Encryption scheduling for remote state estimation under an operation constraint
暂无分享,去创建一个
Daniel E. Quevedo | Kemi Ding | Alex S. Leong | Ling Shi | Lingying Huang | D. Quevedo | Ling Shi | A. Leong | Lingying Huang | Kemi Ding | Alex S. C. Leong
[1] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[2] Ling Shi,et al. Kalman Filtering Over a Packet-Dropping Network: A Probabilistic Perspective , 2010, IEEE Transactions on Automatic Control.
[3] Moritz Wiese,et al. Secure Estimation and Zero-Error Secrecy Capacity , 2016, IEEE Transactions on Automatic Control.
[4] Daniel E. Quevedo,et al. Sensor Scheduling in Variance Based Event Triggered Estimation With Packet Drops , 2015, IEEE Transactions on Automatic Control.
[5] Ling Shi,et al. Dynamic sensor transmission power scheduling for remote state estimation , 2014, Autom..
[6] Ling Shi,et al. Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.
[7] Ling Shi,et al. Sensor data scheduling for optimal state estimation with communication energy constraint , 2011, Autom..
[8] Qusay H. Mahmoud,et al. Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..
[9] Soummya Kar,et al. Distributed Kalman Filtering With Quantized Sensing State , 2015, IEEE Transactions on Signal Processing.
[10] Ling Shi,et al. SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.
[11] Bruno Sinopoli,et al. Kalman filtering with intermittent observations , 2004, IEEE Transactions on Automatic Control.
[12] Yu Cheng,et al. Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks , 2016, IEEE Internet of Things Journal.
[13] Peter Xiaoping Liu,et al. A stochastic game approach to the security issue of networked control systems under jamming attacks , 2014, J. Frankl. Inst..
[14] Ling Shi,et al. Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.
[15] R. Gray,et al. Dithered Quantizers , 1993, Proceedings. 1991 IEEE International Symposium on Information Theory.
[16] Kenneth E. Barner,et al. Sensor Data Cryptography in Wireless Sensor Networks , 2008, IEEE Transactions on Information Forensics and Security.
[17] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[18] George J. Pappas,et al. State Estimation with Secrecy against Eavesdroppers , 2016, ArXiv.
[19] Daniel E. Quevedo,et al. Remote State Estimation over Packet Dropping Links in the Presence of an Eavesdropper , 2017, ArXiv.
[20] Sandeep K. S. Gupta,et al. Special Issue on Cyber-Physical Systems [Scanning the Issue] , 2012, Proc. IEEE.
[21] L. Schuchman. Dither Signals and Their Effect on Quantization Noise , 1964 .