Undetectable Timing-Attack on Linear State-Estimation by Using Rank-1 Approximation
نویسندگان
چکیده
منابع مشابه
Blind Blur Estimation Using Low Rank Approximation of Cepstrum
The quality of image restoration from degraded images is highly dependent upon a reliable estimate of blur. This paper proposes a blind blur estimation technique based on the low rank approximation of cepstrum. The key idea that this paper presents is that the blur functions usually have low ranks when compared with ranks of real images and can be estimated from cepstrum of degraded images. We ...
متن کاملParameter Estimation in Spatial Generalized Linear Mixed Models with Skew Gaussian Random Effects using Laplace Approximation
Spatial generalized linear mixed models are used commonly for modelling non-Gaussian discrete spatial responses. We present an algorithm for parameter estimation of the models using Laplace approximation of likelihood function. In these models, the spatial correlation structure of data is carried out by random effects or latent variables. In most spatial analysis, it is assumed that rando...
متن کاملLow Rank Matrix Approximation in Linear Time
Given a matrix M with n rows and d columns, and fixed k and ε, we present an algorithm that in linear time (i.e., O(N)) computes a k-rank matrix B with approximation error ‖M−B‖2F ≤ (1+ ε)μopt(M, k), where N = nd is the input size, and μopt(M, k) is the minimum error of a k-rank approximation to M. This algorithm succeeds with constant probability, and to our knowledge it is the first linear-ti...
متن کاملOn the Approximation of Pseudo Linear Systems by Linear Time Varying Systems (RESEARCH NOTE)
This paper presents a modified method for approximating nonlinear systems by a sequence of linear time varying systems. The convergence proof is outlined and the potential of this methodology is discussed. Simulation results are used to show the effectiveness of the proposed method.
متن کاملA Timing Attack on RC5
This paper describes a timing attack on the RC5 block encryption algorithm. The analysis is motivated by the possibility that some implementations of RC5 could result in the data-dependent rotations taking a time that is a function of the data. Assuming that encryption timing measurements can be made which enable the cryptanalyst to deduce the total amount of rotations carried out during an enc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Smart Grid
سال: 2018
ISSN: 1949-3053,1949-3061
DOI: 10.1109/tsg.2016.2634124