Andrew Clark

Orcid: 0000-0002-5868-6186

Affiliations:
  • Washington University in St. Louis, Department of Electrical and Systems Engineering, MO, USA


According to our database1, Andrew Clark authored at least 126 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach.
IEEE Trans. Autom. Control., October, 2024

Modeling and Designing Non-Pharmaceutical Interventions in Epidemics: A Submodular Approach.
IEEE Control. Syst. Lett., 2024

SEEV: Synthesis with Efficient Exact Verification for ReLU Neural Barrier Functions.
CoRR, 2024

Verification and Synthesis of Compatible Control Lyapunov and Control Barrier Functions.
CoRR, 2024

Learning a Formally Verified Control Barrier Function in Stochastic Environment.
CoRR, 2024

Explicit Formula for Partial Information Decomposition.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Fault Tolerant Neural Control Barrier Functions for Robotic Systems under Sensor Faults and Attacks.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024

Who is Responsible? Explaining Safety Violations in Multi-Agent Cyber-Physical Systems.
Proceedings of the International Conference on Assured Autonomy, 2024

Risk-Aware Distributed Multi-Agent Reinforcement Learning.
Proceedings of the American Control Conference, 2024

A Submodular Approach to Controlled Islanding for Multi-Agent Network Stability.
Proceedings of the American Control Conference, 2024

2023
A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint.
ACM Trans. Cyber Phys. Syst., July, 2023

LQG Reference Tracking With Safety and Reachability Guarantees Under Unknown False Data Injection Attacks.
IEEE Trans. Autom. Control., February, 2023

Robust Satisfaction of Metric Interval Temporal Logic Objectives in Adversarial Environments.
Games, 2023

System Information Decomposition.
CoRR, 2023

A Hybrid Submodular Optimization Approach to Controlled Islanding with Post-Disturbance Stability Guarantees.
CoRR, 2023

Cooperative Perception for Safe Control of Autonomous Vehicles under LiDAR Spoofing Attacks.
CoRR, 2023

Exact Verification of ReLU Neural Control Barrier Functions.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Neural Lyapunov Control for Discrete-Time Systems.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Learning Dissemination Strategies for External Sources in Opinion Dynamic Models with Cognitive Biases.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Efficient Sum of Squares-Based Verification and Construction of Control Barrier Functions by Sampling on Algebraic Varieties.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

A Compositional Resilience Index for Computationally Efficient Safety Analysis of Interconnected Systems.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

Necessary and Sufficient Conditions for Satisfying Linear Temporal Logic Constraints Using Control Barrier Certificates.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

A Submodular Energy Function Approach to Controlled Islanding with Provable Stability.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

Cognitive Bias-Aware Dissemination Strategies for Opinion Dynamics with External Information Sources.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

POSTER: A Common Framework for Resilient and Safe Cyber-Physical System Design.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Preface to the Special Issue on Privacy and Security for Internet of Things.
Int. J. Wirel. Inf. Networks, 2022

Safe Control for Nonlinear Systems under Faults and Attacks via Control Barrier Functions.
CoRR, 2022

A Hybrid Submodular Optimization Approach to Controlled Islanding with Heterogeneous Loads.
Proceedings of the IEEE International Conference on Communications, 2022

Verifying Safety for Resilient Cyber-Physical Systems via Reactive Software Restart.
Proceedings of the 13th ACM/IEEE International Conference on Cyber-Physical Systems, 2022

Barrier Certificate based Safe Control for LiDAR-based Systems under Sensor Faults and Attacks.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

An Analytical Framework for Control Synthesis of Cyber-Physical Systems with Safety Guarantee.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

Abstraction-Free Control Synthesis to Satisfy Temporal Logic Constraints under Sensor Faults and Attacks.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

A Submodular Optimization Approach to Stable and Minimally Disruptive Controlled Islanding in Power Systems.
Proceedings of the American Control Conference, 2022

2021
A Differentially Private Incentive Design for Traffic Offload to Public Transportation.
ACM Trans. Cyber Phys. Syst., 2021

