default search action
Justin Ruths
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c46]Justin Koeln, Trevor J. Bird, Jacob Siefert, Justin Ruths, Herschel C. Pangborn, Neera Jain:
zonoLAB: A MATLAB Toolbox for Set-Based Control Systems Analysis Using Hybrid Zonotopes. ACC 2024: 2513-2520 - [c45]Sahand Hadizadeh Kafash, Justin Ruths:
On the Near Controllability of Single-Input Rank-One Bilinear Systems. ACC 2024: 5406-5411 - 2023
- [j15]Sahand Hadizadeh Kafash, Justin Ruths:
Relaxation of the greatest common divisor condition for the controllability of bilinear systems. Autom. 153: 111048 (2023) - [j14]Navid Hashemi, Justin Ruths:
Codesign for Resilience and Performance. IEEE Trans. Control. Netw. Syst. 10(3): 1387-1399 (2023) - [j13]David Umsonst, Justin Ruths, Henrik Sandberg:
Finite Sample Guarantees for Quantile Estimation: An Application to Detector Threshold Tuning. IEEE Trans. Control. Syst. Technol. 31(2): 921-928 (2023) - [c44]Joshua Ortiz, Alyssa Vellucci, Justin Koeln, Justin Ruths:
Hybrid Zonotopes Exactly Represent ReLU Neural Networks. CDC 2023: 5351-5357 - [c43]Navid Hashemi, Justin Ruths, Jyotirmoy V. Deshmukh:
Convex Optimization-Based Policy Adaptation to Compensate for Distributional Shifts. CDC 2023: 5376-5383 - [c42]Jonas Wagner, Tanner Kogel, Justin Ruths:
Set-Based Anomaly Detector and Stealthy Attack Impact Using Constrained Zonotopes. CDC 2023: 7081-7087 - [i24]Navid Hashemi, Justin Ruths, Jyotirmoy V. Deshmukh:
Convex Optimization-based Policy Adaptation to Compensate for Distributional Shifts. CoRR abs/2304.02324 (2023) - [i23]Joshua Ortiz, Alyssa Vellucci, Justin Koeln, Justin Ruths:
Hybrid Zonotopes Exactly Represent ReLU Neural Networks. CoRR abs/2304.02755 (2023) - [i22]Justin Koeln, Trevor J. Bird, Jacob Siefert, Justin Ruths, Herschel Pangborn, Neera Jain:
zonoLAB: A MATLAB toolbox for set-based control systems analysis using hybrid zonotopes. CoRR abs/2310.15426 (2023) - 2022
- [j12]Venkatraman Renganathan, Navid Hashemi, Justin Ruths, Tyler H. Summers:
Higher-Order Moment-Based Anomaly Detection. IEEE Control. Syst. Lett. 6: 211-216 (2022) - [j11]Venkatraman Renganathan, Benjamin J. Gravell, Justin Ruths, Tyler H. Summers:
Anomaly Detection Under Multiplicative Noise Model Uncertainty. IEEE Control. Syst. Lett. 6: 1873-1878 (2022) - [j10]Sahand Hadizadeh Kafash, Justin Ruths:
LMI Framework for Set Reachability Inclusion in Discrete-Time LTI Systems. IEEE Trans. Autom. Control. 67(6): 2997-3004 (2022) - [c41]David Umsonst, Navid Hashemi, Henrik Sandberg, Justin Ruths:
Practical Detectors to Identify Worst-Case Attacks. CCTA 2022: 197-204 - [c40]Sahand Hadizadeh Kafash, Justin Koeln, Justin Ruths:
Model Predictive Control of Bilinear Systems as Uncertain Linear Systems. CCTA 2022: 562-567 - 2021
- [j9]Karthik Ganapathy, Justin Ruths, Tyler H. Summers:
Performance Bounds for Optimal and Robust Feedback Control in Networks. IEEE Trans. Control. Netw. Syst. 8(4): 1754-1766 (2021) - [c39]David Umsonst, Justin Ruths, Henrik Sandberg:
Sample-based anomaly detector tuning with finite sample guarantees. ACC 2021: 3248-3253 - [c38]Navid Hashemi, Mahyar Fazlyab, Justin Ruths:
Performance Bounds for Neural Network Estimators: Applications in Fault Detection. ACC 2021: 3260-3266 - [c37]Navid Hashemi, Justin Ruths, Mahyar Fazlyab:
Certifying Incremental Quadratic Constraints for Neural Networks via Convex Optimization. L4DC 2021: 842-853 - [i21]Navid Hashemi, Mahyar Fazlyab, Justin Ruths:
