Optimal Schedule of Secure Transmissions for Remote State Estimation Against Eavesdropping
暂无分享,去创建一个
Heng Zhang | Le Wang | Xianghui Cao | Changyin Sun | Bowen Sun | Changyin Sun | Xianghui Cao | Heng Zhang | Le Wang | Bowen Sun
[1] Jun Zhao. On secure communication in sensor networks under q-composite key predistribution with unreliable links , 2019, ArXiv.
[2] Ling Shi,et al. Optimal Periodic Transmission Power Schedules for Remote Estimation of ARMA Processes , 2013, IEEE Transactions on Signal Processing.
[3] Xiaolin Wang,et al. Learning-based Attack Schedule against Remote State Estimation in Cyber-Physical Systems , 2019, 2019 American Control Conference (ACC).
[4] Xianghui Cao,et al. On Optimal Privacy-Preserving Transmission Schedule for Remote State Estimation in the Presence of an Eavesdropper , 2019, 2019 1st International Conference on Industrial Artificial Intelligence (IAI).
[5] Yu Cheng,et al. Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks , 2016, IEEE Internet of Things Journal.
[6] Renquan Lu,et al. Finite-Horizon $H_{\infty}$ State Estimation for Periodic Neural Networks Over Fading Channels , 2020, IEEE Transactions on Neural Networks and Learning Systems.
[7] Yu Cheng,et al. Joint Scheduling and Channel Allocation for End-to-End Delay Minimization in Industrial WirelessHART Networks , 2019, IEEE Internet of Things Journal.
[8] Paul Honeine,et al. ${l_p}$-norms in One-Class Classification for Intrusion Detection in SCADA Systems , 2014, IEEE Transactions on Industrial Informatics.
[9] Xinping Guan,et al. Antijamming Game Framework for Secure State Estimation in Power Systems , 2019, IEEE Transactions on Industrial Informatics.
[10] Ling Shi,et al. SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.
[11] Avi Ostfeld,et al. Characterizing Cyber-Physical Attacks on Water Distribution Systems , 2017 .
[12] Ling Shi,et al. Deep Reinforcement Learning for Wireless Sensor Scheduling in Cyber-Physical Systems , 2018, Autom..
[13] Vikram Krishnamurthy,et al. Structured Threshold Policies for Dynamic Sensor Scheduling—A Partially Observed Markov Decision Process Approach , 2007, IEEE Transactions on Signal Processing.
[14] Qusay H. Mahmoud,et al. Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..
[15] Cunqing Hua,et al. A Learning-Based Pre-Allocation Scheme for Low-Latency Access in Industrial Wireless Networks , 2020, IEEE Transactions on Wireless Communications.
[16] Sinan Q. Salih,et al. TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System , 2020, IEEE Transactions on Industrial Informatics.
[17] Shuang Wu,et al. Learning Optimal Scheduling Policy for Remote State Estimation Under Uncertain Channel Condition , 2018, IEEE Transactions on Control of Network Systems.
[18] Daniel E. Quevedo,et al. Optimal event-triggered transmission scheduling for privacy-preserving wireless state estimation , 2020 .
[19] Jun Zhao,et al. Probabilistic Key Predistribution in Mobile Networks Resilient to Node-Capture Attacks , 2017, IEEE Transactions on Information Theory.
[20] Ling Shi,et al. Finite Time Encryption Schedule in the Presence of an Eavesdropper with Operation Cost , 2019, 2019 American Control Conference (ACC).
[21] Yu Cheng,et al. Real-Time Misbehavior Detection and Mitigation in Cyber-Physical Systems Over WLANs , 2017, IEEE Transactions on Industrial Informatics.
[22] João Pedro Hespanha,et al. A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.
[23] Daniel E. Quevedo,et al. Remote State Estimation over Packet Dropping Links in the Presence of an Eavesdropper , 2017, ArXiv.
[24] Bruno Sinopoli,et al. Cyber Meets Control: A Novel Federated Approach for Resilient CPS Leveraging Real Cyber Threat Intelligence , 2017, IEEE Communications Magazine.
[25] Cunqing Hua,et al. Intelligent Latency-Aware Virtual Network Embedding for Industrial Wireless Networks , 2019, IEEE Internet of Things Journal.
[26] Xianghui Cao,et al. Event-Driven Joint Mobile Actuators Scheduling and Control in Cyber-Physical Systems , 2019, IEEE Transactions on Industrial Informatics.
[27] Jun Zhao. Analyzing Connectivity of Heterogeneous Secure Sensor Networks , 2018, IEEE Transactions on Control of Network Systems.
[28] Daniel E. Quevedo,et al. On the Use of Artificial Noise for Secure State Estimation in the Presence of Eavesdroppers , 2018, 2018 European Control Conference (ECC).
[29] John A. Stankovic,et al. Security of Distributed, Ubiquitous, and Embedded Computing Platforms , 2009 .
[30] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks , 2018, IEEE Transactions on Automatic Control.
[31] Ling Shi,et al. Optimal Attack Energy Allocation against Remote State Estimation , 2018, IEEE Transactions on Automatic Control.
[32] Daniel E. Quevedo,et al. Transmission scheduling for remote state estimation and control with an energy harvesting sensor , 2018, Autom..
[33] Xinping Guan,et al. On-Demand Transmission for Edge-Assisted Remote Control in Industrial Network Systems , 2020, IEEE Transactions on Industrial Informatics.
[34] Leandros A. Maglaras,et al. A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems , 2016, IEEE Transactions on Industrial Informatics.
[35] Xianghui Cao,et al. Optimal Transmit Power Allocation for an Energy-Harvesting Sensor in Wireless Cyber-Physical Systems , 2019, IEEE Transactions on Cybernetics.
[36] Wei Xing Zheng,et al. Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel , 2018, IEEE Transactions on Automatic Control.
[37] Canbing Li,et al. Dynamic Data Injection Attack Detection of Cyber Physical Power Systems With Uncertainties , 2019, IEEE Transactions on Industrial Informatics.