Secure Control in Partially Observable Environments to Satisfy LTL Specifications.
IEEE Trans. Autom. Control., 2021

Optimal Minimum Violation Control Synthesis of Cyber-Physical Systems Under Attacks.
IEEE Trans. Autom. Control., 2021

Robust Maximization of Correlated Submodular Functions Under Cardinality and Matroid Constraints.
IEEE Trans. Autom. Control., 2021

Control barrier functions for stochastic systems.
Autom., 2021

Model-based Reinforcement Learning with Provable Safety Guarantees via Control Barrier Functions.
Proceedings of the IEEE International Conference on Robotics and Automation, 2021

A Game-Theoretic Framework for Controlled Islanding in the Presence of Adversaries.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

Scalable Planning in Multi-Agent MDPs.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

Reinforcement Learning Beyond Expectation.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

Safety-Critical Control Synthesis for Unknown Sampled-Data Systems via Control Barrier Functions.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

Verification and Synthesis of Control Barrier Functions.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

2020
Sensor Placement for Optimal Control of Infinite-Dimensional Systems.
IEEE Trans. Control. Netw. Syst., 2020

Optimal Secure Control With Linear Temporal Logic Constraints.
IEEE Trans. Autom. Control., 2020

A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats.
IEEE Trans. Autom. Control., 2020

Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks.
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020

Submodular Input Selection for Synchronization in Kuramoto Networks.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

Privacy-Preserving Resilience of Cyber-Physical Systems to Adversaries.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

Control Barrier Functions for Abstraction-Free Control Synthesis under Temporal Logic Constraints.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

Control Barrier Functions for Safe CPS Under Sensor Faults and Attacks.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

FRESH: Interactive Reward Shaping in High-Dimensional State Spaces using Human Feedback.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

2019
Cyber-Physical Resilience: Definition and Assessment Metric.
IEEE Trans. Smart Grid, 2019

Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks.
IEEE Trans. Inf. Forensics Secur., 2019

Minimal Input and Output Selection for Stability of Systems With Uncertainties.
IEEE Trans. Autom. Control., 2019

On the Structure and Computation of Random Walk Times in Finite Graphs.
IEEE Trans. Autom. Control., 2019

Linear Temporal Logic Satisfaction in Adversarial Environments Using Secure Control Barrier Certificates.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

A Framework for Joint Attack Detection and Control Under False Data Injection.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Potential-Based Advice for Stochastic Policy Learning.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

Dynamic Information Flow Tracking Games for Simultaneous Detection of Multiple Attackers.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

Robust Maximization of Correlated Submodular Functions.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

Resilient Trajectory Planning in Adversarial Environments.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

A Submodular Optimization Approach to the Metric Traveling Salesman Problem with Neighborhoods.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching.
Proceedings of the 2019 American Control Conference, 2019

Secure Control under Partial Observability with Temporal Logic Constraints.
Proceedings of the 2019 American Control Conference, 2019

LQG Reference Tracking with Safety and Reachability Guarantees under False Data Injection Attacks.
Proceedings of the 2019 American Control Conference, 2019

Control Barrier Functions for Complete and Incomplete Information Stochastic Systems.
Proceedings of the 2019 American Control Conference, 2019

2018
Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach.
IEEE Trans. Control. Netw. Syst., 2018

Combinatorial Algorithms for Control of Biological Regulatory Networks.
IEEE Trans. Control. Netw. Syst., 2018

A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats.
CoRR, 2018

Maximizing the smallest eigenvalue of a symmetric matrix: A submodular optimization approach.
Autom., 2018

Cloaking the clock: emulating clock skew in controller area networks.
Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems, 2018

A Differentially Private and Truthful Incentive Mechanism for Traffic Offload to Public Transportation.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Multi-stage Dynamic Information Flow Tracking Game.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Minimum Violation Control Synthesis on Cyber-Physical Systems under Attacks.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Input Selection for Performance, Stabilizability, and Controllability of Structured Linear Descriptor Systems.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Modeling and Mitigating the Coremelt Attack.
Proceedings of the 2018 Annual American Control Conference, 2018