Performance Bounds for Neural Network Estimators: Applications in Fault Detection. CoRR abs/2103.12141 (2021) - [i20]Venkatraman Renganathan, Benjamin J. Gravell, Justin Ruths, Tyler H. Summers:
Anomaly Detection Under Multiplicative Noise Model Uncertainty. CoRR abs/2103.15228 (2021) - [i19]David Umsonst, Justin Ruths, Henrik Sandberg:
Finite sample guarantees for quantile estimation: An application to detector threshold tuning. CoRR abs/2105.12239 (2021) - [i18]Navid Hashemi, Justin Ruths:
Generalized Outer Bounds on the Finite Geometric Sum of Ellipsoids. CoRR abs/2107.08912 (2021) - 2020
- [j8]Carlos Murguia, Iman Shames, Justin Ruths, Dragan Nesic:
Security metrics and synthesis of secure control systems. Autom. 115: 108757 (2020) - [c36]Venkatraman Renganathan, Navid Hashemi, Justin Ruths, Tyler H. Summers:
Distributionally Robust Tuning of Anomaly Detectors in Cyber-Physical Systems with Stealthy Attacks. ACC 2020: 1247-1252 - [c35]Navid Hashemi, Justin Ruths:
Gain Design via LMIs to Minimize the Impact of Stealthy Attacks. ACC 2020: 1274-1279 - [c34]Ricardo Cuesta Garcia, Joaquin Alvarez, Justin Ruths, Jonatan Pena Ramirez:
Anomaly detection in systems with periodic outputs. CDC 2020: 3224-3229 - [c33]Jairo Giraldo, Sahand Hadizadeh Kafash, Justin Ruths, Alvaro A. Cárdenas:
DARIA: Designing Actuators to Resist Arbitrary Attacks Against Cyber-Physical Systems. EuroS&P 2020: 339-353 - [i17]Navid Hashemi, Justin Ruths:
Co-design for Security and Performance: Geometric Tools. CoRR abs/2006.08739 (2020) - [i16]Venkatraman Renganathan, Navid Hashemi, Justin Ruths, Tyler H. Summers:
Higher-Order Moment-Based Anomaly Detection. CoRR abs/2011.01522 (2020) - [i15]Navid Hashemi, Justin Ruths, Mahyar Fazlyab:
Certifying Incremental Quadratic Constraints for Neural Networks via Convex Optimization. CoRR abs/2012.05981 (2020)
2010 – 2019
- 2019
- [c32]Navid Hashemi, Justin Ruths:
Generalized chi-squared detector for LTI systems with non-Gaussian noise. ACC 2019: 404-410 - [c31]Navid Hashemi, Eduardo Verdugo German, Jonatan Pena Ramirez, Justin Ruths:
Filtering Approaches for Dealing with Noise in Anomaly Detection. CDC 2019: 5356-5361 - [i14]Navid Hashemi, Justin Ruths:
Generalized chi-squared detector for LTI systems with non-Gaussian noise. CoRR abs/1909.01469 (2019) - [i13]Navid Hashemi, Eduardo Verdugo German, Jonatan Pena Ramirez, Justin Ruths:
Filtering Approaches for Dealing with Noise in Anomaly Detection. CoRR abs/1909.01477 (2019) - [i12]Mark Ditsworth, Justin Ruths:
Community Detection via Katz and Eigenvector Centrality. CoRR abs/1909.03916 (2019) - [i11]Navid Hashemi, Justin Ruths:
Gain Design via LMIs to Minimize the Impact of Stealthy Attacks. CoRR abs/1909.12452 (2019) - [i10]Venkatraman Renganathan, Navid Hashemi, Justin Ruths, Tyler H. Summers:
Distributionally Robust Tuning of Anomaly Detectors in Cyber-Physical Systems with Stealthy Attacks. CoRR abs/1909.12506 (2019) - 2018
- [j7]Jairo Giraldo, David I. Urbina, Alvaro A. Cárdenas, Junia Valente, Mustafa Amir Faisal, Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg, Richard Candell:
A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. ACM Comput. Surv. 51(4): 76:1-76:36 (2018) - [c30]Carlos Murguia, Justin Ruths:
On Reachable Sets of Hidden CPS Sensor Attacks. ACC 2018: 178-184 - [c29]Tyler H. Summers, Justin Ruths:
