Stochastic coding detection scheme in cyber-physical systems against replay attack
暂无分享,去创建一个
Dan Ye | Ge Guo | Tian-Yu Zhang | G. Guo | Tian-Yu Zhang | Dan Ye
[1] Vijay Gupta,et al. Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..
[2] Pietro Tesi,et al. Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.
[3] Ling Shi,et al. SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.
[4] George J. Pappas,et al. Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.
[5] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.
[6] Xavier Litrico,et al. Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.
[7] Qing-Long Han,et al. Variance-Constrained Distributed Filtering for Time-Varying Systems With Multiplicative Noises and Deception Attacks Over Sensor Networks , 2017, IEEE Sensors Journal.
[8] Ling Shi,et al. Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.
[9] Derui Ding,et al. Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks , 2017, Autom..
[10] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[11] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[12] Xinghuo Yu,et al. Survey on Recent Advances in Networked Control Systems , 2016, IEEE Transactions on Industrial Informatics.
[13] Tansel Yucelen,et al. An Adaptive Control Architecture for Mitigating Sensor and Actuator Attacks in Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.
[14] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[15] Ling Shi,et al. Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.
[16] Guang-Hong Yang,et al. Input-to-State Stabilizing Control for Cyber-Physical Systems With Multiple Transmission Channels Under Denial of Service , 2018, IEEE Transactions on Automatic Control.
[17] Romain Postoyan,et al. A Lyapunov Redesign of Coordination Algorithms for Cyber-Physical Systems , 2014, IEEE Transactions on Automatic Control.
[18] Guang-Hong Yang,et al. Data-Driven Coordinated Attack Policy Design Based on Adaptive $\mathcal {L}_2$-Gain Optimal Theory , 2018, IEEE Transactions on Automatic Control.
[19] Guoqiang Hu,et al. Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks , 2018, IEEE Transactions on Cybernetics.
[20] Guang-Hong Yang,et al. Improved adaptive resilient control against sensor and actuator attacks , 2018, Inf. Sci..
[21] Qing-Long Han,et al. Network-based H∞H∞ filtering using a logic jumping-like trigger , 2013, Autom..
[22] Sonia Martínez,et al. On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.
[23] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[24] Pietro Tesi,et al. Resilient control under Denial-of-Service: Robust design , 2016, 2016 American Control Conference (ACC).
[25] Dan Ye,et al. A cooperative detection and compensation mechanism against Denial-of-Service attack for cyber-physical systems , 2018, Inf. Sci..
[26] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.
[27] Hak-Keung Lam,et al. Distributed Event-Based Set-Membership Filtering for a Class of Nonlinear Systems With Sensor Saturations Over Sensor Networks , 2017, IEEE Transactions on Cybernetics.
[28] Guang-Hong Yang,et al. Distributed consensus control for multi-agent systems under denial-of-service , 2018, Inf. Sci..
[29] Derong Liu,et al. Discrete-Time Optimal Control via Local Policy Iteration Adaptive Dynamic Programming , 2017, IEEE Transactions on Cybernetics.
[30] Ling Shi,et al. Worst-case stealthy innovation-based linear attack on remote state estimation , 2018, Autom..
[31] Qing-Long Han,et al. An Overview and Deep Investigation on Sampled-Data-Based Event-Triggered Control and Filtering for Networked Systems , 2017, IEEE Transactions on Industrial Informatics.
[32] Quanyan Zhu,et al. Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.
[33] Bruno Sinopoli,et al. Detection in Adversarial Environments , 2014, IEEE Transactions on Automatic Control.
[34] Qing-Long Han,et al. Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[35] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[36] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.