Secure State Estimation and Control of Cyber-Physical Systems: A Survey
暂无分享,去创建一个
Derui Ding | Qing-Long Han | Xiaohua Ge | Jun Wang | Derui Ding | Q. Han | Xiaohua Ge | Jun Wang
[1] Qing-Long Han,et al. Secure Distributed Finite-Time Filtering for Positive Systems Over Sensor Networks Under Deception Attacks , 2020, IEEE Transactions on Cybernetics.
[2] Pietro Tesi,et al. Resilient control under Denial-of-Service: Robust design , 2016, 2016 American Control Conference (ACC).
[3] Ali Davoudi,et al. Resilient and Robust Synchronization of Multiagent Systems Under Attacks on Sensors and Actuators , 2020, IEEE Transactions on Cybernetics.
[4] Insup Lee,et al. Attack-Resilient State Estimation for Noisy Dynamical Systems , 2017, IEEE Transactions on Control of Network Systems.
[5] Qing-Long Han,et al. Almost Sure Stability of Nonlinear Systems Under Random and Impulsive Sequential Attacks , 2020, IEEE Transactions on Automatic Control.
[6] Ligang Wu,et al. Stochastic Stability Analysis and Control of Secondary Frequency Regulation for Islanded Microgrids Under Random Denial of Service Attacks , 2019, IEEE Transactions on Industrial Informatics.
[7] Derui Ding,et al. Distributed Maximum Correntropy Filtering for Stochastic Nonlinear Systems Under Deception Attacks , 2020, IEEE Transactions on Cybernetics.
[8] Shreyas Sundaram,et al. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.
[9] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.
[10] Zhen Xiao,et al. Adversarial Attacks and Defenses on Cyber–Physical Systems: A Survey , 2020, IEEE Internet of Things Journal.
[11] Xiaowu Mu,et al. Observer‐based consensus control of nonlinear multiagent systems under semi‐Markovian switching topologies and cyber attacks , 2020 .
[12] Yuanqing Xia,et al. Resilient State Estimation of Cyber-Physical System With Multichannel Transmission Under DoS Attack , 2021, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[13] Bruno Sinopoli,et al. Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.
[14] Marilyn Wolf,et al. Safety and Security in Cyber-Physical Systems and Internet-of-Things Systems , 2018, Proceedings of the IEEE.
[15] Ling Shi,et al. Sparse Linear Injection Attack on Multi-Agent Consensus Control Systems , 2021, IEEE Control Systems Letters.
[16] Dong Yue,et al. Distributed Resilient Finite-Time Secondary Control for Heterogeneous Battery Energy Storage Systems Under Denial-of-Service Attacks , 2020, IEEE Transactions on Industrial Informatics.
[17] Insup Lee,et al. Design and Implementation of Attack-Resilient Cyberphysical Systems: With a Focus on Attack-Resilient State Estimators , 2017, IEEE Control Systems.
[18] Xiao-Jian Li,et al. Data-Driven Output-Feedback LQ Secure Control for Unknown Cyber-Physical Systems Against Sparse Actuator Attacks , 2021, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[19] Frank L. Lewis,et al. Resilient Networked AC Microgrids Under Unbounded Cyber Attacks , 2020, IEEE Transactions on Smart Grid.
[20] An-Yang Lu,et al. Observer-Based Control for Cyber-Physical Systems Under Denial-of-Service With a Decentralized Event-Triggered Scheme , 2020, IEEE Transactions on Cybernetics.
[21] Mohammad Sayad Haghighi,et al. Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.
[22] Qing-Long Han,et al. Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks , 2020, IEEE/CAA Journal of Automatica Sinica.
[23] Qing-Long Han,et al. A Set-Membership Approach to Event-Triggered Filtering for General Nonlinear Systems Over Sensor Networks , 2020, IEEE Transactions on Automatic Control.