Performance bounds for optimal feedback control in networks. ACC 2018: 203-209 - [c28]Navid Hashemi, Carlos Murguia, Justin Ruths:
A Comparison of Stealthy Sensor Attacks on Control Systems. ACC 2018: 973-979 - [c27]Sahand Hadizadeh Kafash, Jairo Giraldo, Carlos Murguia, Alvaro A. Cárdenas, Justin Ruths:
Constraining Attacker Capabilities Through Actuator Saturation. ACC 2018: 986-991 - [c26]Tunga R, Carlos Murguia, Justin Ruths:
Tuning Windowed Chi-Squared Detectors for Sensor Attacks. ACC 2018: 1752-1757 - [c25]Chuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou, Aditya P. Mathur, Rizwan Qadeer, Carlos Murguia, Justin Ruths:
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems. AsiaCCS 2018: 483-497 - [c24]Sahand Hadizadeh Kafash, Navid Hashemi, Carlos Murguia, Justin Ruths:
Constraining Attackers and Enabling Operators via Actuation Limits. CDC 2018: 4535-4540 - [c23]Justin Ruths, Bijoy K. Ghosh:
Helmholtzian Strategy to Stay in Focus with Binocular Vision. ECC 2018: 2380-2386 - [i9]Carlos Murguia, Iman Shames, Justin Ruths, Dragan Nesic:
Security Metrics of Networked Control Systems under Sensor Attacks (extended preprint). CoRR abs/1809.01808 (2018) - 2017
- [j6]Supratim Ghosh, Justin Ruths, Anders Yeo:
Graphical coprime walk algorithm for structural controllability of discrete-time rank-one bilinear systems. Autom. 86: 166-173 (2017) - [j5]Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya Mathur:
A comprehensive approach, and a case study, for conducting attack detection experiments in Cyber-Physical Systems. Robotics Auton. Syst. 98: 174-191 (2017) - [c22]Chuadhry Mujeeb Ahmed, Carlos Murguia, Justin Ruths:
Model-based Attack Detection Scheme for Smart Water Distribution Networks. AsiaCCS 2017: 101-113 - [c21]Rizwan Qadeer, Carlos Murguia, Chuadhry Mujeeb Ahmed, Justin Ruths:
Multistage Downstream Attack Detection in a Cyber Physical System. CyberICPS/SECPRE@ESORICS 2017: 177-185 - [c20]Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya Mathur:
Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems. PRDC 2017: 235-244 - [i8]Tyler H. Summers, Justin Ruths:
Performance bounds for optimal feedback control in networks. CoRR abs/1707.04528 (2017) - [i7]Tunga R, Carlos Murguia, Justin Ruths:
Tuning Windowed Chi-Squared Detectors for Sensor Attacks. CoRR abs/1710.02573 (2017) - [i6]Sahand Hadizadeh Kafash, Jairo Giraldo, Carlos Murguia, Alvaro A. Cárdenas, Justin Ruths:
Constraining Attacker Capabilities Through Actuator Saturation. CoRR abs/1710.02576 (2017) - [i5]Navid Hashemi, Carlos Murguia, Justin Ruths:
A Comparison of Stealthy Sensor Attacks on Control Systems. CoRR abs/1710.02597 (2017) - [i4]Carlos Murguia, Justin Ruths:
Characterization of Model-Based Detectors for CPS Sensor Faults/Attacks. CoRR abs/1710.04407 (2017) - [i3]Carlos Murguia, Justin Ruths:
On Reachable Sets of Hidden CPS Sensor Attacks. CoRR abs/1710.06967 (2017) - [i2]Carlos Murguia, Henk Nijmeijer, Justin Ruths:
Synchronization in Networks of Diffusively Coupled Nonlinear Systems: Robustness Against Time-Delays. CoRR abs/1710.11276 (2017) - 2016
- [j4]Supratim Ghosh, Justin Ruths:
Structural control of single-input rank one bilinear systems. Autom. 64: 8-17 (2016) - [c19]Carlos Murguia, Justin Ruths:
CUSUM and chi-squared attack detection of compromised sensors. CCA 2016: 474-480 - [c18]David I. Urbina, Jairo Alonso Giraldo, Alvaro A. Cárdenas, Nils Ole Tippenhauer, Junia Valente, Mustafa Amir Faisal, Justin Ruths, Richard Candell, Henrik Sandberg:
Limiting the Impact of Stealthy Attacks on Industrial Control Systems. CCS 2016: 1092-1105 - [c17]Carlos Murguia, Justin Ruths:
Characterization of a CUSUM model-based sensor attack detector. CDC 2016: 1303-1309 - [c16]Barnabé Monnot, Justin Ruths:
Sensitivity of Network Controllability to Weight-Based Edge Thresholding. CompleNet 2016: 45-61 - [c15]Jijju Thomas, Supratim Ghosh, Deven Parekh, Derek Ruths, Justin Ruths:
Robustness of Network Controllability to Degree-Based Edge Attacks. COMPLEX NETWORKS 2016: 525-537 - [c14]Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya P. Mathur:
Empirical Assessment of Corrupt Sensor Data Detection Methods in a Robot. COMPSAC Workshops 2016: 482-489 - [c13]Justin Ruths, Supratim Ghosh, Bijoy K. Ghosh:
Optimal tracking of version and vergence eye movements in human binocular control. ECC 2016: 2410-2415 - [c12]Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya P. Mathur:
Empirical Assessment of Methods to Detect Cyber Attacks on a Robot. HASE 2016: 248-251 - 2015
- [c11]Supratim Ghosh, Justin Ruths:
Closing the gap between controllability and structural controllability. CDC 2015: 974-979 - [c10]Zak Costello, Justin Ruths, Magnus Egerstedt:
On the construction of local interaction rules that perform global linear computation. CDC 2015: 2588-2593 - [c9]Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya P. Mathur:
Experimental Evaluation of Stealthy Attack Detection in a Robot. PRDC 2015: 70-79 - 2014
- [j3]Indika Wijayasinghe, Justin Ruths, Ulrich Büttner, Bijoy K. Ghosh, Stefan Glasauer, Olympia Kremmyda, Jr-Shin Li:
Potential and optimal control of human head movement using Tait-Bryan parametrization. Autom. 50(2): 519-529 (2014) - [c8]Supratim Ghosh, Justin Ruths:
Control configuration design for a class of structural bilinear systems. Allerton 2014: 597-604 - [c7]Supratim Ghosh, Justin Ruths:
On structural controllability of a class of bilinear systems. CDC 2014: 3137-3142 - [c6]Deven Parekh, Derek Ruths, Justin Ruths:
Reachability-Based Robustness of Network Controllability under Node and Edge Attacks. SITIS 2014: 424-431 - [c5]Nishant Sinha, Peter Neal Taylor, Justin Dauwels, Justin Ruths:
Development of optimal stimuli in a heterogeneous model of epileptic spike-wave oscillations. SMC 2014: 3160-3165 - 2013
- [j2]Jr-Shin Li, Isuru Dasanayake, Justin Ruths:
Control and Synchronization of Neuron Ensembles. IEEE Trans. Autom. Control. 58(8): 1919-1930 (2013) - [c4]Justin Ruths, Derek Ruths:
Robustness of Network Controllability under Edge Removal. CompleNet 2013: 185-193 - [c3]Flora S. Tsai, Karthik Natarajan, Selin Damla Ahipasaoglu, Chau Yuen, Hyowon Lee, Ngai-Man Cheung, Justin Ruths, Shisheng Huang, Thomas L. Magnanti:
From Boxes to bees: Active learning in freshmen calculus. EDUCON 2013: 59-68 - 2012
- [j1]Justin Ruths, Jr-Shin Li:
Optimal Control of Inhomogeneous Ensembles. IEEE Trans. Autom. Control. 57(8): 2021-2032 (2012) - 2011
- [c2]Justin Ruths, Anatoly Zlotnik, Jr-Shin Li:
Convergence of a pseudospectral method for optimal control of complex dynamical systems. CDC/ECC 2011: 5553-5558 - [i1]Justin Ruths, Jr-Shin Li:
Optimal Control of Inhomogeneous Ensembles. CoRR abs/1102.3713 (2011) - 2010
- [c1]Justin Ruths, Jr-Shin Li:
Optimal ensemble control of open quantum systems with a pseudospectral method. CDC 2010: 3008-3013
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint