineering, University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047245404","display_name":"Hamidreza Jafarnejadsani","orcid":"https://orcid.org/0000-0002-8489-005X"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hamidreza Jafarnejadsani","raw_affiliation_strings":["Department of Mechanical Engineering, Stevens Institute of Technology, Hoboken, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Mechanical Engineering, Stevens Institute of Technology, Hoboken, NJ, USA","institution_ids":["https://openalex.org/I108468826"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027948323"],"corresponding_institution_ids":["https://openalex.org/I66946132"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32014099,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"4","first_page":"2944","last_page":"2956"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9104999899864197,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9104999899864197,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.902400016784668,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7571685910224915},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.658665657043457},{"id":"https://openalex.org/keywords/robot","display_name":"Robot","score":0.572770357131958},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4900859594345093},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4353596568107605},{"id":"https://openalex.org/keywords/mobile-robot","display_name":"Mobile robot","score":0.4143037497997284},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3149538040161133}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7571685910224915},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.658665657043457},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.572770357131958},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4900859594345093},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4353596568107605},{"id":"https://openalex.org/C19966478","wikidata":"https://www.wikidata.org/wiki/Q4810574","display_name":"Mobile robot","level":3,"score":0.4143037497997284},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3149538040161133}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcns.2025.3600875","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcns.2025.3600875","pdf_url":null,"source":{"id":"https://openalex.org/S2502544478","display_name":"IEEE Transactions on Control of Network Systems","issn_l":"2325-5870","issn":["2325-5870","2372-2533"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Control of Network Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1571323288","https://openalex.org/W1970786657","https://openalex.org/W1972523481","https://openalex.org/W1973184571","https://openalex.org/W1986486153","https://openalex.org/W2000219814","https://openalex.org/W2003530067","https://openalex.org/W2039245308","https://openalex.org/W2066367084","https://openalex.org/W2068740779","https://openalex.org/W2075933120","https://openalex.org/W2090725032","https://openalex.org/W2094664405","https://openalex.org/W2112668583","https://openalex.org/W2158254393","https://openalex.org/W2572746329","https://openalex.org/W2572839999","https://openalex.org/W2727199916","https://openalex.org/W2735167339","https://openalex.org/W2754625975","https://openalex.org/W2891073457","https://openalex.org/W2962851675","https://openalex.org/W2963079371","https://openalex.org/W2968932836","https://openalex.org/W3014429688","https://openalex.org/W3029020379","https://openalex.org/W3032475805","https://openalex.org/W3113216205","https://openalex.org/W3133605356","https://openalex.org/W3180059131","https://openalex.org/W3202962356","https://openalex.org/W4206048075","https://openalex.org/W4238591275","https://openalex.org/W4288047842","https://openalex.org/W4327718609","https://openalex.org/W4386435322"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W2122871747","https://openalex.org/W3114279067"],"abstract_inverted_index":{"This":[0],"paper":[1],"concerns":[2],"the":[3,31,60,63,77,88,115,133,137,145],"consensus":[4,102],"and":[5,37,98,103,112,121],"formation":[6,104],"of":[7,10,20,62,69,79,136],"a":[8,18,119],"network":[9,33,53],"mobile":[11],"autonomous":[12],"agents":[13,23,109],"in":[14,55,81,86],"adversarial":[15,70],"settings":[16],"where":[17],"group":[19],"malicious":[21,108,129],"(compromised)":[22],"are":[24,105,110],"subject":[25,38],"to":[26,39,66],"deception":[27],"attacks.":[28,47,71],"In":[29],"addition,":[30],"communication":[32],"is":[34,90],"arbitrarily":[35],"time-varying":[36],"intermittent":[40],"connections,":[41],"possibly":[42],"imposed":[43],"by":[44],"denial-of-service":[45],"(DoS)":[46],"We":[48,72,117],"provide":[49],"explicit":[50],"bounds":[51],"for":[52,127,132],"connectivity":[54,80],"an":[56,82],"integral":[57,83],"sense,":[58],"enabling":[59],"characterization":[61],"system's":[64],"resilience":[65],"specific":[67],"classes":[68],"also":[73],"show":[74],"that":[75],"under":[76],"condition":[78],"sense":[84],"uniformly":[85,99],"time,":[87],"system":[89],"finite-gain":[91],"<inline-formula":[92],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[93],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[94],"notation=\"LaTeX\">$\\mathcal":[95],"{L}_{p}$</tex-math></inline-formula>":[96],"stable":[97],"exponentially":[100],"fast":[101],"achievable,":[106],"provided":[107],"detected":[111],"isolated":[113],"from":[114],"network.":[116],"present":[118],"distributed":[120],"reconfigurable":[122],"framework":[123],"with":[124],"theoretical":[125,146],"guarantees":[126],"detecting":[128],"agents,":[130],"allowing":[131],"resilient":[134],"cooperation":[135],"remaining":[138],"cooperative":[139],"agents.":[140],"Finally,":[141],"simulation":[142],"studies":[143],"illustrate":[144],"findings.":[147]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
