Justin Ruths is an Associate Professor in the Departments of Mechanical Engineering and Systems Engineering. Before joing the UT Dallas faculty in 2016 he was a founding faculty member of the Singapore University of Technology and Design for five years. His research interests include:

  • Control and optimization of complex dynamical systems and networks
  • Cyber-physical system security
  • Neuroscience
  • Quantum control

Works in Treasures @ UT Dallas are made available exclusively for educational purposes such as research or instruction. Literary rights, including copyright for published works held by the creator(s) or their heirs, or other third parties may apply. All rights are reserved unless otherwise indicated by the copyright owner(s).

Recent Submissions

  • Tuning Windowed Chi-Squared Detectors for Sensor Attacks 

    Tunga, Rohit; Murguia, C.; Ruths, Justin
    A model-based windowed chi-squared procedure is proposed for identifying falsified sensor measurements. We employ the widely-used static chi-squared and the dynamic cumulative sum (CUSUM) fault/attack detection procedures ...
  • On Reachable Sets of Hidden CPS Sensor Attacks 

    Murguia, C.; Ruths, Justin
    For given system dynamics, observer structure, and observer-based fault/attack detection procedure, we provide mathematical tools - in terms of Linear Matrix Inequalities (LMIs) - for computing outer ellipsoidal bounds on ...
  • Performance Bounds for Optimal Feedback Control in Networks 

    Summers, Tyler H.; Ruths, Justin
    Many important complex networks, including critical infrastructure and emerging industrial automation systems, are becoming increasingly intricate webs of interacting feedback control loops. A fundamental concern is to ...
  • Constraining Attacker Capabilities through Actuator Saturation 

    Kafash, Sahand Hadizadeh; Giraldo, Jairo; Murguia, C.; Cardenas, Alvaro A.; Ruths, Justin
    For LTI control systems, we provide mathematical tools - in terms of Linear Matrix Inequalities - for computing outer ellipsoidal bounds on the reachable sets that attacks can induce in the system when they are subject to ...
  • A Comparison of Stealthy Sensor Attacks on Control Systems 

    Hashemi, Navid; Murguia, C.; Ruths, Justin
    As more attention is paid to security in the context of control systems and as attacks occur to real control systems throughout the world, it has become clear that some of the most nefarious attacks are those that evade ...