Dynamic model predictive control for constrained cyber-physical systems subject to actuator attacks
暂无分享,去创建一个
Chunjie Zhou | Yuanqing Qin | Yu-Chu Tian | Yue Zhao | Kaixing Huang | Yu-Chu Tian | Yue Zhao | Chunjie Zhou | Yuanqing Qin | Kaixing Huang
[1] L. Chisci,et al. Feasibility in predictive control of constrained linear systems: the output feedback case , 2002 .
[2] Proceedings of the 1st ACM Workshop on Cyber-Physical System Security , 2015, CPSS@ASIACSS.
[3] David Q. Mayne,et al. Robust output feedback model predictive control of constrained linear systems , 2006, Autom..
[4] Marilyn Wolf,et al. Safety and Security in Cyber-Physical Systems and Internet-of-Things Systems , 2018, Proceedings of the IEEE.
[5] Yan Song,et al. RMPC-based security problem for polytopic uncertain system subject to deception attacks and persistent disturbances , 2017 .
[6] Qing-Long Han,et al. Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[7] Sonia Martínez,et al. On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.
[8] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.
[9] Francesco Bullo,et al. Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[10] Guang-Hong Yang,et al. Decentralized Adaptive Fuzzy Secure Control for Nonlinear Uncertain Interconnected Systems Against Intermittent DoS Attacks , 2019, IEEE Transactions on Cybernetics.
[11] Basil Kouvaritakis,et al. Stabilizable regions of receding horizon predictive control with input constraints , 1999 .
[12] Luigi Chisci,et al. Systems with persistent disturbances: predictive control with restricted constraints , 2001, Autom..
[13] Bruno Sinopoli,et al. Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.
[14] B. Kouvaritakis,et al. Receding horizon output feedback control for linear systems with input saturation , 2001 .
[15] Lei Shu,et al. Smart Factory of Industry 4.0: Key Technologies, Application Case, and Challenges , 2018, IEEE Access.
[16] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[17] Mohamed Darouach,et al. A model predictive approach for cyber-attack detection and mitigation in control systems , 2013, 52nd IEEE Conference on Decision and Control.
[18] Maria Letizia Corradini,et al. A sliding-mode scheme for monitoring malicious attacks in cyber-physical systems , 2017 .
[19] Dan Ye,et al. Distributed Secure Control Against Denial-of-Service Attacks in Cyber-Physical Systems Based on K-Connected Communication Topology , 2020, IEEE Transactions on Cybernetics.
[20] Huiping Li,et al. Output feedback predictive control for constrained linear systems with intermittent measurements , 2013, Syst. Control. Lett..
[21] Aiko Pras,et al. Exploiting traffic periodicity in industrial control networks , 2016, Int. J. Crit. Infrastructure Prot..
[22] Nils Ole Tippenhauer,et al. On Attacker Models and Profiles for Cyber-Physical Systems , 2016, ESORICS.
[23] David Q. Mayne,et al. Constrained model predictive control: Stability and optimality , 2000, Autom..
[24] Wei Xing Zheng,et al. Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel , 2018, IEEE Transactions on Automatic Control.
[25] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[26] Michail Maniatakos,et al. The Cybersecurity Landscape in Industrial Control Systems , 2016, Proceedings of the IEEE.
[27] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.