Publications by Henrik Sandberg
Peer reviewed
Articles
[1]
F. Chen et al., "An Extended Frequency-Domain Passivity Theory for MIMO Dynamics Specifications of Voltage-Source Inverters," IEEE transactions on power electronics, vol. 40, no. 2, pp. 2943-2957, 2025.
[2]
S. Gracy et al., "Modeling and analysis of a coupled SIS bi-virus model," Automatica, vol. 171, 2025.
[3]
I. Ziemann and H. Sandberg, "Regret Lower Bounds for Learning Linear Quadratic Gaussian Systems," IEEE Transactions on Automatic Control, vol. 70, no. 1, pp. 159-173, 2025.
[4]
H. Sasahara and H. Sandberg, "Asymptotic Security using Bayesian Defense Mechanism with Application to Cyber Deception," IEEE Transactions on Automatic Control, vol. 69, no. 8, pp. 5004-5019, 2024.
[5]
A. Janson et al., "Competitive networked bi-virus spread : existence of coexistence equilibria," Mathematical Biosciences, vol. 377, 2024.
[6]
F. Chen et al., "Limitations of Using Passivity Index to Analyze Grid-Inverter Interactions," IEEE transactions on power electronics, vol. 39, no. 11, pp. 14465-14477, 2024.
[7]
K. Hassan, D. Selvaratnam and H. Sandberg, "On Resilience Guarantees by Finite-Time Robust Control Barrier Functions With Application to Power Inverter Networks," IEEE Open Journal of Control Systems, vol. 3, pp. 497-513, 2024.
[8]
V. Molnö and H. Sandberg, "On well-posedness of the leak localization problem in parallel pipe networks," Automatica, vol. 167, 2024.
[9]
K. C. Sou and H. Sandberg, "Resilient Scheduling of Control Software Updates in Radial Power Distribution Systems," IEEE Transactions on Control of Network Systems, vol. 11, no. 3, pp. 1465-1477, 2024.
[10]
J. Milosevic et al., "Strategic Monitoring of Networked Systems with Heterogeneous Security Levels," IEEE Transactions on Control of Network Systems, vol. 11, no. 3, pp. 1165-1176, 2024.
[11]
L. Harnefors et al., "VSC Multifrequency Input-Admittance Modeling With Linear Time-Periodic PWM Representation," IEEE Journal of Emerging and Selected Topics in Power Electronics, vol. 12, no. 4, pp. 3812-3822, 2024.
[12]
H. Sasahara et al., "Distributed Design of Glocal Controllers via Hierarchical Model Decomposition," IEEE Transactions on Automatic Control, vol. 68, no. 10, pp. 6146-6159, 2023.
[13]
D. Umsonst, J. Ruths and H. Sandberg, "Finite Sample Guarantees for Quantile Estimation : An Application to Detector Threshold Tuning," IEEE Transactions on Control Systems Technology, vol. 31, no. 2, pp. 921-928, 2023.
[14]
R. Alisic, J. Kim and H. Sandberg, "Model-Free Undetectable Attacks on Linear Systems Using LWE-Based Encryption," IEEE Control Systems Letters, vol. 7, pp. 1249-1254, 2023.
[15]
P. E. Pare et al., "Multilayer SIS Model With an Infrastructure Network," IEEE Transactions on Control of Network Systems, vol. 10, no. 1, pp. 295-307, 2023.
[16]
A. Alanwar et al., "Privacy-preserving set-based estimation using partially homomorphic encryption," European Journal of Control, vol. 71, pp. 100786, 2023.
[17]
E. Tegling, B. Bamieh and H. Sandberg, "Scale fragilities in localized consensus dynamics," Automatica, vol. 153, 2023.
[18]
T. Keijzer, R. M. G. Ferrari and H. Sandberg, "Secure State Estimation Under Actuator and Sensor Attacks Using Sliding Mode Observers," IEEE Control Systems Letters, vol. 7, pp. 2071-2076, 2023.
[19]
M. Pirani et al., "A Game-Theoretic Framework for Security-Aware Sensor Placement Problem in Networked Control Systems," IEEE Transactions on Automatic Control, vol. 67, no. 7, pp. 3699-3706, 2022.
[20]
E. Nekouei et al., "A Model Randomization Approach to Statistical Parameter Privacy," IEEE Transactions on Automatic Control, pp. 1-1, 2022.
[21]
E. Nekouei et al., "A Randomized Filtering Strategy Against Inference Attacks on Active Steering Control Systems," IEEE Transactions on Information Forensics and Security, vol. 17, pp. 16-27, 2022.
[22]
R. Alisic, P. E. Paré and H. Sandberg, "Change time estimation uncertainty in nonlinear dynamical systems with applications to COVID-19," International Journal of Robust and Nonlinear Control, 2022.
[23]
J. Kim et al., "Comparison of encrypted control approaches and tutorial on dynamic systems using Learning With Errors-based homomorphic encryption," Annual Reviews in Control, vol. 54, pp. 200-218, 2022.
[24]
H. Sasahara and H. Sandberg, "Epistemic Signaling Games for Cyber Deception with Asymmetric Recognition," IEEE Control Systems Letters, vol. 6, pp. 854-859, 2022.
