Bruno Sinópoli
#166,131
Most Influential Person Now
Bruno Sinópoli's AcademicInfluence.com Rankings
Bruno Sinópoliengineering Degrees
Engineering
#7359
World Rank
#8728
Historical Rank
Electrical Engineering
#2289
World Rank
#2396
Historical Rank
Applied Physics
#2535
World Rank
#2576
Historical Rank

Download Badge
Engineering
Bruno Sinópoli's Degrees
- PhD Electrical Engineering and Computer Sciences University of California, Berkeley
- Masters Electrical Engineering and Computer Sciences University of California, Berkeley
- Bachelors Electrical Engineering University of São Paulo
Why Is Bruno Sinópoli Influential?
(Suggest an Edit or Addition)Bruno Sinópoli's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Kalman filtering with intermittent observations (2004) (1717)
- Foundations of Control and Estimation Over Lossy Networks (2007) (1303)
- Cyber–Physical Security of a Smart Grid Infrastructure (2012) (953)
- A Control-Theoretic Approach for Dynamic Adaptive Video Streaming over HTTP (2015) (795)
- Kalman filtering with intermittent observations (2003) (752)
- Secure control against replay attacks (2009) (714)
- Detecting Integrity Attacks on SCADA Systems (2014) (479)
- Challenges for Securing Cyber Physical Systems (2009) (443)
- Integrity Data Attacks in Power Market Operations (2011) (410)
- Distributed control applications within sensor networks (2003) (399)
- False Data Injection Attacks in Electricity Markets (2010) (381)
- False data injection attacks against state estimation in wireless sensor networks (2010) (366)
- Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs (2015) (346)
- CS2P: Improving Video Bitrate Selection and Adaptation with Data-Driven Throughput Prediction (2016) (311)
- False Data Injection Attacks in Control Systems (2010) (290)
- Stochastic event-triggered sensor scheduling for remote state estimation (2013) (259)
- On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks (2016) (255)
- A kernel-based learning approach to ad hoc sensor network localization (2005) (204)
- Sensor selection strategies for state estimation in energy constrained wireless sensor networks (2011) (184)
- A Cyber–Physical Systems Approach to Data Center Modeling and Control for Energy Efficiency (2012) (171)
- Vision based navigation for an unmanned aerial vehicle (2001) (168)
- Secure Estimation in the Presence of Integrity Attacks (2013) (147)
- Kalman Filtering With Intermittent Observations: Weak Convergence to a Stationary Distribution (2009) (142)
- ALPS: A Bluetooth and Ultrasound Platform for Mapping and Localization (2015) (137)
- LQG Control for MIMO Systems Over Multiple Erasure Channels With Perfect Acknowledgment (2012) (133)
- Kalman Filtering With Intermittent Observations: Tail Distribution and Critical Value (2012) (124)
- Optimal Linear LQG Control Over Lossy Networks Without Packet Acknowledgment (2006) (112)
- Integrity attacks on cyber-physical systems (2012) (107)
- Distributed Detection via Gaussian Running Consensus: Large Deviations Asymptotic Analysis (2011) (102)
- Optimal control with unreliable communication: the TCP case (2005) (97)
- A cyber-physical systems approach to energy management in data centers (2010) (95)
- A testbed for secure and robust SCADA systems (2008) (89)
- A characterization of the critical value for Kalman filtering with intermittent observations (2008) (88)
- Multi-Sensor Scheduling for State Estimation With Event-Based, Stochastic Triggers (2015) (88)
- Detection in Adversarial Environments (2014) (88)
- Detecting integrity attacks on control systems using a moving target approach (2015) (87)
- Reducing data center energy consumption via coordinated cooling and load management (2008) (81)
- Sensor Selection for Event Detection in Wireless Sensor Networks (2010) (79)
- Toward a Principled Framework to Design Dynamic Adaptive Streaming Algorithms over HTTP (2014) (79)
- An LQG Optimal Linear Controller for Control Systems with Packet Losses (2005) (72)
- Detecting integrity attacks on control systems using robust physical watermarking (2014) (72)
- Stochastic Sensor Scheduling for Energy Constrained Estimation in Multi-Hop Wireless Sensor Networks (2011) (70)
- LQG control over lossy TCP-like networks with probabilistic packet acknowledgements (2008) (65)
