Remote State Estimation in the Presence of an Active Eavesdropper
暂无分享,去创建一个
Xiaoqiang Ren | Daniel E. Quevedo | Kemi Ding | Alex S. Leong | Ling Shi | D. Quevedo | Ling Shi | A. Leong | Xiaoqiang Ren | Kemi Ding | Alex S. C. Leong
[1] Keith W. Ross,et al. Randomized and Past-Dependent Policies for Markov Decision Processes with Multiple Constraints , 1989, Oper. Res..
[2] Markku Renfors,et al. Comparison of decision-directed and pilot-aided algorithms for complex channel tap estimation in a downlink WCDMA system , 2000, 11th IEEE International Symposium on Personal Indoor and Mobile Radio Communications. PIMRC 2000. Proceedings (Cat. No.00TH8525).
[3] Vikram Krishnamurthy,et al. ${Q}$-Learning Algorithms for Constrained Markov Decision Processes With Randomized Monotone Policies: Application to MIMO Transmission Control , 2007, IEEE Transactions on Signal Processing.
[4] A. Lee Swindlehurst,et al. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.
[5] Eduard A. Jorswieck,et al. To avoid or not to avoid CSI leakage in physical layer secret communication systems , 2015, IEEE Communications Magazine.
[6] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[7] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[8] Derrick Wing Kwan Ng,et al. Secure Massive MIMO Transmission With an Active Eavesdropper , 2015, IEEE Transactions on Information Theory.
[9] Xiaoqiang Ren,et al. Infinite Horizon Optimal Transmission Power Control for Remote State Estimation Over Fading Channels , 2016, IEEE Transactions on Automatic Control.
[10] Xiangyun Zhou,et al. Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.
[11] Petros G. Voulgaris,et al. On optimal ℓ∞ to ℓ∞ filtering , 1995, Autom..
[12] Ling Shi,et al. A multi-channel transmission schedule for remote state estimation under DoS attacks , 2017, Autom..
[13] Bruno Sinopoli,et al. Kalman filtering with intermittent observations , 2004, IEEE Transactions on Automatic Control.
[14] George J. Pappas,et al. State Estimation with Secrecy against Eavesdroppers , 2016, ArXiv.
[15] O. Hernández-Lerma,et al. Discrete-time Markov control processes , 1999 .
[16] Bruno Sinopoli,et al. Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.
[17] Vivek S. Borkar,et al. An actor-critic algorithm for constrained Markov decision processes , 2005, Syst. Control. Lett..
[18] John S. Baras,et al. Sensor Scheduling using Smart Sensors , 2007, 2007 46th IEEE Conference on Decision and Control.
[19] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[20] Daniel E. Quevedo,et al. Remote State Estimation over Packet Dropping Links in the Presence of an Eavesdropper , 2017, ArXiv.
[21] Rolando Cavazos-Cadena,et al. Comparing recent assumptions for the existence of average optimal stationary policies , 1992, Oper. Res. Lett..
[22] Ling Shi,et al. Dynamic sensor transmission power scheduling for remote state estimation , 2014, Autom..
[23] W. Cary Huffman,et al. Fundamentals of Error-Correcting Codes , 1975 .
[24] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[25] Xiaoqiang Ren,et al. Attack Allocation on Remote State Estimation in Multi-Systems: Structural Results and Asymptotic Solution , 2016, Autom..
[26] Henrik Sandberg,et al. Differentially private state estimation in distribution networks with smart meters , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[27] Daniel E. Quevedo,et al. Sensor Scheduling in Variance Based Event Triggered Estimation With Packet Drops , 2015, IEEE Transactions on Automatic Control.
[28] Wenyuan Xu,et al. Neighborhood watch: security and privacy analysis of automatic meter reading systems , 2012, CCS.
[29] Ling Shi,et al. Probabilistic performance of state estimation across a lossy network , 2008, Autom..
[30] Peter Geibel,et al. Reinforcement Learning for MDPs with Constraints , 2006, ECML.
[31] Ling Shi,et al. Time and Event-based Sensor Scheduling for Networks with Limited Communication Resources , 2011 .
[32] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[33] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[34] F. Beutler,et al. Optimal policies for controlled markov chains with a constraint , 1985 .
[35] Ling Shi,et al. Sensor data scheduling for optimal state estimation with communication energy constraint , 2011, Autom..