Search Results for author: Yuting Zhu

Found 7 papers, 1 papers with code

Self-supervised Noise2noise Method Utilizing Corrupted Images with a Modular Network for LDCT Denoising

1 code implementation13 Aug 2023 Yuting Zhu, Qiang He, YuDong Yao, Yueyang Teng

Note that we use LDCT images based on the noisy-as-clean strategy for corruption instead of NDCT images.

Image Denoising

Synthesis of the Supremal Covert Attacker Against Unknown Supervisors by Using Observations

no code implementations16 Mar 2022 Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su

In this paper, we consider the problem of synthesizing the supremal covert damage-reachable attacker, in the setup where the model of the supervisor is unknown to the adversary but the adversary has recorded a (prefix-closed) finite set of observations of the runs of the closed-loop system.

Synthesis of Maximally Permissive Covert Attackers Against Unknown Supervisors by Using Observations

no code implementations23 Jun 2021 Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su

In this paper, we consider the problem of synthesis of maximally permissive covert damage-reachable attackers in the setup where the model of the supervisor is unknown to the adversary but the adversary has recorded a (prefix-closed) finite set of observations of the runs of the closed-loop system.

Privacy-Preserving Co-synthesis Against Sensor-Actuator Eavesdropping Intruder

no code implementations30 Apr 2021 Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su

Our approach is to model the co-synthesis problem as a distributed supervisor synthesis problem in the Ramadge-Wonham supervisory control framework, and we propose an incremental synthesis heuristic to incrementally synthesize a dynamic mask, an edit function, and a supervisor, which consists of three steps: 1) we first synthesize an ensemble ME of dynamic mask and edit function to ensure the opacity and the covertness against a sensor eavesdropping but command non-eavesdropping intruder, and marker-reachability; 2) we then decompose ME into a dynamic mask and an edit function by using a constraint-based approach, with the help of a Boolean satisfiability (SAT) solver; 3) finally, we synthesize a supervisor such that opacity and covertness can be ensured against the sensor-actuator eavesdropping intruder, and at the same time safety and nonblockingness requirement can be ensured.

Privacy Preserving

Privacy-Preserving Supervisory Control of Discrete-Event Systems via Co-Synthesis of Edit Function and Supervisor for Opacity Enforcement and Requirement Satisfaction

no code implementations9 Apr 2021 Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su

We focus on the class of edit functions that satisfy the following properties: 1) the observation capability of the edit function in general can be different from those of the supervisor and the intruder; 2) the edit function can implement insertion, deletion, and replacement operations; 3) the edit function performs bounded edit operations, i. e., the length of each string output of the edit function is upper bounded by a given constant.

Privacy Preserving

Observation-Assisted Heuristic Synthesis of Covert Attackers Against Unknown Supervisors

no code implementations20 Mar 2021 Liyong Lin, Ruochen Tai, Yuting Zhu, Rong Su

In this work, we address the problem of synthesis of covert attackers in the setup where the model of the plant is available, but the model of the supervisor is unknown, to the adversary.

Cannot find the paper you are looking for? You can Submit a new open access paper.