- A Graph-Theoretic Characterization of Perfect Attackability for Secure Design of Distributed Control Systems (2017) (64)
- A hierarchical hybrid system model and its simulation (1999) (59)
- Resilient Detection in the Presence of Integrity Attacks (2014) (58)
- Is your commute driving you crazy?: a study of misbehavior in vehicular platoons (2015) (57)
- False Data Injection Attacks for State Estimation in Cyber-Physical Systems (2010) (53)
- Simulation of Network Attacks on SCADA Systems (2010) (53)
- Distributed Joint Attack Detection and Secure State Estimation (2018) (51)
- Large Deviations Performance of Consensus+Innovations Distributed Detection With Non-Gaussian Observations (2011) (50)
- Beacon placement for range-based indoor localization (2016) (48)
- Receding Horizon Networked Control (2006) (46)
- Guest Editorial Special Issue on Secure Control of Cyber-Physical Systems (2017) (44)
- Hybrid Control of an Autonomous Helicopter (1998) (44)
- Network observability and localization of the source of diffusion based on a subset of nodes (2013) (42)
- LQG control for distributed systems over TCP-like erasure channels (2007) (42)
- Time varying optimal control with packet losses (2004) (41)
- LQG control with Markovian packet loss (2013) (40)
- IEEE Transactions on Control of Network Systems (2018) (39)
- Multiple Source Detection and Localization in Advection-Diffusion Processes Using Wireless Sensor Networks (2009) (36)
- Towards Finding the Critical Value for Kalman Filtering with Intermittent Observations (2010) (35)
- Ultrasonic time synchronization and ranging on smartphones (2015) (35)
- A Relaxation Approach to Dynamic Sensor Selection in Large-Scale Wireless Networks (2008) (34)
- Cyber Meets Control: A Novel Federated Approach for Resilient CPS Leveraging Real Cyber Threat Intelligence (2017) (34)
- Hierarchical Hybrid System Design on Berkeley UAV (1998) (33)
- Effective Sensor Scheduling Schemes in a Sensor Network by Employing Feedback in the Communication Loop (2007) (32)
- Feasibility and Detection of Replay Attack in Networked Constrained Cyber-Physical Systems (2019) (32)
- A Moving Target Defense for Securing Cyber-Physical Systems (2019) (32)
- On infinite-horizon sensor scheduling (2014) (31)
- Information flow for security in control systems (2016) (31)
- Estimation over Wireless Sensor Networks (2007) (31)
- A formal approach to reactive system design: unmanned aerial vehicle flight management system design example (1999) (31)
- A Bayesian approach to joint attack detection and resilient state estimation (2016) (30)
- Consensus and Products of Random Stochastic Matrices: Exact Rate for Convergence in Probability (2012) (28)
- A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks (2016) (27)
- Mechanisms to Provide Integrity in SCADA and PCS devices ∗ (2008) (26)
- On optimal partial broadcasting of wireless sensor networks for Kalman filtering (2011) (26)
- A moving target approach for identifying malicious sensors in control systems (2016) (26)
- Sensor selection for hypothesis testing in wireless sensor networks: a Kullback-Leibler based approach (2009) (24)
- Distributed sensor localization in Euclidean spaces: Dynamic environments (2008) (24)
- Resilient Control in Cyber-Physical Systems: Countering Uncertainty, Constraints, and Adversarial Behavior (2019) (23)
- Minimum Robust Sensor Placement for Large Scale Linear Time-Invariant Systems: A Structured Systems Approach* (2013) (23)
- LQG CONTROL WITH MISSING OBSERVATION AND CONTROL PACKETS (2005) (22)
- Biases in Data-Driven Networking, and What to Do About Them (2017) (21)
- A hierarchical approach to energy management in data centers (2010) (21)
- Enhancing Indoor Smartphone Location Acquisition Using Floor Plans (2018) (21)
- Sensor scheduling over a packet-delaying network (2011) (21)
- Robust structural analysis and design of distributed control systems to prevent zero dynamics attacks (2017) (21)
- An Optimal Design of a Moving Target Defense for Attack Detection in Control Systems (2019) (20)
- Adversarial detection as a zero-sum game (2012) (20)
- Design of Software Rejuvenation for CPS Security Using Invariant Sets (2018) (19)
- A Bernoulli-Gaussian physical watermark for detecting integrity attacks in control systems (2017) (19)
- Joint attack detection and secure state estimation of cyber‐physical systems (2016) (19)
