Minghui Zhu

ORCID: 0000-0003-3879-7820
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed Control Multi-Agent Systems
  • Smart Grid Security and Resilience
  • Fault Detection and Control Systems
  • Network Security and Intrusion Detection
  • Neural Networks Stability and Synchronization
  • Advanced Control Systems Optimization
  • Game Theory and Applications
  • Reinforcement Learning in Robotics
  • Target Tracking and Data Fusion in Sensor Networks
  • Robotic Path Planning Algorithms
  • Advanced Malware Detection Techniques
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Smart Grid Energy Management
  • Stability and Control of Uncertain Systems
  • Security and Verification in Computing
  • Cryptography and Data Security
  • Control Systems and Identification
  • Gaussian Processes and Bayesian Inference
  • Microgrid Control and Optimization
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • Optimization and Search Problems
  • Traffic control and management
  • Guidance and Control Systems
  • Energy Efficient Wireless Sensor Networks

Pennsylvania State University
2015-2024

Shandong University of Science and Technology
2021-2024

Shanghai Huali Microelectronics (China)
2024

Anhui University
2024

Universiti Teknologi MARA
2023

Chengdu University of Traditional Chinese Medicine
2020-2022

National University
2022

Thermal Power Research Institute
2020

Central South University
2019

Park University
2015-2018

We consider a general multi-agent convex optimization problem where the agents are to collectively minimize global objective function subject inequality constraint, equality and constraint set. The is defined by sum of local functions, while set produced intersection sets. In particular, we study two cases: one absent, other sets identical. devise distributed primal-dual subgradient algorithms based on characterization optimal solutions as saddle points Lagrangian penalty functions. These...

10.1109/tac.2011.2167817 article EN IEEE Transactions on Automatic Control 2011-09-22

10.1016/j.automatica.2009.10.021 article EN Automatica 2009-11-27

This technical note studies a resilient control problem for discrete-time, linear time-invariant systems subject to state and input constraints. State measurements commands are transmitted over communication network could be corrupted by adversaries. In particular, we consider the replay attackers who maliciously repeat messages sent from operator actuator. We propose variation of receding-horizon law deal with attacks analyze resulting system performance degradation. A class competitive...

10.1109/tac.2013.2279896 article EN IEEE Transactions on Automatic Control 2013-08-28

10.1016/j.automatica.2018.07.005 article EN publisher-specific-oa Automatica 2018-07-20

This paper gives three versions of the small gain theorem with restrictions for uncertain time-varying nonlinear systems.The result can be viewed as an extension time-invariant systems or without applied to study stabilization problem output regulation systems.

10.4310/cis.2006.v6.n2.a2 article EN Communications in Information and Systems 2006-01-01

Inspired by current challenges in data-intensive and energy-limited sensor networks, we formulate a coverage optimization problem for mobile sensors as (constrained) repeated multiplayer game. Each tries to optimize its own while minimizing the processing/energy cost. The are subject informational restriction that environmental distribution function is unknown priori. We present two distributed learning algorithms where each only remembers utility values actions played during last plays....

10.1137/100784163 article EN SIAM Journal on Control and Optimization 2013-01-01

We consider a multi-agent optimization problem where agents subject to local, intermittent interactions aim minimize sum of local objective functions global inequality constraint and state set. In contrast previous work, we do not require that the objective, functions, sets are convex. order deal with time-varying network topologies satisfying standard connectivity assumption, resort consensus algorithm techniques Lagrangian duality method. slightly relax requirement exact consensus, propose...

10.1109/tac.2012.2228038 article EN IEEE Transactions on Automatic Control 2012-11-16

10.1016/j.automatica.2015.10.012 article EN publisher-specific-oa Automatica 2015-11-10

Moving Target Defense techniques have been proposed to increase uncertainty and apparent complexity for attackers. When more than one are effective limit opportunities of an attack, it is required compare these select the best defense choice. In this paper, we propose a three-layer model evaluate effectiveness different Defenses. This designed as attempt fill gap among existing evaluation methods works systematic framework comparison.

