Attack-resilient estimation of switched nonlinear cyber-physical systems
暂无分享,去创建一个
Peng Liu | Minghui Zhu | Pinyao Guo | Hunmin Kim | Minghui Zhu | Peng Liu | Hunmin Kim | Pinyao Guo
[1] E. Jury,et al. ALMOST SURE BOUNDEDNESS OF RANDOMLY SAMPLED SYSTEMS , 1971 .
[2] T. Tarn,et al. Observers for nonlinear stochastic systems , 1975, 1975 IEEE Conference on Decision and Control including the 14th Symposium on Adaptive Processes.
[3] B. Anderson,et al. Detectability and Stabilizability of Time-Varying Discrete-Time Linear Systems , 1981 .
[4] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .
[5] A.G. Phadke,et al. Synchronized phasor measurements in power systems , 1993, IEEE Computer Applications in Power.
[6] Mohamed Darouach,et al. Unbiased minimum variance estimation for systems with unknown exogenous inputs , 1997, Autom..
[7] R. Patton,et al. Optimal filtering for systems with unknown inputs , 1998, IEEE Trans. Autom. Control..
[8] Chien-Shu Hsieh,et al. Robust two-stage Kalman filters for systems with unknown inputs , 2000, IEEE Trans. Autom. Control..
[9] Carlos E. Pedreira,et al. Neural networks for short-term load forecasting: a review and evaluation , 2001 .
[10] Hesham K. Alfares,et al. Electric load forecasting: Literature survey and classification of methods , 2002, Int. J. Syst. Sci..
[11] Petar M. Djuric,et al. Gaussian particle filtering , 2003, IEEE Trans. Signal Process..
[12] Bart De Moor,et al. Unbiased minimum-variance input and state estimation for linear discrete-time systems with direct feedthrough , 2007, Autom..
[13] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[14] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[15] M. Scheutzow,et al. Existence and uniqueness of solutions of stochastic functional differential equations , 2008, 0812.1726.
[16] Michael Kearns. Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology , 2010 .
[17] James S. Thorp,et al. Synchronized Phasor Measurement Applications in Power Systems , 2010, IEEE Transactions on Smart Grid.
[18] Yilin Mo,et al. False Data Injection Attacks in Control Systems , 2010 .
[19] Konrad Reif,et al. Stochastic Stability of the Extended Kalman Filter With Intermittent Observations , 2010, IEEE Transactions on Automatic Control.
[20] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[21] Soummya Kar,et al. Distributed detection and isolation of topology attacks in power networks , 2012, HiCoNS '12.
[22] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[23] Emilio Frazzoli,et al. Simultaneous input and state estimation for linear discrete-time stochastic systems with direct feedthrough , 2013, 52nd IEEE Conference on Decision and Control.
[24] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[25] Sonia Martínez,et al. On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.
[26] Emilio Frazzoli,et al. Resilient state estimation against switching attacks on stochastic cyber-physical systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[27] Emilio Frazzoli,et al. A unified filter for simultaneous input and state estimation of linear discrete-time stochastic systems , 2013, Autom..