Research on secure control and communication for cyber-physical systems under cyber-attacks
暂无分享,去创建一个
Wei Li | Yajie Li | Yahong Shi | Wei Li | Yajie Li | Yahong Shi
[1] Yilin Mo,et al. Attack-Resilient $\mathcal H_2$ , $\mathcal H_\infty$ , and $\ell _1$ State Estimator , 2018 .
[2] Saleh Mobayen,et al. Secure communication in wireless sensor networks based on chaos synchronization using adaptive sliding mode control , 2017, Nonlinear Dynamics.
[3] Bin Jiang,et al. Fault estimation and accommodation for linear MIMO discrete-time systems , 2005, IEEE Transactions on Control Systems Technology.
[4] R. K. Mehra,et al. Hybrid fault-tolerant control of aerospace vehicles , 2001, Proceedings of the 2001 IEEE International Conference on Control Applications (CCA'01) (Cat. No.01CH37204).
[5] 邱爱兵,et al. Optimal Integrated Design of Time-Varying Fault Estimation and Accommodation for Nonuniformly Sampled Data Systems , 2014 .
[6] Guang-Hong Yang,et al. Event-triggered secure observer-based control for cyber-physical systems under adversarial attacks , 2017, Inf. Sci..
[7] Zhiliang Wang,et al. Security Solutions for Networked Control Systems Based on DES Algorithm and Improved Grey Prediction Model , 2013 .
[8] Saleh Mobayen,et al. A Robust LMI Approach on Nonlinear Feedback Stabilization of Continuous State-Delay Systems with Lipschitzian Nonlinearities: Experimental Validation , 2018, Iranian Journal of Science and Technology, Transactions of Mechanical Engineering.
[9] Jian Wang,et al. Data rate condition and controller design for network control system stabilization , 2010, IMA J. Math. Control. Inf..
[10] Pietro Tesi,et al. Resilient Control under Denial-of-Service , 2013, ArXiv.
[11] Pietro Tesi,et al. Resilient control under Denial-of-Service: Robust design , 2016, ACC.
[12] Peng Shi,et al. Network-based event-triggered filtering for Markovian jump systems , 2016, Int. J. Control.
[13] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[14] R. Vepa,et al. Adaptive State Estimation of a PEM Fuel Cell , 2012, IEEE Transactions on Energy Conversion.
[15] Xue Li,et al. Malicious data deception attacks against power systems: A new case and its detection method , 2019, Trans. Inst. Meas. Control.
[16] Hao Zhang,et al. Adaptive state estimation for cyber physical systems under sparse attacks , 2019, Trans. Inst. Meas. Control.
[17] Florentina Nicolau,et al. Multi-input control-affine systems static feedback equivalent to a triangular form and their flatness , 2014, Int. J. Control.
[18] Minrui Fei,et al. Cyber security study for power systems under denial of service attacks , 2019, Trans. Inst. Meas. Control.
[19] G. I. Siv Ashinsky,et al. Nonlinear analysis of hydrodynamic instability in laminar flames—I. Derivation of basic equations , 1988 .
[20] Wen Chenglin,et al. Fault estimation and accommodation for networked control systems with nonuniform sampling periods , 2015 .
[21] Li Wei,et al. A less-conservative robust H_∞ guaranteed cost fault-tolerant control of networked control system , 2011 .
[22] Dong Yue,et al. A discrete event-triggered communication scheme for networked T-S fuzzy systems , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.
[23] Adrian O'Dowd. Major global cyber-attack hits NHS and delays treatment , 2017, British Medical Journal.
[24] Kun Liu,et al. Wirtinger's inequality and Lyapunov-based sampled-data stabilization , 2012, Autom..
[25] Lei Guo,et al. Resilient Control of Networked Control System Under DoS Attacks: A Unified Game Approach , 2016, IEEE Transactions on Industrial Informatics.
[26] Shenquan Wang,et al. Reliable Fuzzy Control for a Class of Nonlinear Networked Control Systems with Time Delay , 2012 .
[27] Pietro Tesi,et al. Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.
[28] Saleh Mobayen,et al. Finite-time chaos synchronization and its application in wireless sensor networks , 2018, Trans. Inst. Meas. Control.
[29] G. Sivashinsky. Nonlinear analysis of hydrodynamic instability in laminar flames—I. Derivation of basic equations , 1977 .
[30] Nastaran Vasegh. Spatiotemporal and synchronous chaos in accumulated coupled map lattice , 2017 .
[31] Changchun Hua,et al. An application of linear algebra theory in networked control systems: stochastic cyber-attacks detection approach , 2016, IMA J. Math. Control. Inf..
[32] Yilin Mo,et al. Attack-Resilient ℋ2, ℋ∩, and ℓ1 State Estimator , 2018, IEEE Trans. Autom. Control..
[33] W. P. M. H. Heemels,et al. Event-Triggered Control Systems Under Denial-of-Service Attacks , 2017, IEEE Transactions on Control of Network Systems.
[34] Weirong Liu,et al. Robust Fault-Tolerant Control for Networked Control System Based on Takagi-Sugeno Fuzzy Model , 2009 .
[35] Paulo Tabuada,et al. Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.
[36] Wim Desmet,et al. Optimal integrated design procedure for ASAC , 2006 .
[37] Quanyan Zhu,et al. Resilient control in the presence of DoS attack: Switched system approach , 2015 .