Christoforos N. Hadjicostis

ORCID: 0000-0002-1706-708X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Petri Nets in System Modeling
  • Distributed Control Multi-Agent Systems
  • Distributed systems and fault tolerance
  • Formal Methods in Verification
  • Cooperative Communication and Network Coding
  • Energy Efficient Wireless Sensor Networks
  • Fault Detection and Control Systems
  • Business Process Modeling and Analysis
  • Opportunistic and Delay-Tolerant Networks
  • Security and Verification in Computing
  • Mobile Ad Hoc Networks
  • Error Correcting Code Techniques
  • Advanced Memory and Neural Computing
  • Stability and Control of Uncertain Systems
  • Flexible and Reconfigurable Manufacturing Systems
  • Microgrid Control and Optimization
  • Cryptography and Data Security
  • Smart Grid Security and Resilience
  • Real-Time Systems Scheduling
  • Neural Networks Stability and Synchronization
  • Control Systems and Identification
  • Radiation Effects in Electronics
  • Advanced Wireless Communication Techniques
  • Security in Wireless Sensor Networks
  • Optimization and Search Problems

University of Cyprus
2015-2024

University of Illinois Urbana-Champaign
2012-2024

KTH Royal Institute of Technology
2021

Xidian University
2021

Institute of Electrical and Electronics Engineers
2020

National Renewable Energy Laboratory
2020

Urbana University
2003-2009

University of Calabria
2007

Massachusetts Institute of Technology
1994-1999

Given a network of interconnected nodes, each with its own value (such as measurement, position, vote, or other data), we develop distributed strategy that enables some all the nodes to calculate any arbitrary function node values, despite actions malicious in network. Our scheme assumes broadcast model communication (where transmit same their neighbors) and utilizes linear iteration where, at time-step, updates be weighted average previous those neighbors. We consider faulty if, instead...

10.1109/tac.2010.2088690 article EN IEEE Transactions on Automatic Control 2010-10-20

In this paper, we propose an architecture for voltage regulation in distribution networks that relies on controlling reactive power injections provided by distributed energy resources (DERs). A local controller each bus of the network monitors and, whenever there is a violation, it uses locally available information to estimate amount needs be injected into order correct violation. If DERs connected can collectively provide estimated controller, they are instructed do so. Otherwise,...

10.1109/tpwrs.2012.2211385 article EN IEEE Transactions on Power Systems 2012-09-24

In this paper, we follow a state-based approach to extend the notion of opacity in computer security discrete event systems. A system is (S, P)-opaque if evolution its true state through set secret states S remains opaque an observer who observing activity projection map P. other words, based on observations mapping P, never certain that current within S. We also introduce stronger (S,P, K)-opacity which requires remain for K following departure system's from show definition enables use...

10.1109/cdc.2007.4434515 article EN 2007-01-01

We present a method for achieving consensus in distributed systems finite number of time-steps. Our scheme involves linear iteration where, at each time-step, node updates its value to be weighted average own previous and those neighbors. If D denotes the degree minimal polynomial weight matrix associated with iteration, we show that can immediately calculate as combination past values over most also determine coefficients this decentralized manner. The proposed has potential significantly...

10.1109/acc.2007.4282726 article EN Proceedings of the ... American Control Conference/Proceedings of the American Control Conference 2007-07-01

In this paper, we develop and analyze a distributed privacy-preserving average consensus algorithm that enables all of the components system, each with some initial value, to asymptotically reach on their values, without having reveal specific value they contribute calculation. We consider set (nodes) interact via directional communication links (edges) form generally directed topology (digraph). The proposed protocol can be followed by node does not want its and, under certain conditions...

10.23919/ecc.2013.6669251 article EN 2022 European Control Conference (ECC) 2013-07-01

In this paper, we address the problem of optimally dispatching a set distributed energy resources (DERs) without relying on centralized decision maker. We consider scenario where each DER can provide certain resource (e.g., active or reactive power) at some cost (namely, quadratic in amount resource), with additional constraint that provides is upper and lower bounded by its capacity limits. propose low-complexity iterative algorithm for optimal dispatch relies, iteration, simple...

10.1109/cdc.2012.6426665 article EN 2012-12-01

This paper presents a method to identify and localize failures in smart grids. The is based on carefully designed Petri net (PN) that captures the modeling details of protection system distribution network allows detection/identification data transmission faults by means simple matrix operations. design PN model carried out composing multiple models for single systems: Such an approach identification despite possible strong penetration distributed generation. In order verify method, two case...

10.1109/tie.2011.2109335 article EN IEEE Transactions on Industrial Electronics 2011-01-28

Given an arbitrary network of interconnected nodes, we develop and analyze a distributed strategy that enables subset the nodes to calculate any given function node values. Our scheme utilizes linear iteration where, at each time-step, updates its value be weighted average own previous those neighbors. We show this approach can viewed as dynamical system, with dynamics are by weight matrix iteration, outputs for captured set values available time-step. In connected networks time-invariant...

10.1109/jsac.2008.080507 article EN IEEE Journal on Selected Areas in Communications 2008-04-29

Classical distributed algorithms for asymptotic average consensus typically assume timely and reliable exchange of information between neighboring components a given multi-component system. These assumptions are not necessarily valid in practice due to varying delays that might affect computations at different nodes and/or transmissions links. In this work, we propose protocol overcomes limitation and, unlike existing protocols the presence delays, ensures exact average, despite arbitrary...

10.1109/tac.2013.2275669 article EN IEEE Transactions on Automatic Control 2013-07-30

We present a method for constructing reduced-order state observers linear systems with unknown inputs. Our approach provides characterization of delay, which eases the established necessary conditions existence input zero-delay. develop parameterization observer gain that decouples inputs from estimation error, and we use remaining freedom to ensure stability error dynamics. procedure is quite general in it encompasses design full-order via appropriate choices matrices

10.1109/tac.2006.890371 article EN IEEE Transactions on Automatic Control 2007-02-01

This paper discusses the utilization of distributed energy resources on distribution side power grid to provide a number ancillary services. While individual capability these support might be very small, their presence in large numbers many networks implies that, under proper control, they can collectively become an asset for providing An example is electronics interface photovoltaic array mounted residential building roof. its primary function control active flow, when properly controlled,...

10.1109/smartgrid.2010.5621991 article EN 2010-10-01

We describe and analyze the complexity of verifying notion infinite-step opacity in systems that are modeled as non-deterministic finite automata with partial observation on their transitions. Specifically, a system is opaque if entrance state, at any particular instant, to set secret states remains (uncertain), for length operation, an intruder who observes activity through some projection map. Infinite-step can be used characterize security requirements many applications, including...

10.1109/tac.2011.2173774 article EN IEEE Transactions on Automatic Control 2011-10-28

Motivated by security and privacy considerations in a variety of applications discrete event systems, we describe analyze the computational complexity required for verifying notion <i xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">K</i> -step opacity systems that are modeled as nondeterministic finite automata with partial observation on their transitions. Specifically, system is opaque if, at any specific point within last observations, entrance...

10.1109/tase.2011.2106775 article EN IEEE Transactions on Automation Science and Engineering 2011-02-22

In this paper, we propose a distributed architecture for generation control in islanded ac microgrids with both synchronous generators and inverter-interfaced power supplies. Although they are smaller have lower ratings, the objectives an microgrid similar to those large systems, e.g., bulk transmission networks; specifically, without violating limits on generator output, frequency must be regulated costs should minimized. However, implementation of functions is centralized, i.e., there...

10.1109/tcst.2014.2381601 article EN IEEE Transactions on Control Systems Technology 2015-01-28

State-based notions of opacity, such as initial-state opacity and infinite-step emerge key properties in numerous security applications discrete event systems. We consider systems that are modeled partially observed nondeterministic finite automata tackle the problem constructing a minimally restrictive opacity-enforcing supervisor (MOES), which limits system's behavior within some prespecified legal while enforcing or requirements. characterize solution to MOES, under mild assumptions,...

10.1109/tac.2011.2170453 article EN IEEE Transactions on Automatic Control 2011-10-05

A system is said to be current-state opaque if the entrance of state a set secret states remains (uncertain) an intruder-at least until leaves states. This notion opacity has been studied in nondeterministic finite automata settings (where intruder observes subset events, for example, via some natural projection mapping) and shown useful characterizing security requirements many applications (including encryption using pseudorandom generators coverage properties sensor networks). One...

10.1109/tac.2013.2279914 article EN IEEE Transactions on Automatic Control 2013-08-28

Most algorithms for distributed averaging only guarantee asymptotic convergence. This paper introduces a protocol that allows nodes to find the exact average of initial values in finite and minimum number steps on interconnection topologies described by strongly connected directed graphs (digraphs). More specifically, under assumption each component has knowledge its outgoing links (i.e., components which it sends information), we show value can be computed based local observations over time...

10.1109/tcns.2015.2426732 article EN IEEE Transactions on Control of Network Systems 2015-04-28

In this article, we develop distributed iterative algorithms that enable the components of a multicomponent system, each with some integer initial value, to asymptotically compute average their values, without having reveal other specific value they contribute calculation. We assume communication topology captured by an arbitrary strongly connected digraph, in which certain nodes (components) might be curious but not malicious (i.e., execute protocol correctly, try identify values nodes)....

10.1109/tac.2020.2968876 article EN cc-by IEEE Transactions on Automatic Control 2020-01-23

The increasing availability of network connectivity has prompted the study computer-based control methodologies that are implemented centrally or distributively using existing infrastructure as communications backbone. Recent work looked at stability networked systems (i.e., in which feedback loops closed through networks) and focused on performance guarantees under networked. induced delays varying data packet rates. In this work, we extend these ideas a probabilistic setting by modeling...

10.1109/cdc.2002.1184678 article EN 2003-08-27

This paper proposes distributed algorithms for control and coordination of loads energy resources (DERs) in distribution networks. These are relevant load curtailment demand response programs, also DERs provision ancillary services. Both the load-curtailment DER problems can be cast as resource allocation with constraints on capacity. We focus linear iterative which each j maintains a set values that is updated to weighted combination resource's own previous sets its neighboring resources....

10.1109/cdc.2011.6160431 article EN 2011-12-01

We develop a graph-theoretic characterization of controllability and observability linear systems over finite fields. Specifically, we show that system will be structurally controllable observable field if the graph satisfies certain properties, size is sufficiently large. also provide upper bounds on indices for structured (over arbitrary fields). then use our analysis to design nearest-neighbor rules multi-agent where state each agent constrained lie in set. view discrete states as...

10.1109/tac.2012.2204155 article EN IEEE Transactions on Automatic Control 2012-06-11

This paper considers networked systems and develops distributed algorithm that is resilient against potential packet drops in the communication links between system components. We apply this to problem of coordinating energy resources (DERs) for provision ancillary services electrical networks, e.g., reactive power support voltage control. In problem, each component can contribute a certain amount active and/or power, bounded from above (possibly) below by capacity constraints, objective...

10.1109/jsac.2012.120711 article EN IEEE Journal on Selected Areas in Communications 2012-06-29
Coming Soon ...