- Optimal Sensor Scheduling for Remote Estimation over Wireless Sensor Networks (2009) (19)
- An approach to leak detection using wireless sensor networks at carbon sequestration sites (2012) (19)
- Network lifetime maximization via sensor selection (2009) (18)
- Nonlinear estimation using Mean Field Games (2011) (18)
- Unsupervised learning of finite mixture models using mean field games (2011) (17)
- Challenges and Opportunities: Cyber-Physical Security in the Smart Grid (2018) (16)
- Active detection for exposing intelligent attacks in control systems (2017) (16)
- Modeling impact of attacks, recovery, and attackability conditions for situational awareness (2014) (15)
- On the efficiency and fairness of multiplayer HTTP-based adaptive video streaming (2016) (15)
- A Tutorial on Detecting Security Attacks on Cyber-Physical Systems (2019) (15)
- Secure State Estimation of Cyber-Physical Systems Under Switching Attacks (2017) (15)
- Model Predictive Control of Data Centers in the Smart Grid Scenario (2011) (15)
- Robust detection in the presence of integrity attacks (2012) (15)
- Adaptive robust optimization for coordinated capacity and load control in data centers (2014) (15)
- Networked Sensing, Estimation and Control Systems (2009) (14)
- Infinite-horizon sensor scheduling for estimation over lossy networks (2012) (14)
- A distributed explicit reference governor for constrained control of multiple UAVs (2015) (13)
- Distributed detection over time varying networks: Large deviations analysis (2010) (13)
- Distributed Inference Over Directed Networks: Performance Limits and Optimal Design (2015) (13)
- Efficient Beacon Placement Algorithms for Time-of-Flight Indoor Localization (2019) (13)
- A Model Inversion Based Watermark for Replay Attack Detection with Output Tracking (2019) (13)
- Optimal sensor density for remote estimation over Wireless Sensor Networks (2008) (12)
- EchoExplorer(TM): A Game App for Understanding Echolocation and Learning to Navigate Using Echo Cues (2017) (11)
- Kalman Filtering with Intermittent Observations: Critical Value for Second Order System (2011) (11)
- Robust estimation in the presence of integrity attacks (2013) (11)
- Sequential observer selection for source localization (2015) (11)
- Accountability in cyber-physical systems (2016) (11)
- Strategic sensor placement on graphs (2021) (11)
- Optimal Sensing Rate for Estimation over Shared Communication Links (2007) (10)
- A convex optimization approach of multi-step sensor selection under correlated noise (2009) (10)
- Secure Networked Control via Software Rejuvenation (2019) (10)
- Dynamic power allocation in server farms: A Real Time Optimization approach (2010) (10)
- Selecting observers for source localization via error exponents (2015) (9)
- Towards Receding Horizon Networked Control (2007) (9)
- Exploring Edge Computing for Multitier Industrial Control (2020) (9)
- Worst-case analysis of joint attack detection and resilient state estimation (2017) (9)
- Uniform redundancy allocation maximizes the robustness of flow networks against cascading failures (2018) (9)
- Minimum Sensor Placement for Robust Observability of Structured Complex Networks (2015) (8)
- LQ Non-Gaussian Regulator With Markovian Control (2019) (8)
- Reference Governor-Based Fault-Tolerant Constrained Control (2021) (8)
- Physical watermarking for securing cyber physical systems via packet drop injections (2017) (8)
- Optimal LQG Control over Lossy Packet Networks (2005) (7)
- Kalman-like filtering with intermittent observations and non-Gaussian noise (2019) (7)
- Nonlinear modeling of butterfly valves and flow rate control using the Circle Criterion Bode plot (2010) (7)
- Safety and Liveness of Software Rejuvenation for Secure Tracking Control (2019) (6)
- Software Rejuvenation Under Persistent Attacks in Constrained Environments (2020) (6)
- On the Effect of Packet Acknowledgment on the Stability and Performance of Networked Control Systems (2009) (6)
- Communication Complexity and Energy Efficient Consensus Algorithm (2010) (6)
- Active Attack Detection and Control in Constrained Cyber-Physical Systems Under Prevented Actuation Attack (2021) (6)
- Robust linear dimensionality reduction for hypothesis testing with application to sensor selection (2009) (6)
- Extending the metric dimension to graphs with missing edges (2016) (6)
