default search action
André Teixeira 0001
Person information
- affiliation: Uppsala University, Sweden
Other persons with the same name
- André Teixeira 0002 — University of Minho, Braga, Portugal
- André Teixeira 0003 — University of Coimbra, Institute of Systems and Robotics, Department of Electrical and Computer Engineering, Portugal
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Sribalaji Coimbatore Anand, André M. H. Teixeira, Anders Ahlén:
Risk Assessment of Stealthy Attacks on Uncertain Control Systems. IEEE Trans. Autom. Control. 69(5): 3214-3221 (2024) - [c52]Zhenlu Sun, André M. H. Teixeira, Salman Toor:
GNN-IDS: Graph Neural Network based Intrusion Detection System. ARES 2024: 14:1-14:12 - [c51]Torbjörn Wigren, André M. H. Teixeira:
Delay Attack and Detection in Feedback Linearized Control Systems. ECC 2024: 1576-1583 - [c50]Daniel Arnström, André M. H. Teixeira:
Stealthy Deactivation of Safety Filters. ECC 2024: 3077-3082 - [i21]Daniel Arnström, André M. H. Teixeira:
Stealthy Deactivation of Safety Filters. CoRR abs/2403.17861 (2024) - 2023
- [j19]Arunava Naha, André M. H. Teixeira, Anders Ahlén, Subhrakanti Dey:
Quickest detection of deception attacks on cyber-physical systems with a parsimonious watermarking policy. Autom. 155: 111147 (2023) - [j18]Arunava Naha, André Teixeira, Anders Ahlén, Subhrakanti Dey:
Quickest physical watermarking-based detection of measurement replacement attacks in networked control systems. Eur. J. Control 71: 100804 (2023) - [j17]Sabarathinam Chockalingam, Wolter Pieters, André M. H. Teixeira, Pieter H. A. J. M. van Gelder:
Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures. J. Inf. Secur. Appl. 75: 103497 (2023) - [j16]Arunava Naha, André Teixeira, Anders Ahlén, Subhrakanti Dey:
Sequential Detection of Replay Attacks. IEEE Trans. Autom. Control. 68(3): 1941-1948 (2023) - [j15]Qirui Zhang, Kun Liu, André M. H. Teixeira, Yuzhe Li, Senchun Chai, Yuanqing Xia:
An Online Kullback-Leibler Divergence-Based Stealthy Attack Against Cyber-Physical Systems. IEEE Trans. Autom. Control. 68(6): 3672-3679 (2023) - [c49]Fatih Emre Tosun, André Teixeira:
Robust Sequential Detection of Non-stealthy Sensor Deception Attacks in an Artificial Pancreas System. CDC 2023: 2827-2832 - [c48]Torbjörn Wigren, André Teixeira:
Feedback Path Delay Attacks and Detection. CDC 2023: 3864-3871 - [c47]Zishuo Li, Anh Tung Nguyen, André M. H. Teixeira, Yilin Mo, Karl Henrik Johansson:
Secure State Estimation with Asynchronous Measurements against Malicious Measurement-Data and Time-Stamp Manipulation. CDC 2023: 7073-7080 - [c46]Guilherme Ramos, André M. H. Teixeira, Sérgio Pequito:
On the Trade-Offs Between Accuracy, Privacy, and Resilience in Average Consensus Algorithms. CDC 2023: 8026-8031 - [i20]Zishuo Li, Anh Tung Nguyen, André Teixeira, Yilin Mo, Karl Henrik Johansson:
Secure State Estimation with Asynchronous Measurements against Malicious Measurement-data and Time-stamp Manipulation. CoRR abs/2303.17514 (2023) - [i19]Sribalaji Coimbatore Anand, André M. H. Teixeira:
Risk-based Security Measure Allocation Against Injection Attacks on Actuators. CoRR abs/2304.02055 (2023) - [i18]Anh Tung Nguyen, Sribalaji Coimbatore Anand, André M. H. Teixeira, Alexander Medvedev:
Optimal Detector Placement in Networked Control Systems under Cyber-attacks with Applications to Power Networks. CoRR abs/2304.05710 (2023) - [i17]Anh Tung Nguyen, André M. H. Teixeira, Alexander Medvedev:
Security Allocation in Networked Control Systems under Stealthy Attacks. CoRR abs/2308.16639 (2023) - [i16]Sribalaji Coimbatore Anand, Michelle S. Chong, André M. H. Teixeira:
Data-Driven Identification of Attack-free Sensors in Networked Control Systems. CoRR abs/2312.04845 (2023) - 2022
- [c45]Fatih Emre Tosun, André Teixeira, Anders Ahlén, Subhrakanti Dey:
Detection of Bias Injection Attacks on the Glucose Sensor in the Artificial Pancreas Under Meal Disturbance. ACC 2022: 1398-1405 - [c44]Arunava Naha, André Teixeira, Anders Ahlén, Subhrakanti Dey:
Sequential Detection of Replay Attacks with a Parsimonious Watermarking Policy. ACC 2022: 4868-4875 - [c43]Sribalaji Coimbatore Anand, André M. H. Teixeira:
Risk-averse controller design against data injection attacks on actuators for uncertain control systems. ACC 2022: 5037-5042 - [c42]Sribalaji Coimbatore Anand, André M. H. Teixeira, Anders Ahlén:
Risk assessment and optimal allocation of security measures under stealthy false data injection attacks. CCTA 2022: 1347-1353 - [c41]Anh Tung Nguyen, Sribalaji Coimbatore Anand, André M. H. Teixeira:
A Zero-Sum Game Framework for Optimal Sensor Placement in Uncertain Networked Control Systems under Cyber-Attacks. CDC 2022: 6126-6133 - [c40]Arunava Naha, André Teixeira, Anders Ahlén, Subhrakanti Dey:
Structural analyses of a parsimonious watermarking policy for data deception attack detection in networked control systems. CDC 2022: 7648-7655 - [i15]Sribalaji Coimbatore Anand, André M. H. Teixeira:
Risk-averse controller design against data injection attacks on actuators for uncertain control systems. CoRR abs/2203.00055 (2022) - [i14]Anh Tung Nguyen, André M. H. Teixeira, Alexander Medvedev:
A Single-Adversary-Single-Detector Zero-Sum Game in Networked Control Systems. CoRR abs/2205.14001 (2022) - [i13]Sribalaji Coimbatore Anand, André M. H. Teixeira, Anders Ahlén:
Risk assessment and optimal allocation of security measures under stealthy false data injection attacks. CoRR abs/2207.04860 (2022) - [i12]Anh Tung Nguyen, Sribalaji Coimbatore Anand, André M. H. Teixeira:
A Zero-Sum Game Framework for Optimal Sensor Placement in Uncertain Networked Control Systems under Cyber-Attacks. CoRR abs/2210.04091 (2022) - [i11]Mohamed Abdalmoaty, Sribalaji Coimbatore Anand, André M. H. Teixeira:
Privacy and Security in Network Controlled Systems via Dynamic Masking. CoRR abs/2211.07328 (2022) - 2021
- [j14]Sabarathinam Chockalingam, Wolter Pieters, André Teixeira, Pieter H. A. J. M. van Gelder:
Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates. Cybersecur. 4(1): 29 (2021) - [j13]Riccardo M. G. Ferrari, André M. H. Teixeira:
A Switching Multiplicative Watermarking Scheme for Detection of Stealthy Cyber-Attacks. IEEE Trans. Autom. Control. 66(6): 2558-2573 (2021) - [j12]Vahab Rostampour, Riccardo M. G. Ferrari, André M. H. Teixeira, Tamás Keviczky:
Privatized Distributed Anomaly Detection for Large-Scale Nonlinear Uncertain Systems. IEEE Trans. Autom. Control. 66(11): 5299-5313 (2021) - [c39]Sribalaji Coimbatore Anand, André M. H. Teixeira:
Stealthy Cyber-Attack Design Using Dynamic Programming. CDC 2021: 3474-3479 - [c38]Alexander J. Gallo, Sribalaji Coimbatore Anand, André M. H. Teixeira, Riccardo M. G. Ferrari:
Design of multiplicative watermarking against covert attacks. CDC 2021: 4176-4181 - [c37]Arunava Naha, André Teixeira, Anders Ahlén, Subhrakanti Dey:
