{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:S6YH525YSCF5TGFPZYFIDL7PXU","short_pith_number":"pith:S6YH525Y","schema_version":"1.0","canonical_sha256":"97b07eebb8908bd998afce0a81afefbd10e7b3b32014c49a94cf9e9b6eb812fe","source":{"kind":"arxiv","id":"1907.07556","version":1},"attestation_state":"computed","paper":{"title":"Optimal Secure Control with Linear Temporal Logic Constraints","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.SY"],"primary_cat":"eess.SY","authors_text":"Andrew Clark, Luyao Niu","submitted_at":"2019-07-17T14:58:57Z","abstract_excerpt":"Prior work on automatic control synthesis for cyber-physical systems under logical constraints has primarily focused on environmental disturbances or modeling uncertainties, however, the impact of deliberate and malicious attacks has been less studied. In this paper, we consider a discrete-time dynamical system with a linear temporal logic (LTL) constraint in the presence of an adversary, which is modeled as a stochastic game. We assume that the adversary observes the control policy before choosing an attack strategy. We investigate two problems. In the first problem, we synthesize a robust co"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1907.07556","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"eess.SY","submitted_at":"2019-07-17T14:58:57Z","cross_cats_sorted":["cs.SY"],"title_canon_sha256":"b579311f215c936320b18d248ba9c58b82b03efb749313ae4aa7b38c6c89eeae","abstract_canon_sha256":"4f684f2c85e11a0aeee085540cadd17d0d4bc4f515f368cb3e1f64c9cfc1c610"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:39:39.223685Z","signature_b64":"Pof65QU7C45Cf8KJOKzXL+bvDOaVSnPO6NWSyMpn1oWnaKi5erJop1YwWleHAsLQB8/0wts9FoISa3E/um+bDA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"97b07eebb8908bd998afce0a81afefbd10e7b3b32014c49a94cf9e9b6eb812fe","last_reissued_at":"2026-05-17T23:39:39.223144Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:39:39.223144Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Optimal Secure Control with Linear Temporal Logic Constraints","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.SY"],"primary_cat":"eess.SY","authors_text":"Andrew Clark, Luyao Niu","submitted_at":"2019-07-17T14:58:57Z","abstract_excerpt":"Prior work on automatic control synthesis for cyber-physical systems under logical constraints has primarily focused on environmental disturbances or modeling uncertainties, however, the impact of deliberate and malicious attacks has been less studied. In this paper, we consider a discrete-time dynamical system with a linear temporal logic (LTL) constraint in the presence of an adversary, which is modeled as a stochastic game. We assume that the adversary observes the control policy before choosing an attack strategy. We investigate two problems. In the first problem, we synthesize a robust co"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1907.07556","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1907.07556","created_at":"2026-05-17T23:39:39.223222+00:00"},{"alias_kind":"arxiv_version","alias_value":"1907.07556v1","created_at":"2026-05-17T23:39:39.223222+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1907.07556","created_at":"2026-05-17T23:39:39.223222+00:00"},{"alias_kind":"pith_short_12","alias_value":"S6YH525YSCF5","created_at":"2026-05-18T12:33:27.125529+00:00"},{"alias_kind":"pith_short_16","alias_value":"S6YH525YSCF5TGFP","created_at":"2026-05-18T12:33:27.125529+00:00"},{"alias_kind":"pith_short_8","alias_value":"S6YH525Y","created_at":"2026-05-18T12:33:27.125529+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/S6YH525YSCF5TGFPZYFIDL7PXU","json":"https://pith.science/pith/S6YH525YSCF5TGFPZYFIDL7PXU.json","graph_json":"https://pith.science/api/pith-number/S6YH525YSCF5TGFPZYFIDL7PXU/graph.json","events_json":"https://pith.science/api/pith-number/S6YH525YSCF5TGFPZYFIDL7PXU/events.json","paper":"https://pith.science/paper/S6YH525Y"},"agent_actions":{"view_html":"https://pith.science/pith/S6YH525YSCF5TGFPZYFIDL7PXU","download_json":"https://pith.science/pith/S6YH525YSCF5TGFPZYFIDL7PXU.json","view_paper":"https://pith.science/paper/S6YH525Y","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1907.07556&json=true","fetch_graph":"https://pith.science/api/pith-number/S6YH525YSCF5TGFPZYFIDL7PXU/graph.json","fetch_events":"https://pith.science/api/pith-number/S6YH525YSCF5TGFPZYFIDL7PXU/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/S6YH525YSCF5TGFPZYFIDL7PXU/action/timestamp_anchor","attest_storage":"https://pith.science/pith/S6YH525YSCF5TGFPZYFIDL7PXU/action/storage_attestation","attest_author":"https://pith.science/pith/S6YH525YSCF5TGFPZYFIDL7PXU/action/author_attestation","sign_citation":"https://pith.science/pith/S6YH525YSCF5TGFPZYFIDL7PXU/action/citation_signature","submit_replication":"https://pith.science/pith/S6YH525YSCF5TGFPZYFIDL7PXU/action/replication_record"}},"created_at":"2026-05-17T23:39:39.223222+00:00","updated_at":"2026-05-17T23:39:39.223222+00:00"}