Learning-Based Cooperative False Data Injection Attack and Its Mitigation Techniques in Consensus-Based Distributed Estimation
暂无分享,去创建一个
Huifang Chen | Kuang Wang | Lei Xie | Qiaomu Jiang | Lei Xie | Kuang Wang | Hui-fang Chen | Qiao-mu Jiang
[1] Carlos Sagüés,et al. Chebyshev Polynomials in Distributed Consensus Applications , 2011, IEEE Transactions on Signal Processing.
[2] C.N. Hadjicostis,et al. Finite-Time Distributed Consensus in Graphs with Time-Invariant Topologies , 2007, 2007 American Control Conference.
[3] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[4] Anna Scaglione,et al. Data Injection Attacks in Randomized Gossiping , 2016, IEEE Transactions on Signal and Information Processing over Networks.
[5] Pramod K. Varshney,et al. Data Falsification Attacks on Consensus-Based Detection Systems , 2017, IEEE Transactions on Signal and Information Processing over Networks.
[6] Christian Commault,et al. Generic properties and control of linear structured systems: a survey , 2003, Autom..
[7] Luca Schenato,et al. A Survey on Distributed Estimation and Control Applications Using Linear Consensus Algorithms , 2010 .
[8] Sandro Zampieri,et al. Mean Square Performance of Consensus-Based Distributed Estimation over Regular Geometric Graphs , 2012, SIAM J. Control. Optim..
[9] E. S. Page. CONTINUOUS INSPECTION SCHEMES , 1954 .
[10] Soummya Kar,et al. Resilient Distributed Estimation Through Adversary Detection , 2017, IEEE Transactions on Signal Processing.
[11] Shreyas Sundaram,et al. Robustness of information diffusion algorithms to locally bounded adversaries , 2011, 2012 American Control Conference (ACC).
[12] Jiming Chen,et al. Resilient Consensus with Mobile Detectors Against Malicious Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[13] Soummya Kar,et al. The Internet of Things: Secure Distributed Inference , 2018, IEEE Signal Processing Magazine.
[14] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[15] Antonio Bicchi,et al. Distributed intrusion detection for secure consensus computations , 2007, 2007 46th IEEE Conference on Decision and Control.
[16] Stephen P. Boyd,et al. A scheme for robust distributed sensor fusion based on average consensus , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[17] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[18] Shreyas Sundaram,et al. Resilient Asymptotic Consensus in Robust Networks , 2013, IEEE Journal on Selected Areas in Communications.
[19] Kurt Johannes Reinschke,et al. Multivariable Control a Graph-theoretic Approach , 1988 .
[20] Qing-Long Han,et al. Distributed Krein space-based attack detection over sensor networks under deception attacks , 2019, Autom..
[21] Robert H. Halstead,et al. Matrix Computations , 2011, Encyclopedia of Parallel Computing.
[22] Carl D. Meyer,et al. Matrix Analysis and Applied Linear Algebra , 2000 .
[23] Shui-Hung Hou,et al. Classroom Note: A Simple Proof of the Leverrier-Faddeev Characteristic Polynomial Algorithm , 1998, SIAM Rev..
[24] Stephen P. Boyd,et al. Fast linear iterations for distributed averaging , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[25] Shreyas Sundaram,et al. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.
[26] Vijay Kumar,et al. Resilient consensus for time-varying networks of dynamic agents , 2017, 2017 American Control Conference (ACC).
[27] Anna Scaglione,et al. Detection of data injection attacks in decentralized learning , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.