Online Deception Attack against Remote State Estimation
暂无分享,去创建一个
[1] Ling Shi,et al. Time and Event-based Sensor Scheduling for Networks with Limited Communication Resources , 2011 .
[2] Ling Shi,et al. How Can Online Schedules Improve Communication and Estimation Tradeoff? , 2013, IEEE Transactions on Signal Processing.
[3] Paulo Tabuada,et al. Minimax control for cyber-physical systems under network packet scheduling attacks , 2013, HiCoNS '13.
[4] Clay Wilson. Cybersecurity and Cyber Weapons: Is Nonproliferation Possible? , 2013 .
[5] Liuqing Yang,et al. Intelligent transportation spaces: vehicles, traffic, communications, and beyond , 2010, IEEE Communications Magazine.
[6] Ling Shi,et al. Sensor data scheduling for optimal state estimation with communication energy constraint , 2011, Autom..
[7] Thomas Novak,et al. Safety- and Security-Critical Services in Building Automation and Control Systems , 2010, IEEE Transactions on Industrial Electronics.
[8] Ling Shi,et al. Optimal DoS attack policy against remote state estimation , 2013, 52nd IEEE Conference on Decision and Control.
[9] B. Anderson,et al. Detectability and Stabilizability of Time-Varying Discrete-Time Linear Systems , 1981 .
[10] Kameshwar Poolla,et al. Systems and Control Opportunities in the Integration of Renewable Energy into the Smart Grid , 2011 .
[11] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[12] Ling Shi,et al. Optimal Denial-of-Service attack scheduling against linear quadratic Gaussian control , 2014, 2014 American Control Conference.
[13] C. Lanczos,et al. A Precision Approximation of the Gamma Function , 1964 .
[14] Anand D. Sarwate,et al. Signal Processing and Machine Learning with Differential Privacy: Algorithms and Challenges for Continuous Data , 2013, IEEE Signal Processing Magazine.
[15] Mikhail J. Atallah,et al. A Survey of Anti-Tamper Technologies , 2004 .
[16] Ling Shi,et al. Event-Based Sensor Data Scheduling: Trade-Off Between Communication Rate and Estimation Quality , 2013, IEEE Transactions on Automatic Control.
[17] T. Kavitha,et al. Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .
[18] Sencun Zhu,et al. Sensor node compromise detection: the location perspective , 2007, IWCMC.