Abstract: This article studies the problem of identifying both stealthy and nonstealthy integrity attacks for unknown linear discrete-time systems. By establishing a necessary and sufficient condition ...
Abstract: This paper focuses on the investigation of optimal attack power strategies in cyber-physical systems with a two-hop network subject to two malicious attackers. The objective is to analyze ...
├─ src/ # MATLAB source code (channel, DBPSK, OFDM, PN, etc.) ├─ test/ # Validation and smoke tests ├─ docs/ │ ├─ assets/ # Figures, plots, channel visualizations │ └─ specs/ # Original handout / ...
CORALL is a novel framework that integrates Large Language Models with real-time risk assessment for autonomous maritime navigation. The system combines LLM-based decision-making with traditional ...