{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:22:38Z","timestamp":1730341358082,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.23919\/acc.2018.8431595","type":"proceedings-article","created":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T20:16:10Z","timestamp":1534536970000},"page":"3544-3551","source":"Crossref","is-referenced-by-count":4,"title":["Secure Control Under Linear Temporal Logic Constraints"],"prefix":"10.23919","author":[{"given":"Luyao","family":"Niu","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Clark","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2009.5400629"},{"key":"ref38","first-page":"12","volume":"393","author":"fudenberg","year":"1991","journal-title":"Game Theory 1991"},{"journal-title":"Model checking","year":"1999","author":"clarke","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364710"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480742"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"1790","DOI":"10.1109\/TSG.2012.2217762","article-title":"SCPSE: Security-oriented cyber-physical state estimation for power grid critical infrastructures","volume":"3","author":"zonouz","year":"2012","journal-title":"IEEE Transactions on Smart Grid"},{"journal-title":"Marktform und Gleichgewicht","year":"1934","author":"von stackelberg","key":"ref37"},{"journal-title":"Competitive Markov Decision Processes","year":"2012","author":"filar","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(92)90048-K"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1095","DOI":"10.1073\/pnas.39.10.1953","article-title":"Stochastic games","volume":"39","author":"shapley","year":"1953","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2013.05.025"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2007.893250"},{"key":"ref11","first-page":"3116","article-title":"Where's Waldo? sensor-based temporal logic motion planning","author":"kress-gazit","year":"2007","journal-title":"IEEE International Conference on Robotics and Automation (ICRA)"},{"key":"ref12","first-page":"2222","article-title":"Sampling-based motion planning with deterministic &#x00B5;-cakulus specifications","author":"karaman","year":"2009","journal-title":"IEEE Conference on Decision and Control (CDC)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2010.5509503"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2010.2047820"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2007.914952"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8141-3_38"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2011.2172150"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2017.08.2280"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2298143"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2011.5928904"},{"journal-title":"Principles of Model Checking","year":"2008","author":"baier","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6257523"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2009.5399536"},{"key":"ref6","first-page":"895","article-title":"Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games","author":"paruchuri","year":"2008","journal-title":"Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2461851"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2492159"},{"key":"ref8","article-title":"Computing stackelberg equilibria in discounted stochastic games","author":"vorobeychik","year":"2012","journal-title":"AAAI"},{"key":"ref7","first-page":"855","article-title":"A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games","author":"yin","year":"2012","journal-title":"Proceedings of the 11 th International Conference on Autonomous Agents and Multiagent Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.15607\/RSS.2016.XII.017"},{"key":"ref9","first-page":"185","article-title":"Prism-games: A model checker for stochastic multi-player games","volume":"13","author":"chen","year":"2013","journal-title":"TACAS"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2514\/6.2010-8040"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1050.0216"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7403395"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426174"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1134707.1134717"},{"key":"ref24","article-title":"Verification and refutation of probabilistic specifications via games","volume":"4","author":"kattenbelt","year":"2009","journal-title":"Leibniz International Proceedings in Informatics"},{"journal-title":"Technical report Secure control under linear temporal logic constraints","year":"2017","author":"niu","key":"ref41"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"3515","DOI":"10.3182\/20110828-6-IT-1002.02287","article-title":"Ltl control in uncertain environments with probabilistic satisfaction guarantees","volume":"44","author":"ding","year":"2011","journal-title":"IFAC Proceedings Volumes"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-010-0097-6"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/978-3-319-46520-3_4","article-title":"Parameter synthesis for markov models: Faster than ever","author":"quatmann","year":"2016","journal-title":"International Symposium on Automated Technology for Verification and Analysis"}],"event":{"name":"2018 Annual American Control Conference (ACC)","start":{"date-parts":[[2018,6,27]]},"location":"Milwaukee, WI","end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 Annual American Control Conference (ACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410068\/8430677\/08431595.pdf?arnumber=8431595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T06:17:15Z","timestamp":1598249835000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8431595\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":42,"URL":"https:\/\/doi.org\/10.23919\/acc.2018.8431595","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}