References
Shen S Q, Zhang K, Zhou Y, et al. Security in edge-assisted Internet of Things: challenges and solutions. Sci China Inf Sci, 2020, 63: 220302
Langer R. To kill a centrifuge: a technical analysis of what Stuxnet’s creators tried to achieve. The Langner Group, 2013. https://cyber-peace.org/wp-content/uploads/2013/06/To-kill-a-centrifuge.pdf
Sultangazin A, Tabuada P. Symmetries and isomorphisms for privacy in control over the cloud. IEEE Trans Autom Control, 2021, 66: 538–549
Wang Y Q. Privacy-preserving average consensus via state decomposition. IEEE Trans Autom Control, 2019, 64: 4711–4716
Altafini C. A system-theoretic framework for privacy preservation in continuous-time multiagent dynamics. Automatica, 2020, 122: 109253
Lu Y, Zhu M H. Privacy preserving distributed optimization using homomorphic encryption. Automatica, 2018, 96: 314–325
Xu C B, Zhao Y L, Zhang J F. System identification under information security. In: Proceedings of International Federation of Automatic Control, Toulouse, 2017. 3756–3761
Ny J L, Pappas G J. Differentially private filtering. IEEE Trans Autom Control, 2014, 59: 341–354
Liu X K, Zhang J F, Wang J. Differentially private consensus algorithm for continuous-time heterogeneous multiagent systems. Automatica, 2020, 122: 109283
Acknowledgements
This work was supported by National Key R&D Program of China (Grant No. 2018YFA0703800) and National Natural Science Foundation of China (Grant No. 61877057).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, J., Tan, J. & Wang, J. Privacy security in control systems. Sci. China Inf. Sci. 64, 176201 (2021). https://doi.org/10.1007/s11432-020-3240-8
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-020-3240-8