scispace - formally typeset
S

Sean Weerakkody

Researcher at Carnegie Mellon University

Publications -  32
Citations -  1748

Sean Weerakkody is an academic researcher from Carnegie Mellon University. The author has contributed to research in topics: Cyber-physical system & Watermark. The author has an hindex of 16, co-authored 32 publications receiving 1314 citations. Previous affiliations of Sean Weerakkody include University of Maryland, College Park.

Papers
More filters
Journal ArticleDOI

Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs

TL;DR: A wide variety of motivations exists for launching an attack on CPSs, ranging from economic reasons, such as obtaining a financial gain, all the way to terrorism, for instance, threatening an entire population by manipulating life-critical resources.
Journal ArticleDOI

Stochastic event-triggered sensor scheduling for remote state estimation

TL;DR: Simulation studies demonstrate that the proposed stochastic event-triggered sensor schedules for remote state estimation have better performance than periodic ones with the same sensor-to-estimator communication rate.
Proceedings ArticleDOI

Detecting integrity attacks on control systems using a moving target approach

TL;DR: To thwart an adversary who has the ability to modify and read all sensor and actuator channels, external states dependent on the state of the control system are introduced, with linear time-varying dynamics unknown to the adversary.
Journal ArticleDOI

Stochastic Event-triggered Sensor Schedule for Remote State Estimation

TL;DR: In this article, an open-loop and a closed-loop stochastic event-triggered sensor schedule for remote state estimation is proposed, where the MMSE estimator and its estimation error covariance matrix at the remote estimator are given in a closed form.
Proceedings ArticleDOI

Detecting integrity attacks on control systems using robust physical watermarking

TL;DR: An attack model for an adversary who uses knowledge of the system as well as access to a subset of real time control inputs and sensor outputs to construct stealthy virtual outputs is formulated and a robust physical watermark and detector to counter such an adversary is proposed.