[24] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[25] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[26] Luca Zaccarian,et al. Stubborn state observers for linear time-invariant systems , 2018, Autom..
[27] Derui Ding,et al. Event-based resilient filtering for stochastic nonlinear systems via innovation constraints , 2021, Inf. Sci..
[28] Peter Willett,et al. Feature article: security of SCADA systems against cyber–physical attacks , 2017, IEEE Aerospace and Electronic Systems Magazine.
[29] Xiangpeng Xie,et al. Resilient Event-Triggered Controller Synthesis of Networked Control Systems Under Periodic DoS Jamming Attacks , 2019, IEEE Transactions on Cybernetics.
[30] Pietro Tesi,et al. Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.
[31] Derui Ding,et al. Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks , 2017, Autom..
[32] Hongli Dong,et al. Robust Partial-Nodes-Based State Estimation for Complex Networks Under Deception Attacks , 2020, IEEE Transactions on Cybernetics.
[33] Karl Henrik Johansson,et al. Secure Control Systems: A Quantitative Risk Management Approach , 2015, IEEE Control Systems.
[34] Guang-Hong Yang,et al. Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism , 2018, IEEE Transactions on Automatic Control.
[35] Luca Zaccarian,et al. Synchronization in Networks of Identical Nonlinear Systems via Dynamic Dead Zones , 2019, IEEE Control Systems Letters.
[36] Paulo Tabuada,et al. Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach , 2014, IEEE Transactions on Automatic Control.
[37] Pietro Tesi,et al. Resilient Control under Denial-of-Service , 2013, ArXiv.
[38] Yuanqing Xia,et al. Stability analysis on networked control systems under double attacks with predictive control , 2019, International Journal of Robust and Nonlinear Control.
[39] Steffi Knorn,et al. Effects of Jamming Attacks on a Control System With Energy Harvesting , 2019, IEEE Control Systems Letters.
[40] Chengcui Zhang,et al. Stochastic Game in Linear Quadratic Gaussian Control for Wireless Networked Control Systems Under DoS Attacks , 2022, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[41] Ruochi Zhang,et al. False Data Injection and Detection in LQG Systems: A Game Theoretic Approach , 2020, IEEE Transactions on Control of Network Systems.
[42] Wei Xing Zheng,et al. Resilient Consensus of Discrete-Time Complex Cyber-Physical Networks Under Deception Attacks , 2020, IEEE Transactions on Industrial Informatics.
[43] Minrui Fei,et al. Resilient Event-Triggering $H_{\infty }$ Load Frequency Control for Multi-Area Power Systems With Energy-Limited DoS Attacks , 2017, IEEE Transactions on Power Systems.
[44] Guang-Hong Yang,et al. LQ Secure Control for Cyber-Physical Systems Against Sparse Sensor and Actuator Attacks , 2019, IEEE Transactions on Control of Network Systems.
[45] Wei Xing Zheng,et al. Observer-Based Control for Cyber-Physical Systems With Periodic DoS Attacks via a Cyclic Switching Strategy , 2020, IEEE Transactions on Automatic Control.
[46] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[47] Yilin Mo,et al. Attack-Resilient H_2, H_∞, and ℓ_1 State Estimator , 2018, 1803.07053.
[48] Daniel W. C. Ho,et al. Observer-Based PID Security Control for Discrete Time-Delay Systems Under Cyber-Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[49] Zhao Yang Dong,et al. A Survey on the Detection Algorithms for False Data Injection Attacks in Smart Grids , 2020, IEEE Transactions on Smart Grid.
[50] Tao Jiang,et al. Blind False Data Attacks Against AC State Estimation Based on Geometric Approach in Smart Grid Communications , 2018, IEEE Transactions on Smart Grid.
[51] Walter Lucia,et al. Resilient Control for Cyber-Physical Systems Subject to Replay Attacks , 2019, IEEE Control Systems Letters.
