Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks
暂无分享,去创建一个
Qing-Long Han | Zidong Wang | Guoliang Wei | Derui Ding | Zidong Wang | Derui Ding | G. Wei | Q. Han | G. Wei
[1] James Lam,et al. Non-Fragile Exponential Stability Assignment of Discrete-Time Linear Systems With Missing Data in Actuators , 2009, IEEE Transactions on Automatic Control.
[2] Pramod K. Varshney,et al. Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.
[3] Yan Song,et al. Recursive state estimation for discrete time-varying stochastic nonlinear systems with randomly occurring deception attacks , 2016, Int. J. Gen. Syst..
[4] André Teixeira,et al. Networked control systems under cyber attacks with applications to power networks , 2010, Proceedings of the 2010 American Control Conference.
[5] X. Zhou,et al. Stochastic Controls: Hamiltonian Systems and HJB Equations , 1999 .
[6] Alberto Bemporad,et al. Dynamic programming for constrained optimal control of discrete-time linear hybrid systems , 2005, Autom..
[7] Ing-Ray Chen,et al. Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[8] Jifeng Zhang,et al. Output‐feedback control of a class of stochastic nonlinear systems with linearly bounded unmeasurable states , 2008 .
[9] Xuerong Mao,et al. On Input-to-State Stability of Stochastic Retarded Systems With Markovian Switching , 2009, IEEE Transactions on Automatic Control.
[10] Rick S. Blum,et al. Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.
[11] Yuguang Fang,et al. A multipath routing approach for secure data delivery , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[12] S. Shankar Sastry,et al. Security of interdependent and identical networked control systems , 2013, Autom..
[13] Gerry Leversha,et al. Foundations of modern probability (2nd edn), by Olav Kallenberg. Pp. 638. £49 (hbk). 2002. ISBN 0 387 95313 2 (Springer-Verlag). , 2004, The Mathematical Gazette.
[14] Sonia Martínez,et al. On event-triggered control of linear systems under periodic denial-of-service jamming attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[15] Fuad E. Alsaadi,et al. Design of non-fragile state estimators for discrete time-delayed neural networks with parameter uncertainties , 2016, Neurocomputing.
[16] Shuai Liu,et al. Event-based distributed set-membership filtering for a class of time-varying non-linear systems over sensor networks with saturation effects , 2016, Int. J. Gen. Syst..
[17] Shuai Liu,et al. Error-constrained reliable tracking control for discrete time-varying systems subject to quantization effects , 2016, Neurocomputing.
[18] Zidong Wang,et al. RobustH∞ Finite-HorizonFilteringwithRandomly OccurredNonlinearitiesandQuantizationEffects ⋆ , 2010 .
[19] Guo-Ping Liu,et al. Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.
[20] Kevin A. Kwiat,et al. Improving System Reliability Against Rational Attacks Under Given Resources , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[21] Chen-Khong Tham,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS 1 Sensing-Driven Energy Purchasing in Smart Grid C , 2022 .
[22] Derui Ding,et al. Event-triggered consensus control for discrete-time stochastic multi-agent systems: The input-to-state stability in probability , 2015, Autom..
[23] Fuwen Yang,et al. H∞ control for networked systems with random communication delays , 2006, IEEE Trans. Autom. Control..
[24] Fuad E. Alsaadi,et al. On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors , 2017, Neurocomputing.
[25] John Y. Hung,et al. Denial of service attacks on network-based control systems: impact and mitigation , 2005, IEEE Transactions on Industrial Informatics.
[26] Grienggrai Rajchakit,et al. Robust stability and stabilization of nonlinear uncertain stochastic switched discrete-time systems with interval time-varying delays , 2012 .
[27] H. Karimi. Robust H 1 Filter Design for Uncertain Linear Systems Over Network with Network-Induced Delays and Output Quantization , 2009 .
[28] Kok Lay Teo,et al. An integrated optimal control algorithm for discrete-time nonlinear stochastic system , 2010, Int. J. Control.
[29] Qi Li,et al. Event-triggered synchronization control for complex networks with uncertain inner coupling , 2015, Int. J. Gen. Syst..
[30] G. Sohie,et al. Generalization of the matrix inversion lemma , 1986, Proceedings of the IEEE.
[31] Hongli Dong,et al. Dynamic output feedback control for discrete-time stochastic nonlinear systems with adversaries , 2014, Proceedings of the 33rd Chinese Control Conference.
[32] J. Tsinias. Stochastic input-to-state stability and applications to global feedback stabilization , 1998 .
[33] Jun Hu,et al. A variance-constrained approach to recursive state estimation for time-varying complex networks with missing measurements , 2016, Autom..
[34] Ian R. Petersen. Guaranteed Cost Control of Stochastic Uncertain Systems with Slope Bounded Nonlinearities via the use of Dynamic Multipliers , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.
[35] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[36] Fuad E. Alsaadi,et al. Distributed fault estimation with randomly occurring uncertainties over sensor networks , 2016, Int. J. Gen. Syst..
[37] Peter Palensky,et al. Simulating Cyber-Physical Energy Systems: Challenges, Tools and Methods , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[38] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[39] Hao Xu,et al. Finite-Horizon Near-Optimal Output Feedback Neural Network Control of Quantized Nonlinear Discrete-Time Systems With Input Constraint , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[40] Panos J. Antsaklis,et al. Risk-sensitive control under a class of denial-of-service attack models , 2011, Proceedings of the 2011 American Control Conference.