- Demo: ALPS -- The Acoustic Location Processing System (2015) (5)
- Optimal Threshold Policies for Robust Data Center Control (2017) (5)
- Secure Networked Control for Decentralized Systems via Software Rejuvenation (2020) (5)
- Proofs of "LQG Control For MIMO System Over Multiple TCP-like Erasure Channels" (2009) (5)
- Attack Resilient Interconnected Second Order Systems: A Game-Theoretic Approach (2019) (5)
- Using Viterbi and Kalman to detect topological changes in dynamic networks (2017) (5)
- Network Energy Minimization via Sensor Selection and Topology Control (2009) (5)
- Products of stochastic matrices: Large deviation rate for Markov chain temporal dependencies (2012) (5)
- LQG Control OVer Multi-channel TCP-like Erasure Networs With Probabilistic Packet Acknowledgements (2008) (5)
- Physical Watermarking for Replay Attack Detection in Continuous-time Systems (2021) (5)
- Stochastic sensor scheduling in Wireless Sensor Networks with general graph topology (2012) (5)
- Constrained Control of Semilinear Fractional-Order Systems: Application in Drug Delivery Systems (2020) (5)
- Sequential source localization on graphs: A case study of cholera outbreak (2017) (5)
- A Linear Programming Approach to Computing Safe Sets for Software Rejuvenation (2022) (4)
- Resilient Control in Cyber-Physical Systems: Countering Uncertainty, Constraints, and Adversarial Behavior (2020) (4)
- Large deviations analysis of consensus+innovations detection in random networks (2011) (4)
- Sensor scheduling for energy constrained estimation in multi-hop Wireless Sensor Networks (2010) (4)
- MPC-Based Emergency Vehicle-Centered Multi-Intersection Traffic Control (2022) (4)
- A graph theoretic characterization of perfect attackability and detection in Distributed Control Systems (2015) (4)
- Efficient Solutions for Targeted Control of Multi-Agent MDPs (2021) (4)
- Exact rate for convergence in probability of averaging processes via generalized min-cut (2012) (4)
- Collaborative diffusive source localization in wireless sensor networks (2012) (3)
- Asymptotic performance of distributed detection over random networks (2011) (3)
- Control of Parametric Games (2019) (3)
- Performance analysis of linear estimators with unknown changes in sensors characteristics (2013) (3)
- Inferring link changes in dynamic networks through power spectral density variations (2017) (3)
- Sensor placement for reliable observability: a structured systems approach (2016) (3)
- Toward design of risk-based real-time dispatch at value (2015) (3)
- Networked Constrained Cyber-Physical Systems subject to malicious attacks: a resilient set-theoretic control approach (2016) (3)
- A random dynamical systems approach to filtering in large-scale networks (2009) (3)
- Decentralized Event-Triggered Control in the Presence of Adversaries (2020) (3)
- Distributed Linear Estimation Via a Roaming Token (2020) (2)
- Large-scale source localization with a wireless sensor network application (2011) (2)
- Robustness of flow networks against cascading failures under partial load redistribution (2018) (2)
- Reducing Attack Vulnerabilities Through Decentralized Event-Triggered Control (2021) (2)
- Resilient Control in the Presence of Man-in-the-Middle Attacks (2021) (2)
- Robust Software Rejuvenation for CPS with State Estimation and Disturbances (2020) (2)
- Cluster-Based Control of Transition-Independent MDPs (2022) (2)
- Analyzing TCP Throughput Stability and Predictability with Implications for Adaptive Video Streaming (2015) (2)
- Distributed Detection over Random Networks: Large Deviations Performance Analysis (2010) (2)
- Exploring the consequences of cyber attacks on Powertrain Cyber Physical Systems (2022) (2)
- On Partial Observability of Large Scale Linear Systems: A Structured Systems Approach (2018) (2)
- ROTEC: Robust to early termination command governor for systems with limited computing capacity (2022) (2)
- Assessing Risks and Modeling Threats in the Internet of Things (2021) (1)
- Secure detection with correlated binary sensors (2015) (1)
- The Design of UDOO Boards: Contributing to the Appropriation of Digital Technology (2019) (1)
- The future of IoT security: special session (2018) (1)
- Network observability for source localization in graphs with unobserved edges (2014) (1)