10.1145/2663474.2663486 article EN 2014-11-03

The Gannet Optimization Algorithm (GOA) has good performance, but there is still room for improvement in memory consumption and convergence. In this paper, an improved proposed to solve five engineering optimization problems. compact strategy enables the GOA save a large amount of memory, parallel communication allows algorithm avoid falling into local optimal solutions. We improve through combination strategy, we name Parallel Compact (PCGOA). performance study PCGOA on CEC2013 benchmark...

10.3390/math11020439 article EN cc-by Mathematics 2023-01-13

This paper studies a resilient control problem for discrete-time, linear time-invariant systems subject to state and input constraints. State measurements laws are transmitted over communication network could be corrupted by human adversaries. In particular, we consider class of adversaries, namely correlated jammers, who modeled as rational decision makers whose strategies highly the system operator. The coupled making process is two-level receding-horizon dynamic Stackelberg...

10.1109/acc.2011.5991463 article EN 2011-06-01

In this paper, we address the resilient state estimation problem for some relatively unexplored security issues cyber-physical systems, namely switching attacks and presence of stochastic process measurement noise signals, in addition to on actuator sensor signals. We model systems under attack as hidden mode switched linear with unknown inputs propose use multiple inference algorithm developed [1] tackle these issues. also furnish lacking asymptotic analysis. Moreover, characterize...

10.1109/cdc.2015.7403027 article EN 2021 60th IEEE Conference on Decision and Control (CDC) 2015-12-01

We introduce here a class of distributed quantized averaging algorithms for asynchronous communication networks with fixed and switching topologies. The focus this technical note is on the study convergence time proposed algorithms. By appealing to random walks graphs, we derive polynomial bounds expected presented, as function number agents in network.

10.1109/tac.2010.2093276 article EN IEEE Transactions on Automatic Control 2010-11-23

In this article, we consider the problem of attack-resilient state estimation, that is, to reliably estimate true system states despite two classes attacks: (i) attacks on switching mechanisms and (ii) false data injection actuator sensor signals, in presence stochastic process measurement noise signals. We model systems under attack as hidden mode switched linear with unknown inputs propose use a multiple-model inference algorithm tackle these security issues. Moreover, characterize...

10.1145/3204439 article EN ACM Transactions on Cyber-Physical Systems 2018-04-30

Mobile robots such as unmanned vehicles integrate heterogeneous capabilities in sensing, computation, and control. They are representative cyber-physical systems where the cyberspace physical world strongly coupled. However, safety of mobile is significantly threatened by cyber/physical attacks software/hardware failures. These threats can thwart normal robot operations cause misbehaviors. In this paper, we propose a novel anomaly detection system, which leverages dynamics to detect...

10.1109/dsn.2018.00065 article EN 2018-06-01

In this paper, we investigate a model where defender and an attacker simultaneously repeatedly adjust the defenses attacks. Under model, propose two iterative reinforcement learning algorithms which allow to identify optimal when information about is limited. With probability one, adaptive algorithm converges best response with respect attacks diminishingly explores system. arbitrarily close robust min-max strategy despite that persistently The convergence formally proven performance...

10.1145/2663474.2663481 article EN 2014-11-03

We consider a general multi-agent convex optimization problem where the agents are to collectively minimize global objective function subject inequality constraint, equality and constraint set. The is defined by sum of local functions, while set produced intersection sets. In particular, we study two cases: one absent, other sets identical. devise distributed primal-dual subgradient algorithms which based on characterization optimal solutions as saddle points Lagrangian penalty functions....

10.48550/arxiv.1001.2612 preprint EN other-oa arXiv (Cornell University) 2010-01-01

10.1016/j.arcontrol.2019.04.010 article EN publisher-specific-oa Annual Reviews in Control 2019-01-01
Coming Soon ...