Optimal Jamming Attack Strategy Against Wireless State Estimation: A Game Theoretic Approach
暂无分享,去创建一个
Shi Jin | Lei Xue | Changyin Sun | Xianghui Cao | Changyin Sun | Xianghui Cao | Shi Jin | Lei Xue
[1] Ling Shi,et al. Optimal Periodic Transmission Power Schedules for Remote Estimation of ARMA Processes , 2013, IEEE Transactions on Signal Processing.
[2] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.
[3] Haibo He,et al. Data-Driven Finite-Horizon Approximate Optimal Control for Discrete-Time Nonlinear Systems Using Iterative HDP Approach , 2018, IEEE Transactions on Cybernetics.
[4] Ling Shi,et al. Sensor data scheduling for optimal state estimation with communication energy constraint , 2011, Autom..
[5] Ling Shi,et al. Optimal Attack Energy Allocation against Remote State Estimation , 2018, IEEE Transactions on Automatic Control.
[6] Yu Cheng,et al. On Optimal Device-to-Device Resource Allocation for Minimizing End-to-End Delay in VANETs , 2016, IEEE Transactions on Vehicular Technology.
[7] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[8] Haibo He,et al. Novel iterative neural dynamic programming for data-based approximate optimal control design , 2017, Autom..
[9] Kwok-Yan Lam,et al. Wireless Communication and Security Issues for Cyber–Physical Systems and the Internet-of-Things , 2018, Proceedings of the IEEE.
[10] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[11] Frank Vahid,et al. A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems , 2014, KSII Trans. Internet Inf. Syst..
[12] Xiaohua Ge,et al. Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[13] L. Shapley,et al. Potential Games , 1994 .
[14] Yu Cheng,et al. Towards Energy-Efficient Wireless Networking in the Big Data Era: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[15] Ivana Tomić,et al. A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.
[16] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[17] Yu Cheng,et al. Real-Time Misbehavior Detection and Mitigation in Cyber-Physical Systems Over WLANs , 2017, IEEE Transactions on Industrial Informatics.
[18] Ling Shi,et al. SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.
[19] Ling Shi,et al. Stochastic Game in Remote Estimation Under DoS Attacks , 2017, IEEE Control Systems Letters.
[20] Changyin Sun,et al. An adaptive strategy via reinforcement learning for the prisoner U+02BC s dilemma game , 2018, IEEE/CAA Journal of Automatica Sinica.