Secure Control Under Linear Temporal Logic Constraints.
Proceedings of the 2018 Annual American Control Conference, 2018

Linear Quadratic Gaussian Control Under False Data Injection Attacks.
Proceedings of the 2018 Annual American Control Conference, 2018

2017
Toward Synchronization in Networks With Nonlinear Dynamics: A Submodular Optimization Framework.
IEEE Trans. Autom. Control., 2017

Input Selection for Performance and Controllability of Structured Linear Descriptor Systems.
SIAM J. Control. Optim., 2017

A submodular optimization approach to controlled islanding under cascading failure.
Proceedings of the 8th International Conference on Cyber-Physical Systems, 2017

Minimal input selection for robust control.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017

Discrete-time fractional-order multiple scenario-based sensor selection.
Proceedings of the 2017 American Control Conference, 2017

A submodular optimization approach to leader-follower consensus in networks with negative edges.
Proceedings of the 2017 American Control Conference, 2017

2016
Submodularity in Input Node Selection for Networked Systems.
CoRR, 2016

Towards Scalable Voltage Control in Smart Grid: A Submodular Optimization Approach.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

MinGen: Minimal generator set selection for small signal stability in power systems: A submodular framework.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

Distributed adaptive patching strategies against malware propagation: A passivity approach.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

2015
Scalable and distributed submodular maximization with matroid constraints.
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015

Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

A host takeover game model for competing malware.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Input selection for disturbance rejection in networked cyber-physical systems.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Passivity framework for composition and mitigation of multi-virus propagation in networked systems.
Proceedings of the American Control Conference, 2015

Jamming-based adversarial control of network flow allocation: A passivity approach.
Proceedings of the American Control Conference, 2015

2014
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems.
IEEE Trans. Autom. Control., 2014

A Supermodular Optimization Framework for Leader Selection Under Link Noise in Linear Multi-Agent Systems.
IEEE Trans. Autom. Control., 2014

Minimizing Convergence Error in Multi-Agent Systems Via Leader Selection: A Supermodular Optimization Approach.
IEEE Trans. Autom. Control., 2014

Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework.
CoRR, 2014

Distributed online submodular maximization in resource-constrained networks.
Proceedings of the 12th International Symposium on Modeling and Optimization in Mobile, 2014

2013
Toward a Statistical Framework for Source Anonymity in Sensor Networks.
IEEE Trans. Mob. Comput., 2013

Using Social Information for Flow Allocation in MANETs.
CoRR, 2013

Modeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach.
Proceedings of the Control of Cyber-Physical Systems, 2013

Deployment and exploitation of deceptive honeybots in social networks.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

Effectiveness of IP address randomization in decoy-based moving target defense.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

An impact-aware defense against Stuxnet.
Proceedings of the American Control Conference, 2013

Joint leader and link weight selection for fast convergence in multi-agent systems.
Proceedings of the American Control Conference, 2013

2012
Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification.
IEEE Trans. Parallel Distributed Syst., 2012

SODEXO: A System Framework for Deployment and Exploitation of Deceptive Honeybots in Social Networks
CoRR, 2012

Leader selection for minimizing convergence error in leader-follower systems: A supermodular optimization approach.
Proceedings of the 10th International Symposium on Modeling and Optimization in Mobile, 2012

Leader selection games under link noise injection attacks.
Proceedings of the 1st International Conference on High Confidence Networked Systems (HiCoNS, 2012

Deceptive Routing in Relay Networks.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Deceptive routing games.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

On leader selection for performance and controllability in multi-agent systems.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

Leader selection in multi-agent systems for smooth convergence via fast mixing.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

A passivity-based framework for composing attacks on networked control systems.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Maximizing Influence in Competitive Environments: A Game-Theoretic Approach.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

A submodular optimization framework for leader selection in linear multi-agent systems.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

2010
The power of primes: security of authentication based on a universal hash-function family.
J. Math. Cryptol., 2010

A Metric for Quantifying Key Exposure Vulnerability in Wireless Sensor Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Statistical Framework for Source Anonymity in Sensor Networks.
Proceedings of the Global Communications Conference, 2010


  Loading...