暂无分享,去创建一个
[1] Shreyas Sundaram,et al. Distributed Observers for LTI Systems , 2016, IEEE Transactions on Automatic Control.
[2] A. Stephen Morse,et al. A distributed observer for a time-invariant linear system , 2017, 2017 American Control Conference (ACC).
[3] Valery A. Ugrinovskii,et al. Detectability of distributed consensus-based observer networks: An elementary analysis and extensions , 2014, 2014 4th Australian Control Conference (AUCC).
[4] Reza Olfati-Saber,et al. Distributed Kalman filtering for sensor networks , 2007, 2007 46th IEEE Conference on Decision and Control.
[5] J. Doyle,et al. Robust and optimal control , 1995, Proceedings of 35th IEEE Conference on Decision and Control.
[6] Valery A. Ugrinovskii,et al. Detection and Mitigation of Biasing Attacks on Distributed Estimation Networks , 2018, Autom..
[7] Shinkyu Park,et al. Design of Distributed LTI Observers for State Omniscience , 2017, IEEE Transactions on Automatic Control.
[8] Shreyas Sundaram,et al. Secure local filtering algorithms for distributed optimization , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[9] Valery A. Ugrinovskii,et al. Minimum-energy distributed filtering , 2014, 53rd IEEE Conference on Decision and Control.
[10] Valery A. Ugrinovskii,et al. Conditions for Detectability in Distributed Consensus-Based Observer Networks , 2012, IEEE Transactions on Automatic Control.
[11] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[12] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[13] Weixin Han,et al. A Simple Approach to Distributed Observer Design for Linear Systems , 2017, IEEE Transactions on Automatic Control.
[14] Magdi S. Mahmoud,et al. Distributed Kalman filtering: a bibliographic review , 2013 .
[15] Pietro Tesi,et al. Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.
[16] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[17] Valery A. Ugrinovskii,et al. Controller-jammer game models of Denial of Service in control systems operating over packet-dropping links , 2017, Autom..
[18] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[19] V A Ugrinovskii,et al. Distributed robust filtering with H∞ consensus of estimates , 2010, Proceedings of the 2010 American Control Conference.
[20] P. Khargonekar,et al. Filtering and smoothing in an H/sup infinity / setting , 1989, Proceedings of the 28th IEEE Conference on Decision and Control,.
[21] Ann Cox,et al. A science of system security , 2014, 53rd IEEE Conference on Decision and Control.
[22] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[23] Shreyas Sundaram,et al. Secure distributed observers for a class of linear time invariant systems in the presence of Byzantine adversaries , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[24] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[25] Roy S. Smith,et al. Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.
[26] T. Basar,et al. H∞-0ptimal Control and Related Minimax Design Problems: A Dynamic Game Approach , 1996, IEEE Trans. Autom. Control..
[27] Valery A. Ugrinovskii,et al. Robust detection of biasing attacks on misappropriated distributed observers via decentralized H∞ synthesis , 2017, 2017 11th Asian Control Conference (ASCC).
[28] V. Ugrinovskii,et al. Resilient Distributed $H_{\infty}$ Estimation via Dynamic Rejection of Biasing Attacks , 2018, 2018 Annual American Control Conference (ACC).
[29] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.
[30] Claire J. Tomlin,et al. Secure estimation based Kalman Filter for cyber-physical systems against sensor attacks , 2018, Autom..
[31] Henk Nijmeijer,et al. Network Synchronization by Dynamic diffusive Coupling , 2013, Int. J. Bifurc. Chaos.
[32] Roy S. Smith,et al. Design of distributed decentralized estimators for formations with fixed and stochastic communication topologies , 2009, Autom..