- An Explicit Reference Governor for Time-Varying Linear Constraints (2020) (1)
- Software Rejuvenation for Secure Tracking Control (2018) (1)
- Estimation and Control over Lossy Networks (2005) (1)
- Proceedings of the 8th International Conference on Cyber-Physical Systems (2017) (1)
- Implementing Optimization-Based Control Tasks in Cyber-Physical Systems With Limited Computing Capacity (2022) (1)
- Toward Safe and Efficient Human-Robot Interaction via Behavior-Driven Danger Signaling (2021) (1)
- LQG over lossy TCP-like networks with probabilistic packet acknowledgement (2008) (1)
- Secure Detection Using Binary Sensors (2013) (1)
- Products of stochastic matrices: Exact rate for convergence in probability for directed networks (2012) (1)
- Optimal Active Fault Detection in Inverter-Based Grids (2022) (1)
- Network observability and localization of sources of diffusion in tree networks with missing edges (2014) (1)
- On Confident Policy Evaluation for Factored Markov Decision Processes with Node Dropouts (2022) (1)
- Communication Protocols for Optimal Control Over Lossy Networks (2007) (1)
- A Supervisor-Based Control Architecture for Constrained Cyber-Physical Systems Subject to Network Attacks (2022) (1)
- Introduction and Committees (2010) (0)
- Distributed Detection over Random Networks: Large Deviations Analysis (2010) (0)
- Software Rejuvenation for Safe Operation of Cyber–Physical Systems in the Presence of Run-Time Cyberattacks (2023) (0)
- Sensor Sceduling for Energy Efficient Estimation in Multi-Hop Wireless Sensor Networks (2010) (0)
- Optimal Risk-Sharing Mechanism to Enhance Resilience of Communities (2019) (0)
- TowardsRecedingHorizonNetworkedControl ⋆ (2007) (0)
- Learning Transition Statistics in Networks of Interacting Agents (2019) (0)
- SensorSelectionStrategies for StateEstimation inEnergy ConstrainedWireless SensorNetworks (2015) (0)
- ON A GENERALIZED METRIC DIMENSION WITH PARTIALLY KNOWN GRAPH TOPOLOGY (2014) (0)
- LQG Control over lossy networks with probabilistic packet acknowledgements (2008) (0)
- Reducing Attack Opportunities Through Decentralized Event-Triggered Control (2022) (0)
- Secure State Esti ation of yber-hysical Syste s nder S itching ttacks (2017) (0)
- Identifying Impactful Agents Via Faux Adversarial Games (2022) (0)
- Sensor Scheduling in Lossy Networks (2012) (0)
- Simulation of Network Security Attacks on SCADA Systems (2010) (0)
- Distributed Estimation Via a Roaming Token (2018) (0)
- HARDWARE ARCHITECTURE FUNCTIONAL DESCRIPTION PLATFORM API ? Using Different Models of Computation for Distributed Control : The Robot Diffusion Example (2002) (0)
- Bayesian State Estimation Against Switching Unknown Inputs and Extra Packet Injections (2019) (0)
- Minimum Sensor Placement for Single Robust Observability of Structured Complex Networks (2016) (0)
- Modeling Dynamical Phenomena in the Era of Big Data (2018) (0)
- ECCO: Equivalent Circuit Controlled Optimization (2022) (0)
- LQ non-Gaussian Control with I/O packet losses (2020) (0)
- Optimizing Robustness against Cascading Failures under Max-Load Targeted Attack (2018) (0)
- CANE: A Cascade-Control Approach for Network-Assisted Video QoE Management (2023) (0)
- Collaborative sequential-based detection in wireless sensor networks (2011) (0)
- Ensuring Resilience Against Stealthy Attacks on Cyber-Physical Systems (2022) (0)
- Models and Control Strategies for Data Centers in the Smart Grid (2012) (0)
- n approach to leak detection using wireless sensor networks at carbon equestration sites ames (2012) (0)
- Stochastic Multi-Armed Bandits with Non-Stationary Rewards Generated by a Linear Dynamical System (2022) (0)
- Behavior Model Controller Radar Based Observations DSRC Broadcasted Acceleration Profile DSRC (2015) (0)
- Optimal Threshold Policies for Robust Data Center Control (2018) (0)
- Model-Free Learning and Optimal Policy Design in Multi-Agent MDPs Under Probabilistic Agent Dropout (2023) (0)
- Runtime System Support for CPS Software Rejuvenation (2023) (0)
- A multidisciplinary detection system for cyber attacks on Powertrain Cyber Physical Systems (2023) (0)
- Understanding Throughput Stability and Predictability to Enable Better Video Quality of Experience (2015) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Bruno Sinópoli?
Bruno Sinópoli is affiliated with the following schools: