{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:49:17Z","timestamp":1767340157673,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319681665"},{"type":"electronic","value":"9783319681672"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68167-2_29","type":"book-chapter","created":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T23:50:53Z","timestamp":1506383453000},"page":"446-462","source":"Crossref","is-referenced-by-count":4,"title":["Attacking the V: On the Resiliency of\u00a0Adaptive-Horizon MPC"],"prefix":"10.1007","author":[{"given":"Ashish","family":"Tiwari","sequence":"first","affiliation":[]},{"given":"Scott A.","family":"Smolka","sequence":"additional","affiliation":[]},{"given":"Lukas","family":"Esterle","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Lukina","sequence":"additional","affiliation":[]},{"given":"Junxing","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Radu","family":"Grosu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,27]]},"reference":[{"issue":"5","key":"29_CR1","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.sysconle.2008.12.002","volume":"58","author":"V Adetola","year":"2009","unstructured":"Adetola, V., DeHaan, D., Guay, M.: Adaptive model predictive control for constrained nonlinear systems. Syst. Control Lett. 58(5), 320\u2013326 (2009)","journal-title":"Syst. Control Lett."},{"key":"29_CR2","unstructured":"Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., an, A.C., Roesner, F., Kohno, T.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security (2011)"},{"key":"29_CR3","unstructured":"Condliffe, J.: A 100-drone swarm, dropped from jets, plans its own moves, MIT Technology Review, January 2017"},{"key":"29_CR4","unstructured":"Davidson, D., Wu, H., Jellinek, R., Ristenpart, T., Singh, V.: Controlling UAVs with sensor input spoofing attacks. In: Proceedings of 10th USENIX Workshop on Offensive Technologies, WOOT 2016, Austin, TX, August 2016"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Droge, G., Egerstedt, M.: Adaptive time horizon optimization in model predictive control. In: 2011 American Control Conference (ACC), pp. 1843\u20131848. IEEE (2011)","DOI":"10.1109\/ACC.2011.5990855"},{"issue":"6","key":"29_CR6","doi-asserted-by":"crossref","first-page":"1454","DOI":"10.1109\/TAC.2014.2303233","volume":"59","author":"H Fawzi","year":"2014","unstructured":"Fawzi, H., Tabuada, P., Diggavi, S.N.: Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Autom. Control 59(6), 1454\u20131467 (2014). http:\/\/dx.doi.org\/10.1109\/TAC.2014.2303233","journal-title":"IEEE Trans. Autom. Control"},{"key":"29_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-662-45231-8_16","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications","author":"R Grosu","year":"2014","unstructured":"Grosu, R., Peled, D., Ramakrishnan, C.R., Smolka, S.A., Stoller, S.D., Yang, J.: Using statistical model checking for measuring systems. In: Margaria, T., Steffen, B. (eds.) ISoLA 2014. LNCS, vol. 8803, pp. 223\u2013238. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-45231-8_16"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.: Particle swarm optimization. In: Proceedings of 1995 IEEE International Conference on Neural Networks, pp. 1942\u20131948 (1995)","DOI":"10.1109\/ICNN.1995.488968"},{"key":"29_CR9","unstructured":"Krener, A.J.: Adaptive horizon model predictive control, arXiv preprint (2016). arXiv:1602.08619"},{"key":"29_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-662-54580-5_17","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A Lukina","year":"2017","unstructured":"Lukina, A., et al.: ARES: adaptive receding-horizon synthesis of optimal plans. In: Legay, A., Margaria, T. (eds.) TACAS 2017. LNCS, vol. 10206, pp. 286\u2013302. Springer, Heidelberg (2017). doi: 10.1007\/978-3-662-54580-5_17"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Narendra, K.S.: Adaptive control using neural networks. In: Neural Networks for Control, pp. 115\u2013142. MIT Press (1990)","DOI":"10.23919\/ACC.1991.4791543"},{"key":"29_CR12","unstructured":"Negash, L., Kim, S.H., Choi, H.L.: An unknown-input-observer based approach for cyber attack detection in formation flying UAVs. In: AIAA Infotech (2016)"},{"key":"29_CR13","volume-title":"Modern Control Engineering: Instrumentation and Controls Series","author":"K Ogata","year":"2010","unstructured":"Ogata, K.: Modern Control Engineering: Instrumentation and Controls Series. Prentice Hall, Upper Saddle River (2010)"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Pajic, M., Weimer, J., Bezzo, N., Tabuada, P., Sokolsky, O., Lee, I., Pappas, G.J.: Robustness of attack-resilient state estimators. In: 5th ACM\/IEEE International Conference on Cyber-Physical Systems (ICCPS) (2014)","DOI":"10.1109\/ICCPS.2014.6843720"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Park, J., Ivanov, R., Weimer, J., Pajic, M., Lee, I.: Sensor attack detection in the presence of transient faults. In: 6th ACM\/IEEE International Conference on Cyber-Physical Systems (ICCPS) (2015)","DOI":"10.1145\/2735960.2735984"},{"issue":"11","key":"29_CR16","doi-asserted-by":"crossref","first-page":"2715","DOI":"10.1109\/TAC.2013.2266831","volume":"58","author":"F Pasqualetti","year":"2013","unstructured":"Pasqualetti, F., Dorfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715\u20132729 (2013)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"2","key":"29_CR17","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1109\/LRA.2017.2655142","volume":"2","author":"K Saulnier","year":"2017","unstructured":"Saulnier, K., Saldana, D., Prorok, A., Pappas, G.J., Kumar, V.: Resilient flocking for mobile robot teams. IEEE Robot. Autom. Lett. 2(2), 1039\u20131046 (2017)","journal-title":"IEEE Robot. Autom. Lett."},{"issue":"10","key":"29_CR18","doi-asserted-by":"crossref","first-page":"1095","DOI":"10.1073\/pnas.39.10.1953","volume":"39","author":"LS Shapley","year":"1953","unstructured":"Shapley, L.S.: Stochastic games. Proc. Nat. Acad. Sci. 39(10), 1095\u20131100 (1953)","journal-title":"Proc. Nat. Acad. Sci."},{"key":"29_CR19","unstructured":"Yang, J., Grosu, R., Smolka, S.A., Tiwari, A.: Love thy neighbor: V-formation as a problem of model predictive control. In: LIPIcs-Leibniz International Proceedings in Informatics, vol. 59. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik (2016)"},{"key":"29_CR20","unstructured":"Yang, J., Grosu, R., Smolka, S.A., Tiwari, A.: V-formation as optimal control. In: Proceedings of the Biological Distributed Algorithms Workshop (2016)"}],"container-title":["Lecture Notes in Computer Science","Automated Technology for Verification and Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68167-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T19:38:37Z","timestamp":1570131517000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68167-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319681665","9783319681672"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68167-2_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}