{"id":"https://openalex.org/W3184016286","doi":"https://doi.org/10.23919/acc50511.2021.9482880","title":"A Secure High-dimension Consensus Mechanism against Adversaries","display_name":"A Secure High-dimension Consensus Mechanism against Adversaries","publication_year":2021,"publication_date":"2021-05-25","ids":{"openalex":"https://openalex.org/W3184016286","doi":"https://doi.org/10.23919/acc50511.2021.9482880","mag":"3184016286"},"language":"en","primary_location":{"id":"doi:10.23919/acc50511.2021.9482880","is_oa":false,"landing_page_url":"https://doi.org/10.23919/acc50511.2021.9482880","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 American Control Conference (ACC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034950505","display_name":"Xiaoyu Luo","orcid":"https://orcid.org/0000-0003-0592-3042"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoyu Luo","raw_affiliation_strings":["Department of Automation, Ministry of Education of China, Shanghai Jiao Tong University, Key Laboratory of System Control and Information Processing, Shanghai Engineering Research Center of Intelligent Control and Management, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation, Ministry of Education of China, Shanghai Jiao Tong University, Key Laboratory of System Control and Information Processing, Shanghai Engineering Research Center of Intelligent Control and Management, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076460898","display_name":"Chengcheng Zhao","orcid":"https://orcid.org/0000-0002-6816-6459"},"institutions":[{"id":"https://openalex.org/I212119943","display_name":"University of Victoria","ror":"https://ror.org/04s5mat29","country_code":"CA","type":"education","lineage":["https://openalex.org/I212119943"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Chengcheng Zhao","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Victoria, BC, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Victoria, BC, Canada","institution_ids":["https://openalex.org/I212119943"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004668792","display_name":"Jianping He","orcid":"https://orcid.org/0000-0002-6253-7802"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianping He","raw_affiliation_strings":["Department of Automation, Ministry of Education of China, Shanghai Jiao Tong University, Key Laboratory of System Control and Information Processing, Shanghai Engineering Research Center of Intelligent Control and Management, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Automation, Ministry of Education of China, Shanghai Jiao Tong University, Key Laboratory of System Control and Information Processing, Shanghai Engineering Research Center of Intelligent Control and Management, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034950505"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11625129,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"789","last_page":"794"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.6689005494117737},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.6329153776168823},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5826837420463562},{"id":"https://openalex.org/keywords/norm","display_name":"Norm (philosophy)","score":0.5820698142051697},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5387760996818542},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4854434132575989},{"id":"https://openalex.org/keywords/consensus","display_name":"Consensus","score":0.41943663358688354},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39975762367248535},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.359587699174881},{"id":"https://openalex.org/keywords/multi-agent-system","display_name":"Multi-agent system","score":0.3488292396068573},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24458178877830505},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1888866126537323},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.14191457629203796},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13766136765480042},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.06688106060028076},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.06663593649864197}],"concepts":[{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.6689005494117737},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.6329153776168823},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5826837420463562},{"id":"https://openalex.org/C191795146","wikidata":"https://www.wikidata.org/wiki/Q3878446","display_name":"Norm (philosophy)","level":2,"score":0.5820698142051697},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5387760996818542},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4854434132575989},{"id":"https://openalex.org/C107107730","wikidata":"https://www.wikidata.org/wiki/Q2994424","display_name":"Consensus","level":3,"score":0.41943663358688354},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39975762367248535},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.359587699174881},{"id":"https://openalex.org/C41550386","wikidata":"https://www.wikidata.org/wiki/Q529909","display_name":"Multi-agent system","level":2,"score":0.3488292396068573},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24458178877830505},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1888866126537323},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.14191457629203796},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13766136765480042},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.06688106060028076},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.06663593649864197},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/acc50511.2021.9482880","is_oa":false,"landing_page_url":"https://doi.org/10.23919/acc50511.2021.9482880","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 American Control Conference (ACC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6800000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1973184571","https://openalex.org/W1982439975","https://openalex.org/W1984398840","https://openalex.org/W2107396783","https://openalex.org/W2111035403","https://openalex.org/W2145554346","https://openalex.org/W2167040191","https://openalex.org/W2375189701","https://openalex.org/W2743215104","https://openalex.org/W2748115135","https://openalex.org/W2899962524","https://openalex.org/W2973688650","https://openalex.org/W2996794283","https://openalex.org/W3002582070","https://openalex.org/W3045514488"],"related_works":["https://openalex.org/W2784026553","https://openalex.org/W2784200061","https://openalex.org/W3046085425","https://openalex.org/W2789508741","https://openalex.org/W3127518712","https://openalex.org/W2118264468","https://openalex.org/W2335243741","https://openalex.org/W2511063373","https://openalex.org/W2063140052","https://openalex.org/W2467364348"],"abstract_inverted_index":{"This":[0],"paper":[1],"investigates":[2],"the":[3,15,26,30,43,51,74,79,93,114,141,160,163],"problem":[4],"of":[5,14,32,45,76,81,96,149,162],"high-dimension":[6,46,82,135],"consensus":[7,21,83,136],"against":[8,62],"adversaries":[9,63,77,128],"for":[10,37,117],"multi-agent":[11],"systems.":[12],"Most":[13],"existing":[16,52],"works":[17],"focus":[18],"on":[19,78],"each-dimension":[20],"separately.":[22],"Differently,":[23],"we":[24],"introduce":[25],"incremental":[27,94,107],"norm,":[28],"i.e.,":[29],"norm":[31,95],"local":[33,118],"state":[34,98,116,119,143],"vector's":[35],"deviation":[36],"two":[38],"consecutive":[39],"iterations,":[40],"to":[41,72,158],"characterize":[42],"property":[44],"consensus.":[47],"Then,":[48],"inspired":[49],"by":[50,101,146],"two-hop-based":[53],"secure":[54],"one-dimension":[55],"consensus,":[56],"an":[57],"adversary":[58],"defense":[59,165],"mechanism":[60],"(ADM)":[61],"is":[64,70,99,144],"proposed,":[65],"where":[66],"two-hop":[67],"neighboring":[68,111],"information":[69],"used":[71],"constrain":[73],"effect":[75],"performance":[80],"in":[84],"a":[85],"tolerable":[86],"range.":[87],"Specifically,":[88],"if":[89,92],"and":[90,105,140],"only":[91],"adversaries'":[97],"bounded":[100,145],"their":[102,109],"neighbors'":[103],"maximum":[104],"minimum":[106],"norms,":[108],"normal":[110,151],"agents":[112],"use":[113],"transmitted":[115],"update.":[120],"We":[121],"also":[122],"show":[123],"that":[124],"under":[125],"ADM,":[126],"when":[127],"do":[129],"not":[130],"collaborate/neighbor":[131],"with":[132],"each":[133],"other,":[134],"can":[137],"be":[138],"achieved":[139],"final":[142],"initial":[147],"states":[148],"all":[150],"agents.":[152],"Finally,":[153],"extensive":[154],"simulations":[155],"are":[156],"conducted":[157],"demonstrate":[159],"effectiveness":[161],"proposed":[164],"mechanism.":[166]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
