Secure Analysis of Dynamic Networks under Pinning Attacks against Synchronization
暂无分享,去创建一个
Tongwen Chen | Dawei Shi | Yuzhe Li | Tongwen Chen | Dawei Shi | Yuzhe Li
[1] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[2] Xinghuo Yu,et al. Optimizing Dynamical Network Structure for Pinning Control , 2016, Scientific Reports.
[3] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[4] A. M. Geoffrion,et al. Integer Programming Algorithms: A Framework and State-of-the-Art Survey , 1972 .
[5] J. Gómez-Gardeñes,et al. Evolutionary game dynamics in a growing structured population , 2009, 0907.2649.
[6] Guanrong Chen,et al. Pinning control of scale-free dynamical networks , 2002 .
[7] J. Nash,et al. NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.
[8] Craig W. Reynolds. Flocks, herds, and schools: a distributed behavioral model , 1998 .
[9] Guanrong Chen,et al. YET ANOTHER CHAOTIC ATTRACTOR , 1999 .
[10] R. Lucchetti,et al. Existence theorems of equilibrium points in stackelberg , 1987 .
[11] J. Kurths,et al. Enhancing complex-network synchronization , 2004, cond-mat/0406207.
[12] Tansu Alpcan,et al. Network Security , 2010 .
[13] Ninad Thakoor,et al. Computation complexity of branch-and-bound model selection , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[14] M Small,et al. Complex network from pseudoperiodic time series: topology versus dynamics. , 2006, Physical review letters.
[15] Guanrong Chen,et al. A time-varying complex dynamical network model and its controlled synchronization criteria , 2005, IEEE Transactions on Automatic Control.
[16] Weixiong Zhang. Branch-and-Bound Search Algorithms and Their Computational Complexity. , 1996 .
[17] Marco Aiello,et al. Power grid complex network evolutions for the smart grid , 2014 .
[18] Qu,et al. Controlling spatiotemporal chaos in coupled map lattice systems. , 1994, Physical review letters.
[19] Rongxing Lu,et al. Defending Against False Data Injection Attacks on Power System State Estimation , 2017, IEEE Transactions on Industrial Informatics.
[20] Sajal K. Das,et al. A game theory based approach for security in wireless sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[21] G. Parisi,et al. Interaction ruling animal collective behavior depends on topological rather than metric distance: Evidence from a field study , 2007, Proceedings of the National Academy of Sciences.
[22] M. Cross,et al. Pinning control of spatiotemporal chaos , 1997, chao-dyn/9705001.
[23] Ling Shi,et al. Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.
[24] Guy Theraulaz,et al. Self-Organization in Biological Systems , 2001, Princeton studies in complexity.
[25] Tongwen Chen,et al. False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis , 2018, IEEE Transactions on Automatic Control.
[26] Jinde Cao,et al. Pinning-Controllability Analysis of Complex Networks: An M-Matrix Approach , 2012, IEEE Transactions on Circuits and Systems I: Regular Papers.
[27] Zengqiang Chen,et al. Reaching a consensus via pinning control , 2009, Autom..
[28] Maurizio Porfiri,et al. Global pinning controllability of complex networks , 2008 .
[29] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[30] G. Nemhauser,et al. Integer Programming , 2020 .
[31] Gerhard Freiling,et al. Existence and Uniqueness of Open-Loop Stackelberg Equilibria in Linear-Quadratic Differential Games , 2001 .
[32] Xiang Li,et al. Control and Flocking of Networked Systems via Pinning , 2010, IEEE Circuits and Systems Magazine.
[33] Yonina C. Eldar,et al. Convex Optimization in Signal Processing and Communications , 2009 .
[34] J. Clausen,et al. Branch and Bound Algorithms-Principles and Examples , 2003 .
[35] Olaf Sporns,et al. Complex network measures of brain connectivity: Uses and interpretations , 2010, NeuroImage.
[36] Vincent Conitzer,et al. Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..
[37] Maurizio Porfiri,et al. Criteria for global pinning-controllability of complex networks , 2008, Autom..
[38] Robert Gibbons,et al. A primer in game theory , 1992 .
[39] Sushil Jajodia,et al. Understanding complex network attack graphs through clustered adjacency matrices , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[40] D S Callaway,et al. Network robustness and fragility: percolation on random graphs. , 2000, Physical review letters.
[41] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[42] Ali H. Sayed,et al. Adaptive Networks , 2014, Proceedings of the IEEE.
[43] Abraham Wald,et al. Statistical Decision Functions , 1951 .
[44] Linying Xiang,et al. Pinning control of complex dynamical networks with general topology , 2007 .
[45] Adilson E Motter,et al. Cascade-based attacks on complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.