[52] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[53] Soummya Kar,et al. Resilient Distributed Estimation: Sensor Attacks , 2017, IEEE Transactions on Automatic Control.
[54] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[55] Qing-Long Han,et al. Distributed Event-Triggered Estimation Over Sensor Networks: A Survey , 2020, IEEE Transactions on Cybernetics.
[56] Qing-Long Han,et al. Variance-Constrained Distributed Filtering for Time-Varying Systems With Multiplicative Noises and Deception Attacks Over Sensor Networks , 2017, IEEE Sensors Journal.
[57] Qing-Long Han,et al. Distributed Secondary Control for Active Power Sharing and Frequency Regulation in Islanded Microgrids Using an Event-Triggered Communication Mechanism , 2019, IEEE Transactions on Industrial Informatics.
[58] Qing-Long Han,et al. Distributed Resilient Estimator Design for Positive Systems Under Topological Attacks , 2020, IEEE Transactions on Cybernetics.
[59] Qing-Long Han,et al. A Dynamic Event-Triggered Transmission Scheme for Distributed Set-Membership Estimation Over Wireless Sensor Networks , 2019, IEEE Transactions on Cybernetics.
[60] Guoqiang Hu,et al. Distributed Secure Cooperative Control Under Denial-of-Service Attacks From Multiple Adversaries , 2020, IEEE Transactions on Cybernetics.
[61] Eman Mousavinejad,et al. Distributed Cyber Attacks Detection and Recovery Mechanism for Vehicle Platooning , 2020, IEEE Transactions on Intelligent Transportation Systems.
[62] Hyungbo Shim,et al. Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack , 2019, IEEE Transactions on Automatic Control.
[63] Qing-Long Han,et al. Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[64] Van Long Do,et al. Sequential Detection and Isolation of Cyber-physical Attacks on SCADA Systems. (Détection et localisation séquentielle d'attaques cyber-physiques aux systèmes SCADA) , 2015 .
[65] Huosheng Hu,et al. Stability analysis of token-based wireless networked control systems under deception attacks , 2018, Inf. Sci..
[66] Qing-Long Han,et al. Resilient Control Design Based on a Sampled-Data Model for a Class of Networked Control Systems Under Denial-of-Service Attacks , 2019, IEEE Transactions on Cybernetics.
[67] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[68] Derui Ding,et al. Recursive Filtering of Distributed Cyber-Physical Systems With Attack Detection , 2021, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[69] Guang-Hong Yang,et al. Secure estimation for cyber‐physical systems with adversarial attacks and unknown inputs: An L2‐gain method , 2018 .
[70] M. Pirani,et al. A systems and control perspective of CPS security , 2019, Annu. Rev. Control..
[71] Aron Laszka,et al. Improving Network Connectivity and Robustness Using Trusted Nodes With Application to Resilient Consensus , 2018, IEEE Transactions on Control of Network Systems.
[72] Paulo S. P. Pessim,et al. State-Feedback Control for Cyber-Physical LPV Systems Under DoS Attacks , 2021, IEEE Control Systems Letters.
[73] Paulo Tabuada,et al. Securing state reconstruction under sensor and actuator attacks: Theory and design , 2020, Autom..
[74] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.
[75] Yuanqing Xia,et al. Distributed Secure Filtering for Discrete-Time Systems Under Round-Robin Protocol and Deception Attacks , 2020, IEEE Transactions on Cybernetics.
[76] Lei Zou,et al. Recursive Filtering for Time-Varying Systems With Random Access Protocol , 2019, IEEE Transactions on Automatic Control.
[77] Frank L. Lewis,et al. Distributed Resilient Secondary Control of DC Microgrids Against Unbounded Attacks , 2020, IEEE Transactions on Smart Grid.
[78] Daniel W. C. Ho,et al. Observer-Based Event-Triggering Consensus Control for Multiagent Systems With Lossy Sensors and Cyber-Attacks , 2017, IEEE Transactions on Cybernetics.