Deception Attack Detection using Reduced Watermarking. ECC 2021: 74-80 - [c36]Abbas Arghavani, Anders Ahlén, André Teixeira, Subhrakanti Dey:
A Game-theoretic Approach to Covert Communications in the Presence of Multiple Colluding Wardens. WCNC 2021: 1-7 - [i10]Sribalaji Coimbatore Anand, André M. H. Teixeira, Anders Ahlén:
Risk Assessment of Stealthy Attacks on Uncertain Control Systems. CoRR abs/2106.07071 (2021) - [i9]Sribalaji Coimbatore Anand, André M. H. Teixeira:
Stealthy Cyber-Attack Design Using Dynamic Programming. CoRR abs/2109.02954 (2021) - [i8]Alexander J. Gallo, Sribalaji Coimbatore Anand, André M. H. Teixeira, Riccardo M. G. Ferrari:
Design of multiplicative watermarking against covert attacks. CoRR abs/2110.00555 (2021) - 2020
- [j11]Jezdimir Milosevic, André Teixeira, Karl Henrik Johansson, Henrik Sandberg:
Actuator Security Indices Based on Perfect Undetectability: Computation, Robustness, and Sensor Placement. IEEE Trans. Autom. Control. 65(9): 3816-3831 (2020) - [c35]André M. H. Teixeira, Aida O. P. D. C. Guerra, Steffi Knorn, Kjell Staffas, Damiano Varagnolo:
Computer-aided curriculum analysis and design: existing challenges and open research directions. FIE 2020: 1-9 - [c34]Sam Hylamia, Wenqing Yan, André Teixeira, Noor Badariah Asan, Mauricio David Perez, Robin Augustine, Thiemo Voigt:
Privacy-preserving Continuous Tumour Relapse Monitoring Using In-body Radio Signals. SP (Workshops) 2020: 82-87
2010 – 2019
- 2019
- [j10]Steffi Knorn, André Teixeira:
Effects of Jamming Attacks on a Control System With Energy Harvesting. IEEE Control. Syst. Lett. 3(4): 829-834 (2019) - [j9]Kaikai Pan, André Teixeira, Milos Cvetkovic, Peter Palensky:
Cyber Risk Analysis of Combined Data Attacks Against Power System State Estimation. IEEE Trans. Smart Grid 10(3): 3044-3056 (2019) - [c33]David Umsonst, Ehsan Nekouei, André Teixeira, Henrik Sandberg:
On the Confidentiality of Linear Anomaly Detector States. ACC 2019: 397-403 - [c32]André M. H. Teixeira:
Optimal stealthy attacks on actuators for strictly proper systems. CDC 2019: 4385-4390 - [c31]Michelle S. Chong, Henrik Sandberg, André M. H. Teixeira:
A Tutorial Introduction to Security and Privacy for Cyber-Physical Systems. ECC 2019: 968-978 - [c30]André M. H. Teixeira:
Data Injection Attacks against Feedforward Controllers. ECC 2019: 2233-2239 - 2018
- [j8]André M. H. Teixeira, José Araújo, Henrik Sandberg, Karl Henrik Johansson:
Distributed Sensor and Actuator Reconfiguration for Fault-Tolerant Networked Control Systems. IEEE Trans. Control. Netw. Syst. 5(4): 1517-1528 (2018) - [c29]André M. H. Teixeira, Riccardo M. G. Ferrari:
Detection of Sensor Data Injection Attacks with Multiplicative Watermarking. ECC 2018: 338-343 - [c28]Sabarathinam Chockalingam, Wolter Pieters, André Teixeira, Nima Khakzad, Pieter H. A. J. M. van Gelder:
Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures. GraMSec@FLoC 2018: 31-50 - 2017
- [j7]Farhad Farokhi, André M. H. Teixeira, Cedric Langbort:
Estimation With Strategic Sensors. IEEE Trans. Autom. Control. 62(2): 724-739 (2017) - [c27]Riccardo M. G. Ferrari, André M. H. Teixeira:
Detection and isolation of routing attacks through sensor watermarking. ACC 2017: 5436-5442 - [c26]Kaikai Pan, André Teixeira, Milos Cvetkovic, Peter Palensky:
Data attacks on power system state estimation: Limited adversarial knowledge vs. limited attack resources. IECON 2017: 4313-4318 - [c25]Sabarathinam Chockalingam, Wolter Pieters, André Teixeira, Pieter H. A. J. M. van Gelder:
Bayesian Network Models in Cyber Security: A Systematic Review. NordSec 2017: 105-122 - [c24]Kaikai Pan, André Teixeira, Claudio David López, Peter Palensky:
Co-simulation for cyber security analysis: Data attacks against energy management system. SmartGridComm 2017: 253-258 - [i7]Sabarathinam Chockalingam, Dina Hadziosmanovic, Wolter Pieters, André Teixeira, Pieter H. A. J. M. van Gelder:
Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications. CoRR abs/1707.02140 (2017) - [i6]Kaikai Pan, André Teixeira, Claudio David López, Peter Palensky:
Co-simulation for Cyber Security Analysis: Data Attacks against Energy Management System. CoRR abs/1708.08322 (2017) - [i5]Kaikai Pan, André Teixeira, Milos Cvetkovic, Peter Palensky:
Cyber Risk Analysis of Combined Data Attacks Against Power System State Estimation. CoRR abs/1708.08349 (2017) - [i4]Kaikai Pan, André Teixeira, Milos Cvetkovic, Peter Palensky:
Data Attacks on Power System State Estimation: Limited Adversarial Knowledge vs. Limited Attack Resources. CoRR abs/1708.08355 (2017) - 2016
- [c23]Yuxin Wang, Yifu Tian, André Teixeira, Joris Hulstijn, Yao-Hua Tan:
Fault Detection and Diagnosis for Compliance Monitoring in International Supply Chains. AMCIS 2016 - [c22]Henrik Sandberg, André M. H. Teixeira:
From control system security indices to attack identifiability. SOSCYPS@CPSWeek 2016: 1-6 - [c21]Sabarathinam Chockalingam, Dina Hadziosmanovic, Wolter Pieters, André Teixeira, Pieter H. A. J. M. van Gelder:
Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications. CRITIS 2016: 50-62 - [c20]Kaveh Paridari, Alie El-Din Mady, Silvio La Porta, Rohan Chabukswar, Jacobo Blanco, André Teixeira, Henrik Sandberg, Menouer Boubekeur:
Cyber-Physical-Security Framework for Building Energy Management System. ICCPS 2016: 18:1-18:9 - [c19]Laura Fichtner, Wolter Pieters, André Teixeira:
Cybersecurity as a Politikum: implications of security discourses for infrastructures. NSPW 2016: 36-48 - [c18]Kaikai Pan, André M. H. Teixeira, Milos Cvetkovic, Peter Palensky:
Combined data integrity and availability attacks on state estimation in cyber-physical power grids. SmartGridComm 2016: 271-277 - [i3]Henrik Sandberg, André M. H. Teixeira:
From Control System Security Indices to Attack Identifiability. CoRR abs/1604.05476 (2016) - 2015
- [j6]André Teixeira, Iman Shames, Henrik Sandberg, Karl Henrik Johansson:
A secure control framework for resource-limited adversaries. Autom. 51: 135-148 (2015) - [j5]Euhanna Ghadimi, André Teixeira, Iman Shames, Mikael Johansson:
Optimal Parameter Selection for the Alternating Direction Method of Multipliers (ADMM): Quadratic Problems. IEEE Trans. Autom. Control. 60(3): 644-658 (2015) - [c17]André Teixeira, Henrik Sandberg, Karl Henrik Johansson:
Strategic stealthy attacks: The output-to-output ℓ2-gain. CDC 2015: 2582-2587 - [c16]André Teixeira, Kaveh Paridari, Henrik Sandberg, Karl Henrik Johansson:
Voltage control for interconnected microgrids under adversarial actions. ETFA 2015: 1-8 - 2014
- [j4]André Teixeira, Iman Shames, Henrik Sandberg, Karl Henrik Johansson:
Distributed Fault Detection and Isolation Resilient to Network Model Uncertainties. IEEE Trans. Cybern. 44(11): 2024-2037 (2014) - [c15]Morten Juelsgaard, André Teixeira, Mikael Johansson, Rafael Wisniewski, Jan Bendtsen:
Distributed coordination of household electricity consumption. CCA 2014: 33-40 - [c14]Euhanna Ghadimi, André Teixeira, Michael G. Rabbat, Mikael Johansson:
The ADMM algorithm for distributed averaging: Convergence rates and optimal parameter selection. ACSSC 2014: 783-787 - [c13]Farhad Farokhi, André M. H. Teixeira, Cedric Langbort:
Gaussian cheap talk game with quadratic cost functions: When herding between strategic senders is a virtue. ACC 2014: 2267-2272 - [c12]André Teixeira, György Dán, Henrik Sandberg, Robin Berthier, Rakesh B. Bobba, Alfonso Valdes:
Security of smart distribution grids: Data integrity attacks on integrated volt/VAR control and countermeasures. ACC 2014: 4372-4378 - [c11]José Araujo, André Teixeira, Erik Henriksson, Karl Henrik Johansson:
A down-sampled controller to reduce network usage with guaranteed closed-loop performance. CDC 2014: 6849-6856 - [i2]Farhad Farokhi, André M. H. Teixeira, Cedric Langbort:
Gaussian Cheap Talk Game with Quadratic Cost Functions: When Herding Between Strategic Senders is a Virtue. CoRR abs/1402.4031 (2014) - 2013
- [c10]André Teixeira, Euhanna Ghadimi, Iman Shames, Henrik Sandberg, Mikael Johansson:
Optimal scaling of the ADMM algorithm for distributed quadratic programming. CDC 2013: 6868-6873 - [c9]André Teixeira, Kin Cheong Sou, Henrik Sandberg, Karl Henrik Johansson:
Quantifying Cyber-Security for Networked Control Systems. CPSW@CISS 2013: 123-142 - 2012
- [j3]Iman Shames, André Teixeira, Henrik Sandberg, Karl Henrik Johansson:
Agents misbehaving in a network: a vice or a virtue? IEEE Netw. 26(3): 35-40 (2012) - [j2]Iman Shames, André Teixeira, Henrik Sandberg, Karl Henrik Johansson:
Fault Detection and Mitigation in Kirchhoff Networks. IEEE Signal Process. Lett. 19(11): 749-752 (2012) - [c8]André Teixeira, Iman Shames, Henrik Sandberg, Karl Henrik Johansson:
Revealing stealthy attacks in control systems. Allerton Conference 2012: 1806-1813 - [c7]André Teixeira, Henrik Sandberg, György Dán, Karl Henrik Johansson:
Optimal power flow: Closing the loop over corrupted data. ACC 2012: 3534-3540 - [c6]Iman Shames, André M. H. Teixeira, Henrik Sandberg, Karl Henrik Johansson:
Distributed Fault Detection and Isolation with imprecise network models. ACC 2012: 5906-5911 - [c5]André Teixeira, Daniel Pérez, Henrik Sandberg, Karl Henrik Johansson:
Attack models and scenarios for networked control systems. HiCoNS 2012: 55-64 - [c4]Göran Andersson, Peyman Mohajerin Esfahani, Maria Vrakopoulou, Kostas Margellos, John Lygeros, André Teixeira, György Dán, Henrik Sandberg, Karl Henrik Johansson:
Cyber-security of SCADA systems. ISGT 2012: 1-2 - 2011
- [j1]Iman Shames, André Teixeira, Henrik Sandberg, Karl Henrik Johansson:
Distributed fault detection for interconnected second-order systems. Autom. 47(12): 2757-2764 (2011) - [c3]James Anderson, André Teixeira, Henrik Sandberg, Antonis Papachristodoulou:
Dynamical system decomposition using dissipation inequalities. CDC/ECC 2011: 211-216 - 2010
- [c2]André Teixeira, Henrik Sandberg, Karl Henrik Johansson:
Networked control systems under cyber attacks with applications to power networks. ACC 2010: 3690-3696 - [c1]André Teixeira, Saurabh Amin, Henrik Sandberg, Karl Henrik Johansson, Shankar S. Sastry:
Cyber security analysis of state estimators in electric power systems. CDC 2010: 5991-5998 - [i1]André Teixeira, György Dán, Henrik Sandberg, Karl Henrik Johansson:
A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator. CoRR abs/1011.1828 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint