Reach Set-Based Secure State Estimation against Sensor Attacks with Interval Hull Approximation
暂无分享,去创建一个
[1] Thomas M. Liebling,et al. Analysis of Backtrack Algorithms for Listing All Vertices and All Faces of a Convex Polyhedron , 1997, Comput. Geom..
[2] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[3] G. Ziegler. Lectures on Polytopes , 1994 .
[4] Gabor Karsai,et al. Toward a Science of Cyber–Physical System Integration , 2012, Proceedings of the IEEE.
[5] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[6] Paulo Tabuada,et al. Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.
[7] Kevin Barraclough,et al. I and i , 2001, BMJ : British Medical Journal.
[8] Dan Amir. Chebyshev centers and uniform convexity , 1978 .
[9] Toru Namerikawa,et al. Detection of replay attack on smart grid with code signal and bargaining game , 2017, 2017 American Control Conference (ACC).
[10] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[11] Paulo Tabuada,et al. Non-invasive Spoofing Attacks for Anti-lock Braking Systems , 2013, CHES.
[12] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[13] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[14] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[15] João Pedro Hespanha,et al. Observability of linear systems under adversarial attacks , 2015, 2015 American Control Conference (ACC).
[16] E. Kerrigan. Robust Constraint Satisfaction: Invariant Sets and Predictive Control , 2000 .
[17] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[18] Srdjan Capkun,et al. On the requirements for successful GPS spoofing attacks , 2011, CCS '11.
[19] Stephen P. Boyd,et al. Graph Implementations for Nonsmooth Convex Programs , 2008, Recent Advances in Learning and Control.
[20] V. Klee,et al. Helly's theorem and its relatives , 1963 .
[21] Toru Namerikawa,et al. On the Vulnerabilities Due to Manipulative Zero-Stealthy Attacks in Cyber-Physical Systems , 2017 .
[22] Paulo Tabuada,et al. Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach , 2014, IEEE Transactions on Automatic Control.
[23] Antoine Girard,et al. Efficient Computation of Reachable Sets of Linear Time-Invariant Systems with Inputs , 2006, HSCC.
[24] Yilin Mo,et al. Dynamic state estimation in the presence of compromised sensory data , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[25] Tsuyoshi Murata,et al. {m , 1934, ACML.
[26] Stephen P. Boyd,et al. Real-Time Convex Optimization in Signal Processing , 2010, IEEE Signal Processing Magazine.
[27] George J. Pappas,et al. Design and Implementation of Attack-Resilient Cyber-Physical Systems , 2016 .
[28] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[29] T. Zaslavsky. Facing Up to Arrangements: Face-Count Formulas for Partitions of Space by Hyperplanes , 1975 .
[30] Komei Fukuda,et al. Combinatorial Face Enumeration in Convex Polytopes , 1994, Comput. Geom..
[31] Insup Lee,et al. Attack-Resilient State Estimation for Noisy Dynamical Systems , 2017, IEEE Transactions on Control of Network Systems.
[32] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.