[79] Lei Guo,et al. Resilient Control of Wireless Networked Control System Under Denial-of-Service Attacks: A Cross-Layer Design Approach , 2020, IEEE Transactions on Cybernetics.
[80] Guang-Hong Yang,et al. Secure Switched Observers for Cyber-Physical Systems Under Sparse Sensor Attacks: A Set Cover Approach , 2019, IEEE Transactions on Automatic Control.
[81] Hamidreza Modares,et al. Resilient Autonomous Control of Distributed Multiagent Systems in Contested Environments , 2017, IEEE Transactions on Cybernetics.
[82] Guanghui Sun,et al. State estimation and self-triggered control of CPSs against joint sensor and actuator attacks , 2020, Autom..
[83] Aditya Ashok,et al. Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid , 2017, Proceedings of the IEEE.
[84] Charalambos Konstantinou,et al. Enhanced Resilient State Estimation Using Data-Driven Auxiliary Models , 2020, IEEE Transactions on Industrial Informatics.
[85] Lei Guo,et al. Resilient Control of Networked Control System Under DoS Attacks: A Unified Game Approach , 2016, IEEE Transactions on Industrial Informatics.
[86] Jianhui Wang,et al. Resilience Analysis of DC Microgrids Under Denial of Service Threats , 2019, IEEE Transactions on Power Systems.
[87] Guoqiang Hu,et al. Secure Cooperative Event-Triggered Control of Linear Multiagent Systems Under DoS Attacks , 2020, IEEE Transactions on Control Systems Technology.
[88] Hongtao Sun,et al. A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[89] Qing-Long Han,et al. Neural-Network-Based Output-Feedback Control Under Round-Robin Scheduling Protocols , 2019, IEEE Transactions on Cybernetics.
[90] Chao Yang,et al. Distributed filtering under false data injection attacks , 2019, Autom..
[91] Jie Cao,et al. Event-Triggered $H_\infty$ Load Frequency Control for Multiarea Power Systems Under Hybrid Cyber Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[92] Paulo Tabuada,et al. Secure State Estimation Against Sensor Attacks in the Presence of Noise , 2015, IEEE Transactions on Control of Network Systems.
[93] Guang-Hong Yang,et al. Switched projected gradient descent algorithms for secure state estimation under sparse sensor attacks , 2019, Autom..
[94] Chengnian Long,et al. Dynamic State Recovery for Cyber-Physical Systems Under Switching Location Attacks , 2017, IEEE Transactions on Control of Network Systems.
[95] Zidong Wang,et al. State-Saturated Recursive Filter Design for Stochastic Time-Varying Nonlinear Complex Networks Under Deception Attacks , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[96] Qing-Long Han,et al. Distributed Krein space-based attack detection over sensor networks under deception attacks , 2019, Autom..
[97] Quanyan Zhu,et al. A hybrid stochastic game for secure control of cyber-physical systems , 2018, Autom..
[98] Wei Chen,et al. Distributed Resilient Filtering for Power Systems Subject to Denial-of-Service Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[99] Qing-Long Han,et al. State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..
[100] Qing-Long Han,et al. Networked control systems: a survey of trends and techniques , 2020, IEEE/CAA Journal of Automatica Sinica.
[101] Lei Zou,et al. Moving Horizon Estimation for Networked Time-Delay Systems Under Round-Robin Protocol , 2019, IEEE Transactions on Automatic Control.
[102] Yilin Mo,et al. On the Performance Analysis of Reset Attack in Cyber-Physical Systems , 2020, IEEE Transactions on Automatic Control.
[103] Fuwen Yang,et al. Resilient and secure remote monitoring for a class of cyber-physical systems against attacks , 2020, Inf. Sci..
[104] Qing-Long Han,et al. Dynamic Event-Triggered Distributed Coordination Control and its Applications: A Survey of Trends and Techniques , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.