pith. sign in

Data-driven attack detection for linear systems.IEEE Control Systems Letters, 5(2):671–676

1 Pith paper cite this work. Polarity classification is still indexing.

1 Pith paper citing it

citation-role summary

background 1

citation-polarity summary

fields

eess.SY 1

years

2026 1

verdicts

UNVERDICTED 1

roles

background 1

polarities

background 1

representative citing papers

How Sensor Attacks Transfer Across Lie Groups

eess.SY · 2026-04-03 · unverdicted · novelty 7.0

Sensor attacks on Lie group dynamics transfer successfully only if they commute with the nominal flow via a Lie bracket condition, confining them to an invariant subspace where residuals remain unaltered.

citing papers explorer

Showing 1 of 1 citing paper.

  • How Sensor Attacks Transfer Across Lie Groups eess.SY · 2026-04-03 · unverdicted · none · ref 22

    Sensor attacks on Lie group dynamics transfer successfully only if they commute with the nominal flow via a Lie bracket condition, confining them to an invariant subspace where residuals remain unaltered.