André Teixeira
Senior Lecturer/Associate Professor at Department of Information Technology; Division of Systems and Control
- Telephone:
- +46 18 471 54 14
- E-mail:
- andre.teixeira@it.uu.se
- Visiting address:
- Hus 10, Regementsvägen 10
- Postal address:
- Box 337
751 05 UPPSALA
- CV:
- Download CV
- ORCID:
- 0000-0001-5491-4068
Short presentation
My aim is to contribute toward autonomous decision-making systems that are secure and resilient against malicious adversaries and natural failures. Towards this aim, my research focuses primarily on cybersecurity in learning and control systems, incorporating elements from cybersecurity, control theory, optimization and machine learning, game theory, and networked systems.
I have an active role in coordinating the Cybersecurity Arena and the Graduate School in Cybersecurity at the Dept. of IT.
Keywords
- control algorithm and optimization
- automatic control
- optimization
- control theory and system dynamics
- reinforcement learning
- cybersecurity
- federated machine learning
- privacy preserving
- privacy preserving machine learning
- control theory
- cyber-physical systems
- networked control systems
Biography
André Teixeira is an Associate Professor and Deputy Head of Division at the Division of Systems and Control, Department of Information Technology, Uppsala University, Sweden. He received the M.Sc. degree in electrical and computer engineering from the Faculdade de Engenharia da Universidade do Porto, Porto, Portugal, in 2009, and the Ph. D. degree in automatic control from the KTH Royal Institute of Technology, Stockholm, Sweden, in 2014. From 2014 to 2015, he was a Postdoctoral Researcher at the Department of Automatic Control, KTH Royal Institute of Technology, Stockholm, Sweden. From October 2015 to August 2017, André was an Assistant Professor in Cybersecurity of Critical Infrastructures at the Faculty of Technology, Policy and Management, Delft University of Technology, The Netherlands. From September 2017 to April 2021, he was an Assistant Professor at the Division of Signals and Systems, Department of Electrical Engineering, Uppsala University.
Dr. Teixeira was a recipient of the Best Student-Paper Award from the IEEE Multi-Conference on Systems and Control in 2014, and an Honorable Mention for the Pauk M. Frank Award at the IFAC SAFEPROCESS 2018. He was awarded a Starting Grant by the Swedish Research Council in 2019, and he is among the 20 young researchers in Sweden who received the Future Research Leaders 7 grant by the Swedish Foundation for Strategic Research in 2020. He was awarded the Lilly and Sven Thuréus prize in 2023 by The Royal Society of Sciences at Uppsala. In 2023, the Knut and Alice Wallenberg Foundation appointed him as a Wallenberg Academy Fellow.
Research
My research is primarily focused on the fields of automatic control and convex optimisation, addressing, in particular, a range of topics that include: cybersecurity in industrial control systems, distributed fault detection and isolation, applications to power systems and multi-agent systems.
For links to some of my talks, research publications, and recent projects, please visit my personal homepage:
https://www.andre-teixeira.eu/
See also our Uppsala Secure Learning and Control Laboratory's website at https://uslc-lab.github.io/
Media
Popular science video on our research
Popular science video on our research cybersecurity for control systems, produced through the SSF Future Research Leaders program.

Publications
Selection of publications
Security Allocation in Networked Control Systems under Stealthy Attacks
Part of IEEE Transactions on Control of Network Systems, p. 216-227, 2025
Stealthy Deactivation of Safety Filters
Part of 2024 European Control Conference, ECC 2024, p. 3077-3082, 2024
Risk Assessment of Stealthy Attacks on Uncertain Control Systems
Part of IEEE Transactions on Automatic Control, p. 3214-3221, 2024
Part of European Journal of Control, 2023
- DOI for Quickest physical watermarking-based detection of measurement replacement attacks in networked control systems
- Download full text (pdf) of Quickest physical watermarking-based detection of measurement replacement attacks in networked control systems
A switching multiplicative watermarking scheme for detection of stealthy cyber-attacks
Part of IEEE Transactions on Automatic Control, p. 2558-2573, 2021
Security Metrics for Control Systems
Part of Safety, Security and Privacy for Cyber-Physical Systems, p. 99-121, Springer, 2021
A Tutorial Introduction to Security and Privacy for Cyber-Physical Systems
Part of 18Th European Control Conference (ECC), 25-28, June, 2019, Naples, Italy, p. 968-978, 2019
Recent publications
Switching multiplicative watermark design against covert attacks
Part of Automatica, 2025
- DOI for Switching multiplicative watermark design against covert attacks
- Download full text (pdf) of Switching multiplicative watermark design against covert attacks
Security Allocation in Networked Control Systems under Stealthy Attacks
Part of IEEE Transactions on Control of Network Systems, p. 216-227, 2025
Stealthy Deactivation of Safety Filters
Part of 2024 European Control Conference, ECC 2024, p. 3077-3082, 2024
Delay Attack and Detection in Feedback Linearized Control Systems
Part of 2024 European Control Conference (ECC), p. 1576-1583, 2024
GNN-IDS: Graph Neural Network based Intrusion Detection System
Part of Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
- DOI for GNN-IDS: Graph Neural Network based Intrusion Detection System
- Download full text (pdf) of GNN-IDS: Graph Neural Network based Intrusion Detection System
All publications
Articles in journal
Switching multiplicative watermark design against covert attacks
Part of Automatica, 2025
- DOI for Switching multiplicative watermark design against covert attacks
- Download full text (pdf) of Switching multiplicative watermark design against covert attacks
Security Allocation in Networked Control Systems under Stealthy Attacks
Part of IEEE Transactions on Control of Network Systems, p. 216-227, 2025
Part of Journal of Process Control, 2024
- DOI for Quickest detection of bias injection attacks on the glucose sensor in the artificial pancreas under meal disturbances
- Download full text (pdf) of Quickest detection of bias injection attacks on the glucose sensor in the artificial pancreas under meal disturbances
Part of IFAC-PapersOnLine, p. 508-513, 2024
- DOI for Kullback-Leibler Divergence-Based Tuning of Kalman Filter for Bias Injection Attacks in an Artificial Pancreas System
- Download full text (pdf) of Kullback-Leibler Divergence-Based Tuning of Kalman Filter for Bias Injection Attacks in an Artificial Pancreas System
Risk Assessment of Stealthy Attacks on Uncertain Control Systems
Part of IEEE Transactions on Automatic Control, p. 3214-3221, 2024
Risk-based Security Measure Allocation Against Actuator Attacks
Part of IEEE Open Journal of Control Systems, p. 297-309, 2023
- DOI for Risk-based Security Measure Allocation Against Actuator Attacks
- Download full text (pdf) of Risk-based Security Measure Allocation Against Actuator Attacks
Part of Journal of Information Security and Applications, 2023
- DOI for Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures
- Download full text (pdf) of Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures
Part of Automatica, 2023
Part of IFAC-PapersOnLine, p. 1820-1826, 2023
On-line Identification of Delay Attacks in Networked Servo Control
Part of IFAC-PapersOnLine, p. 977-983, 2023
Privacy and Security in Network Controlled Systems via Dynamic Masking
Part of IFAC-PapersOnLine, p. 991-996, 2023
An Online Kullback-Leibler Divergence-Based Stealthy Attack Against Cyber-Physical Systems
Part of IEEE Transactions on Automatic Control, p. 3672-3679, 2023
Part of European Journal of Control, 2023
- DOI for Quickest physical watermarking-based detection of measurement replacement attacks in networked control systems
- Download full text (pdf) of Quickest physical watermarking-based detection of measurement replacement attacks in networked control systems
Sequential detection of Replay attacks
Part of IEEE Transactions on Automatic Control, p. 1941-1948, 2023
A Single-Adversary-Single-Detector Zero-Sum Game in Networked Control Systems
Part of IFAC-PapersOnLine, p. 49-54, 2022
- DOI for A Single-Adversary-Single-Detector Zero-Sum Game in Networked Control Systems
- Download full text (pdf) of A Single-Adversary-Single-Detector Zero-Sum Game in Networked Control Systems
Privatized Distributed Anomaly Detection for Large-Scale Nonlinear Uncertain Systems
Part of IEEE Transactions on Automatic Control, p. 5299-5313, 2021
A switching multiplicative watermarking scheme for detection of stealthy cyber-attacks
Part of IEEE Transactions on Automatic Control, p. 2558-2573, 2021
Part of Cybersecurity, 2021
- DOI for Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates
- Download full text (pdf) of Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates
Part of International Journal of Robust and Nonlinear Control, p. 4278-4302, 2020
Part of IEEE Transactions on Automatic Control, p. 3816-3831, 2020
Effects of jamming attacks on a control system with energy harvesting
Part of IEEE Control Systems Letters, p. 829-834, 2019
Cyber Risk Analysis of Combined Data Attacks Against Power System State Estimation
Part of IEEE Transactions on Smart Grid, p. 3044-3056, 2019
Distributed sensor and actuator reconfiguration for fault-tolerant networked control systems
Part of IEEE Transactions on Control of Networked Systems, p. 1517-1528, 2018
Differentially-Private Distributed Fault Diagnosis for Large-Scale Nonlinear Uncertain Systems
Part of IFAC-PapersOnLine, p. 975-982, 2018
Voltage Control in Distributed Generation under Measurement Falsification Attacks
Part of IFAC-PapersOnLine, p. 8379-8384, 2017
Detection and Isolation of Replay Attacks through Sensor Watermarking
Part of IFAC-PapersOnLine, p. 7363-7368, 2017
Estimation With Strategic Sensors
Part of IEEE Transactions on Automatic Control, p. 724-739, 2017
Part of IEEE Transactions on Signal Processing, p. 290-305, 2016
Part of IEEE Transactions on Automatic Control, p. 644-658, 2015
Secure Control Systems: A Quantitative Risk Management Approach
Part of IEEE Control Syst. Mag., p. 24-45, 2015
A secure control framework for resource-limited adversaries
Part of Automatica, p. 135-148, 2015
Chapters in book
Centrality-based Security Allocation in Networked Control Systems
Part of Lecture Notes in Computer Science, Springer Publishing Company, 2024
Part of Safety, Security and Privacy for Cyber-Physical Systems, p. 1-8, Springer, 2021
Security Metrics for Control Systems
Part of Safety, Security and Privacy for Cyber-Physical Systems, p. 99-121, Springer, 2021
Detection of Cyber-Attacks: A Multiplicative Watermarking Scheme
Part of Safety, Security and Privacy for Cyber-Physical Systems, p. 173-201, Springer Publishing Company, 2021
Bayesian Network Models in Cyber Security: A Systematic Review
Part of Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), p. 105-122, Springer, Cham, 2017
Part of Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), p. 50-62, Springer, Cham, 2017
Cyber-Secure and Resilient Architectures for Industrial Control Systems
Part of Smart Grid Security Innovative Solutions for a Modernized Grid, p. 149-183, Elsevier Science Publishing Co Inc, 2015
Conference papers
Stealthy Deactivation of Safety Filters
Part of 2024 European Control Conference, ECC 2024, p. 3077-3082, 2024
Delay Attack and Detection in Feedback Linearized Control Systems
Part of 2024 European Control Conference (ECC), p. 1576-1583, 2024
GNN-IDS: Graph Neural Network based Intrusion Detection System
Part of Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
- DOI for GNN-IDS: Graph Neural Network based Intrusion Detection System
- Download full text (pdf) of GNN-IDS: Graph Neural Network based Intrusion Detection System
Part of 2023 62nd IEEE Conference on Decision and Control (CDC), p. 2827-2832, 2023
Feedback Path Delay Attacks and Detection
Part of Proceedings of the 62nd IEEE Conference on Decision and Control (CDC), p. 3864-3871, 2023
On the trade-offs between accuracy, privacy, and resilience in average consensus algorithms
Part of 2023 62nd IEEE Conference on Decision and Control, (CDC), p. 8026-8031, 2023
Part of 2023 62nd IEEE Conference on Decision and Control (CDC), p. 7073-7080, 2023
On-line Identification of Delay Attacks in Networked Servo Control
Part of Prep. IFAC World Congress, p. 1041-1047, 2023
Part of 2022 IEEE 61st Conference on Decision and Control (CDC), p. 6126-6133, 2022
- DOI for A Zero-Sum Game Framework for Optimal Sensor Placement in Uncertain Networked Control Systems under Cyber-Attacks
- Download full text (pdf) of A Zero-Sum Game Framework for Optimal Sensor Placement in Uncertain Networked Control Systems under Cyber-Attacks
Part of 2022 AMERICAN CONTROL CONFERENCE (ACC), p. 5037-5042, 2022
Part of 2022 IEEE Conference on Control Technology and Applications (CCTA), p. 1347-1353, 2022
Sequential Detection of Replay Attacks with a Parsimonious Watermarking Policy
Part of 2022 American Control Conference (ACC), p. 4868-4875, 2022
Part of 2022 IEEE 61st Conference on Decision and Control (CDC), p. 7648-7655, 2022
Part of 2022 AMERICAN CONTROL CONFERENCE (ACC), p. 1398-1405, 2022
Design of multiplicative watermarking against covert attacks
Part of 2021 60th IEEE CConference On Decision And Control (CDC), p. 4176-4181, 2021
Deception Attack Detection Using Reduced Watermarking
Part of 2021 European Control Conference (ECC), p. 74-80, 2021
A Game-theoretic Approach to Covert Communications in the Presence of Multiple Colluding Wardens
Part of 2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021
Stealthy Cyber-Attack Design Using Dynamic Programming
Part of 2021 60th IEEE Conference On Decision And Control (CDC), p. 3474-3479, 2021
Part of Educate for the Future, p. 310-320, 2020
Privacy-preserving continuous tumour relapse monitoring using in-body radio signals
Part of 2020 IEEE Symposium On Security And Privacy Workshops (SPW 2020), p. 82-87, 2020
Joint controller and detector design against data injection attacks on actuators
Part of IFAC PapersOnline, p. 7439-7445, 2020
- DOI for Joint controller and detector design against data injection attacks on actuators
- Download full text (pdf) of Joint controller and detector design against data injection attacks on actuators
Computer-aided curriculum analysis and design: existing challenges and open research directions
Part of 2020 IEEE Frontiers in Education Conference (FIE), 2020
Tumor Sensing Privacy in In-Body Networks
2019
2019
On the confidentiality of linear anomaly detector states
Part of 2019 American Control Conference (ACC), p. 397-403, 2019
Optimal stealthy attacks on actuators for strictly proper systems
Part of 2019 IEEE 58th Conference on Decision and Control (CDC), p. 4385-4390, 2019
- DOI for Optimal stealthy attacks on actuators for strictly proper systems
- Download full text (pdf) of Optimal stealthy attacks on actuators for strictly proper systems
Effects on Jamming attacks on a control system with energy harvesting
2019
Data Injection Attacks against Feedforward Controllers
Part of 2019 18Th European Control Conference (ECC), p. 2233-2239, 2019
2019
A Tutorial Introduction to Security and Privacy for Cyber-Physical Systems
Part of 18Th European Control Conference (ECC), 25-28, June, 2019, Naples, Italy, p. 968-978, 2019
2019
Detection of Sensor Data Injection Attacks with Multiplicative Watermarking
Part of 2018 European Control Conference (ECC), p. 345-350, 2018
Part of Proc. Graph. Model. Secur., 2018
Detection and isolation of routing attacks through sensor watermarking
Part of 2017 Am. Control Conf., p. 5436-5442, 2017
Co-simulation for Cyber Security Analysis: Data Attacks against Energy Management System
Part of 2017 IEEE Int. Conf. Smart Grid Commun., p. 253-258, 2017
Part of IECON 2017 - 43rd Annu. Conf. IEEE Ind. Electron. Soc., p. 4313-4318, 2017
Cyber-Physical-Security Framework for Building Energy Management System
Part of 2016 ACM/IEEE 7th Int. Conf. Cyber-Physical Syst. ICCPS 2016, 2016
Part of Proc. 2016 New Secur. Paradig. Work. - NSPW, p. 36-48, 2016
Fault Detection and Diagnosis for Compliance Monitoring in International Supply Chains
Part of 22nd Am. Conf. Inf. Syst., 2016
From control system security indices to attack identifiability
Part of 2016 Sci. Secur. Cyber-Physical Syst. Work., p. 1-6, 2016
Combined data integrity and availability attacks on state estimation in cyber-physical power grids
Part of 2016 IEEE Int. Conf. Smart Grid Commun., p. 271-277, 2016
Voltage control for interconnected microgrids under adversarial actions
Part of 2015 IEEE 20th Conf. Emerg. Technol. Fact. Autom., p. 1-8, 2015
The ADMM algorithm for distributed averaging: Convergence rates and optimal parameter selection
Part of Asilomar Conf. Signals, Syst. Comput., 2015
Strategic stealthy attacks: The output-to-output l2-gain
Part of Proc. IEEE Conf. Decis. Control, p. 2582-2587, 2015
Part of Am. Control Conf., p. 4372-4378, 2014