Kemi Ding

ORCID: 0000-0002-2534-8543
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Smart Grid Security and Resilience
  • Distributed Sensor Networks and Detection Algorithms
  • Security in Wireless Sensor Networks
  • Distributed Control Multi-Agent Systems
  • Network Security and Intrusion Detection
  • Privacy-Preserving Technologies in Data
  • Target Tracking and Data Fusion in Sensor Networks
  • Game Theory and Applications
  • Adaptive Dynamic Programming Control
  • Stability and Control of Uncertain Systems
  • Advanced Statistical Process Monitoring
  • Energy Efficient Wireless Sensor Networks
  • Stochastic Gradient Optimization Techniques
  • Opinion Dynamics and Social Influence
  • Age of Information Optimization
  • Blockchain Technology Applications and Security
  • Wireless Networks and Protocols
  • Simulation Techniques and Applications
  • Privacy, Security, and Data Protection
  • Reinforcement Learning in Robotics
  • Information and Cyber Security
  • Guidance and Control Systems
  • Model Reduction and Neural Networks
  • Wireless Communication Security Techniques
  • Software-Defined Networks and 5G

Southern University of Science and Technology
2022-2024

Hong Kong University of Science and Technology
2016-2021

University of Hong Kong
2016-2021

Nanyang Technological University
2020-2021

Arizona State University
2019-2020

Average consensus is extensively used in distributed networks for computation and control, where all the agents constantly communicate with each other update their states order to reach an agreement. Under a general average algorithm, information exchanged through wireless or wired communication could lead disclosure of sensitive private information. In this article, we propose privacy-preserving push-sum approach directed that can protect privacy while achieving simultaneously. Each node...

10.1109/tac.2023.3256479 article EN IEEE Transactions on Automatic Control 2023-03-13

In this paper, we consider remote state estimation in an adversarial environment. A sensor forwards local estimates to a estimator over vulnerable network, which may be congested by intelligent denial-of-service attacker. It is assumed that the acknowledgment information from hidden attacker, which, thus, leads asymmetric between and Considering infinite-time goals of two agents their structure, model conflicting nature attacker stochastic Bayesian game. Solutions for game under different...

10.1109/tcns.2018.2867157 article EN IEEE Transactions on Control of Network Systems 2018-08-24

We consider remote state estimation in the presence of an active eavesdropper. A sensor forward local estimates to a estimator over network, which may be eavesdropped by intelligent adversary. Aiming at improving eavesdropping performance efficiently, adversary adaptively alternate between and mode. In contrast eavesdropping, attack enables sabotage data transfer estimator, improve reception itself same time. However, launching attacks increase risk being detected. As result, tradeoff...

10.1109/tac.2020.2980730 article EN IEEE Transactions on Automatic Control 2020-03-13

This article considers the sensor scheduling for multiple dynamic processes. We consider n linear The state of each process is measured by a sensor, which transmits its local estimate over one wireless channel to remote estimator with certain communication costs. At time step, only portion sensors are allowed transmit data and packet might be lost due unreliability channels. Our goal find policy that coordinates in centralized manner minimize total expected estimation error formulate problem...

10.1109/tcns.2020.2966671 article EN IEEE Transactions on Control of Network Systems 2020-01-14

Unsupervised domain adaptation (UDA) frameworks have shown good generalization capabilities for 3D point cloud semantic segmentation models on clean data. However, existing works overlook adversarial robustness when the source itself is compromised. To comprehensively explore of UDA frameworks, we first design a stealthy generation attack that can significantly contaminate datasets with only minor perturbations to surface. Based that, propose novel dataset, AdvSynLiDAR, comprising...

10.48550/arxiv.2504.01659 preprint EN arXiv (Cornell University) 2025-04-02

This letter studies remote state estimation under denial-of-service (DoS) attacks. A sensor transmits its local estimate of an underlying physical process to a estimator via wireless communication channel. DoS attacker is capable interfere the channel and degrades accuracy. Considering tactical jamming strategies played by attacker, adjusts transmission power. interactive between studied in framework zero-sum stochastic game. To derive their optimal power schemes, we first discuss existence...

10.1109/lcsys.2017.2711044 article EN IEEE Control Systems Letters 2017-06-01

We study the denial-of-service (DoS) attack power allocation optimization in a multiprocess cyber-physical system (CPS), where sensors observe different dynamic processes and send local estimated states to remote estimator through wireless channels, while DoS attacker allocates its on channels as interference reduce transmission rates, thus degrading estimation accuracy of estimator. consider two problems. One is maximize average error processes, other minimal one. formulate these problems...

10.1109/tnnls.2022.3148924 article EN IEEE Transactions on Neural Networks and Learning Systems 2022-02-15

This paper addresses security issues of a cyber-physical system (CPS) under denial-of-service (DoS) attacks. The measurements sensor are transmitted to remote estimator over vulnerable communication channel, which may be congested by an intelligent attacker. Aiming at improving the estimation accuracy limited energy budget, we propose novel acknowledgement-based (ACK-based) cheating scheme for confuse attacker, from prove optimal deception-based transmission schedule within whole...

10.1016/j.ifacol.2016.10.391 article EN IFAC-PapersOnLine 2016-01-01

The past few years have witnessed the explosive growth of Internet Things (IoT) devices. necessity real-time edge intelligence for IoT applications demands that decision making must take place right here now at network edge, thus dictating a high percentage created data should be stored and analyzed locally. However, computing resources are constrained amount local is often very limited nodes. To tackle these challenges, we propose distributionally robust optimization (DRO)-based framework,...

10.1109/infocom41043.2020.9155440 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2020-07-01

This paper considers the remote state estimation in a cyber-physical system (CPS) using multiple sensors. The measurements of each sensor are transmitted to estimator over shared channel, where simultaneous transmissions from other sensors regarded as interference signals. In such competitive environment, needs choose its transmission power for sending data packets taking into account sensors' behavior. To model this interactive decision-making process among sensors, we introduce...

10.1016/j.ifacol.2017.08.489 article EN IFAC-PapersOnLine 2017-07-01

In this work, we consider the multi-party privacy conflict (MPC) in an online social network (OSN). As many data items uploaded to OSN are "co-owned" by multiple users with different concerns, some personal information of may be disclosed others unintentionally. On contrary existing mainstream platforms allowing only very user uploading set level, article take a fine-grained approach resolve MPC, which all co-owners independently determine whether share their content within on OSN....

10.1109/tnet.2020.3016315 article EN publisher-specific-oa IEEE/ACM Transactions on Networking 2020-08-25

This paper considers security issues of a cyber-physical system (CPS) under denial-of-service (DoS) attacks. The measurements multiple sensors are transmitted to remote estimator over multi-channel network, which may be congested by an intelligent attacker. Aiming at improving the estimation accuracy, we first propose novel aggregation scheme for produce accurate state estimates, from obtain closed-form expression expected error covariance. We further develop sensor-attacker game design...

10.1109/cdc.2016.7799238 article EN 2016-12-01

Here we consider the problem of designing finite-impulse-response (FIR) graph filter (GF) in a fully distributed way. For directed with N nodes, each node designs coefficients manner, when knowledge structure, recognized as global information, is unavailable to node. By modeling signal shifting observations at linear dynamical system, establish fundamental connections between local response anode, concerned processing (GSP) field, and observability investigated control theory. The...

10.1109/tsp.2021.3053643 article EN IEEE Transactions on Signal Processing 2021-01-01

We consider a remote state estimation system under privacy-disclosure threats. A malicious agent eavesdrops the output of sensor node and infers some critical information about internal states which is measuring. Consequently, user privacy may be compromised. In order to avoid leakage, we propose novel data-driven power allocation scheme, enables us obtain closed-form expression expected error covariances. use covariances as metrics quantify accuracy privacy. By studying tradeoff between...

10.1109/chicc.2016.7554507 article EN 2016-07-01

10.1007/s11424-024-3450-3 article EN Journal of Systems Science and Complexity 2024-02-01

This paper explores distributed aggregative games in multi-agent systems. Current methods for finding Nash equilibrium require players to send original messages their neighbors, leading communication burden and privacy issues. To jointly address these issues, we propose an algorithm that uses stochastic compression save resources conceal information through random errors induced by compression. Our theoretical analysis shows the guarantees convergence accuracy, even with aggressive used...

10.48550/arxiv.2405.03106 preprint EN arXiv (Cornell University) 2024-05-05

In this paper, we develop distributed computation algorithms for Nash equilibriums of linear quadratic network games with proven differential privacy guarantees. a game each player's payoff being function, the dependencies decisions in function naturally encode structure governing players' inter-personal influences. Such social influence and individual marginal payoffs players indicate economic spillovers preferences, thus they are subject to concerns. For computing equilibrium,...

10.1109/tcns.2024.3398729 article EN IEEE Transactions on Control of Network Systems 2024-01-01

The distributed computation of a Nash equilibrium (NE) for non-cooperative games is gaining increased attention recently. Due to the nature systems, privacy and communication efficiency are two critical concerns. Traditional approaches often address these concerns in isolation. This work introduces unified framework, named CDP-NES, designed improve privacy-preserving NE seeking algorithm over directed graphs. Leveraging both general compression operators noise adding mechanism, CDP-NES...

10.48550/arxiv.2405.04757 preprint EN arXiv (Cornell University) 2024-05-07
Coming Soon ...