[25]
D. Umsonst and H. Sandberg, "Experimental evaluation of sensor attacks and defense mechanisms in feedback systems," Control Engineering Practice, vol. 124, 2022.
[26]
J. Chen et al., "Geometrical Characterization Of Sensor Placement For Cone-Invariant And Multi-Agent Systems Against Undetectable Zero-Dynamics Attacks\Ast," SIAM Journal of Control and Optimization, vol. 60, no. 2, pp. 890-916, 2022.
[27]
D. Han et al., "Privacy-Preserving Dual Averaging with Arbitrary Initial Conditions for Distributed Optimization," IEEE Transactions on Automatic Control, vol. 67, no. 6, pp. 3172-3179, 2022.
[28]
H. Sandberg, V. Gupta and K. H. Johansson, "Secure Networked Control Systems," ANNUAL REVIEW OF CONTROL ROBOTICS AND AUTONOMOUS SYSTEMS, vol. 5, no. 1, pp. 445-464, 2022.
[29]
T. Tanaka, H. Sandberg and M. Skoglund, "Transfer-Entropy-Regularized Markov Decision Processes," IEEE Transactions on Automatic Control, pp. 1944-1951, 2022.
[30]
Y. Liao, H. Sandberg and X. Wang, "Vector-Norm Based Truncation of Harmonic Transfer Functions in Black-Box Electronic Power Systems," IEEE OPEN JOURNAL OF THE INDUSTRIAL ELECTRONICS SOCIETY, vol. 3, pp. 163-173, 2022.
[31]
M. Pirani et al., "A Graph-Theoretic Equilibrium Analysis of Attacker-Defender Game on Consensus Dynamics Under $\mathcal{H}_2$ Performance Metric," IEEE Transactions on Network Science and Engineering, vol. 8, no. 3, pp. 1991-2000, 2021.
[32]
S. Gracy et al., "Analysis and Distributed Control of Periodic Epidemic Processes," IEEE Transactions on Control of Network Systems, vol. 8, no. 1, pp. 123-134, 2021.
[33]
H. Sasahara et al., "Disconnection-Aware Attack Detection and Isolation With Separation-Based Detector Reconfiguration," IEEE Transactions on Control Systems Technology, pp. 1-16, 2021.
[34]
X. He et al., "How to Secure Distributed Filters Under Sensor Attacks," IEEE Transactions on Automatic Control, pp. 1-1, 2021.
[35]
T. Iwaki et al., "Multi-hop sensor network scheduling for optimal remote estimation?," Automatica, vol. 127, 2021.
[36]
I. Ziemann and H. Sandberg, "On a Phase Transition of Regret in Linear Quadratic Control : The Memoryless Case," IEEE Control Systems Letters, vol. 5, no. 2, pp. 695-700, 2021.
[37]
D. Umsonst and H. Sandberg, "On the confidentiality of controller states under sensor attacks," Automatica, vol. 123, 2021.
[38]
E. Nekouei et al., "Optimal Privacy-aware Estimation," IEEE Transactions on Automatic Control, pp. 1-1, 2021.
[39]
S. Gracy, J. Milosevic and H. Sandberg, "Security index based on perfectly undetectable attacks : Graph-theoretic conditions," Automatica, vol. 134, 2021.
[40]
J. Milosevic et al., "Actuator Security Indices Based on Perfect Undetectability : Computation, Robustness, and Sensor Placement," IEEE Transactions on Automatic Control, vol. 65, no. 9, pp. 3816-3831, 2020.
[41]
J. Milosevic, H. Sandberg and K. H. Johansson, "Estimating the impact of cyber-attack strategies for stochastic networked control systems," IEEE Transactions on Control of Network Systems, vol. 7, no. 2, pp. 747-757, 2020.
[42]
J. Wei et al., "Finite-time consensus protocols for multi-dimensional multi-agent systems," Control Theory and Technology, vol. 18, no. 4, pp. 419-430, 2020.
[43]
M. G. de Medeiros, K. C. Sou and H. Sandberg, "Minimum-time Secure Rollout of Software Updates for Controllable Power Loads," Electric power systems research, vol. 189, 2020.
[44]
I. Ziemann and H. Sandberg, "Regret Lower Bounds for Unbiased Adaptive Control of Linear Quadratic Regulators," IEEE Control Systems Letters, vol. 4, no. 3, pp. 785-790, 2020.
[45]
J. Miloševiç et al., "Security Measure Allocation for Industrial Control Systems : Exploiting Systematic Search Techniques and Submodularity," International Journal of Robust and Nonlinear Control, vol. 30, no. 11, pp. 4278-4302, 2020.
[46]
M. Pirani, H. Sandberg and K. H. Johansson, "A Graph-Theoretic Approach to the H ∞ Performance of Leader-Follower Consensus on Directed Networks," IEEE Control Systems Letters, vol. 3, no. 4, pp. 954-959, 2019.
[47]
F. Farokhi and H. Sandberg, "Ensuring privacy with constrained additive noise by minimizing Fisher information," Automatica, vol. 99, pp. 275-288, 2019.
[48]
E. Tegling and H. Sandberg, "Noise-induced limitations to the scalability of distributed integral control," Systems & control l