Passivity-Based Robust Control Against Quantified False Data Injection Attacks in Cyber-Physical Systems
暂无分享,去创建一个
Chunjie Zhou | Yue Zhao | Yuanqing Qin | Yu-Chu Tian | Ze Chen | Yu-Chu Tian | Yue Zhao | Chunjie Zhou | Yuanqing Qin | Ze Chen
[1] Guo-Ping Liu,et al. Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.
[2] Guoping Liu,et al. Design and detection of false data injection attacks against output tracking control systems , 2017, 2017 36th Chinese Control Conference (CCC).
[3] Dehui Sun,et al. False data injection attacks for a class of output tracking control systems , 2015, The 27th Chinese Control and Decision Conference (2015 CCDC).
[4] Bing Chu,et al. Energy-Based $L_2$ Disturbance Attenuation Excitation Control of Differential Algebraic Power Systems , 2008, IEEE Transactions on Circuits and Systems II: Express Briefs.
[5] Alessandro Astolfi,et al. Practical L2 disturbance attenuation for nonlinear systems , 2002, Autom..
[6] Qing-Long Han,et al. State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..
[7] Sonia Martínez,et al. On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.
[8] M. Granieri,et al. Down Converter Characterization in a Synthetic Instrument Context , 2006, 2006 IEEE Autotestcon.
[9] Guang-Hong Yang,et al. Decentralized Adaptive Fuzzy Secure Control for Nonlinear Uncertain Interconnected Systems Against Intermittent DoS Attacks , 2019, IEEE Transactions on Cybernetics.
[10] Emanuele Garone,et al. Feasibility and Detection of Replay Attack in Networked Constrained Cyber-Physical Systems , 2019, 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[11] Qi Tang,et al. A New Cuk Converter with High Step-Down Ratio and its Control , 2014 .
[12] Hyungbo Shim,et al. When adversary encounters uncertain cyber-physical systems: Robust zero-dynamics attack with disclosure resources , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[13] Yuri B. Shtessel,et al. Sliding Mode Disturbance Observer-Based Control for a Reusable Launch Vehicle , 2005 .
[14] Ali Akbar Safavi,et al. A Secure Hybrid Dynamic-State Estimation Approach for Power Systems Under False Data Injection Attacks , 2020, IEEE Transactions on Industrial Informatics.
[15] Renquan Lu,et al. Event-Triggered Consensus Control for Multi-Agent Systems Against False Data-Injection Attacks , 2019, IEEE Transactions on Cybernetics.
[16] Jian Sun,et al. Covert attacks against output tracking control of cyber-physical systems , 2017, IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society.
[17] Mark W. Spong,et al. Passivity-Based Control of Multi-Agent Systems , 2006 .
[18] Dan Ye,et al. False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach , 2020, Autom..
[19] Guang-Hong Yang,et al. Stability Analysis for Cyber-Physical Systems Under Denial-of-Service Attacks , 2020, IEEE Transactions on Cybernetics.
[20] Xin Huang,et al. Adaptive integral sliding‐mode control strategy of data‐driven cyber‐physical systems against a class of actuator attacks , 2018, IET Control Theory & Applications.
[21] Daizhan Cheng,et al. Dissipative Hamiltonian realization and energy-based L2-disturbance attenuation control of multimachine power systems , 2003, IEEE Trans. Autom. Control..
[22] Gerardo Espinosa-Pérez,et al. On the passivity-based power control of a doubly-fed induction machine , 2013 .
[23] Alessandro Macchelli,et al. Control by Interconnection and Energy Shaping of the Timoshenko Beam , 2004 .
[24] Euntai Kim,et al. A fuzzy disturbance observer and its application to control , 2002, IEEE Trans. Fuzzy Syst..
[25] Guang-Hong Yang,et al. Adaptive sliding mode fault tolerant control for nonlinearly chaotic systems against DoS attack and network faults , 2017, J. Frankl. Inst..
[26] Jie Li,et al. Research on PMSM Speed Control System Based on Improved Reaching Law , 2019, 2019 3rd International Conference on Circuits, System and Simulation (ICCSS).
[27] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks , 2018, IEEE Transactions on Automatic Control.
[28] Christian Diedrich,et al. Identifying false data injection attacks in industrial control systems using artificial neural networks , 2017, 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).
[29] Yan Song,et al. RMPC-based security problem for polytopic uncertain system subject to deception attacks and persistent disturbances , 2017 .
[30] Arman Sargolzaei,et al. Resilient Control Design for Load Frequency Control System Under False Data Injection Attacks , 2020, IEEE Transactions on Industrial Electronics.
[31] Guang-Hong Yang,et al. Event-triggered secure observer-based control for cyber-physical systems under adversarial attacks , 2017, Inf. Sci..
[32] Yijing Wang,et al. Security control of multi-agent systems under false data injection attacks , 2020, Neurocomputing.
[33] Mohamed Darouach,et al. A model predictive approach for cyber-attack detection and mitigation in control systems , 2013, 52nd IEEE Conference on Decision and Control.
[34] Andong Liu,et al. Distributed model predictive control for wide area measurement power systems under malicious attacks , 2017, IET Cyper-Phys. Syst.: Theory & Appl..
[35] Olav Bjarte Fosso,et al. Passivity-Based Control of Power Systems Considering Hydro-Turbine With Surge Tank , 2020, IEEE Transactions on Power Systems.
[36] T. Shen,et al. Design method for an adaptive robust controller with L/sub 2/-gain disturbance attenuation for nonlinear systems with uncertainty , 2004 .
[37] Dorothée Normand-Cyrot,et al. A passivity-based controller under low sampling for speed control of PMSM , 2014 .
[38] A. Levant. Sliding order and sliding accuracy in sliding mode control , 1993 .
[39] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[40] Shuai Liu,et al. Event-triggered dynamic output feedback RMPC for polytopic systems with redundant channels: Input-to-state stability , 2017, J. Frankl. Inst..
[41] Thomas Parisini,et al. Detection of Covert Cyber-Attacks in Interconnected Systems: A Distributed Model-Based Approach , 2020, IEEE Transactions on Automatic Control.
[42] Narayan C. Kar,et al. Direct Calculation of Maximum-Torque-Per-Ampere Angle for Interior PMSM Control Using Measured Speed Harmonic , 2018, IEEE Transactions on Power Electronics.
[43] Xin Huang,et al. Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks , 2018, IEEE Transactions on Cybernetics.
[44] Liang Liu,et al. Identifying LDoS attack traffic based on wavelet energy spectrum and combined neural network , 2018, Int. J. Commun. Syst..
[45] Guang-Hong Yang,et al. Improved adaptive resilient control against sensor and actuator attacks , 2018, Inf. Sci..
[46] Gerd Hirzinger,et al. Passivity-based Object-Level Impedance Control for a Multifingered Hand , 2006, 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[47] Jiabin Wang,et al. Maximum Torque Per Ampere (MTPA) Control for Interior Permanent Magnet Synchronous Machine Drives Based on Virtual Signal Injection , 2015, IEEE Transactions on Power Electronics.