Remote State Estimation over Packet Dropping Links in the Presence of an Eavesdropper
暂无分享,去创建一个
Daniel E. Quevedo | Daniel Dolz | Subhrakanti Dey | Alex S. Leong | S. Dey | D. Quevedo | A. Leong | D. Dolz | Alex S. C. Leong
[1] Daniel E. Quevedo,et al. Sensor Scheduling in Variance Based Event Triggered Estimation With Packet Drops , 2015, IEEE Transactions on Automatic Control.
[2] Vikram Krishnamurthy,et al. Partially Observed Markov Decision Processes: From Filtering to Controlled Sensing , 2016, 1604.08127.
[3] Haim H. Permuter,et al. Directed Information, Causal Estimation, and Communication in Continuous Time , 2009, IEEE Transactions on Information Theory.
[4] Moritz Wiese,et al. Secure estimation for unstable systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[5] Charles R. Johnson,et al. Matrix Analysis, 2nd Ed , 2012 .
[6] Daniel E. Quevedo,et al. Transmission scheduling for remote state estimation and control with an energy harvesting sensor , 2018, Autom..
[7] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[8] B. Anderson,et al. Optimal Filtering , 1979, IEEE Transactions on Systems, Man, and Cybernetics.
[9] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[10] Haim H. Permuter,et al. Directed Information, Causal Estimation, and Communication in Continuous Time , 2013, IEEE Trans. Inf. Theory.
[11] Kenneth E. Barner,et al. Sensor Data Cryptography in Wireless Sensor Networks , 2008, IEEE Transactions on Information Forensics and Security.
[12] Ling Shi,et al. Event-Based Sensor Data Scheduling: Trade-Off Between Communication Rate and Estimation Quality , 2013, IEEE Transactions on Automatic Control.
[13] Subhrakanti Dey,et al. Distortion Outage Minimization in Distributed Estimation With Estimation Secrecy Outage Constraints , 2017, IEEE Transactions on Signal and Information Processing over Networks.
[14] L. Sennott. Stochastic Dynamic Programming and the Control of Queueing Systems , 1998 .
[15] Mark W. Spong,et al. The Pendubot: a mechatronic system for control research and education , 1995, Proceedings of 1995 34th IEEE Conference on Decision and Control.
[16] Mikael Skoglund,et al. The CEO Problem With Secrecy Constraints , 2014, IEEE Transactions on Information Forensics and Security.
[17] R. Murray,et al. Estimation with Information Loss: Asymptotic Analysis and Error Bounds , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.
[18] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[19] Luca Schenato,et al. Optimal Estimation in Networked Control Systems Subject to Random Delay and Packet Drop , 2008, IEEE Transactions on Automatic Control.
[20] Vijay Gupta,et al. Security in stochastic control systems: Fundamental limitations and performance bounds , 2015, 2015 American Control Conference (ACC).
[21] Luigi Lo Iacono. Understanding Cryptography , 2018, CCNA® Security Study Guide.
[22] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[23] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[24] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[25] George J. Pappas,et al. Differential privacy in control and network systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[26] Sebastian Trimpe,et al. Event-based state estimation with variance-based triggering , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[27] Ling Shi,et al. Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.
[28] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[29] Panos J. Antsaklis,et al. Networked state estimation over a shared communication medium , 2013, 2013 American Control Conference.
[30] J. Massey. CAUSALITY, FEEDBACK AND DIRECTED INFORMATION , 1990 .
[31] Swen Kortig,et al. Stochastic Dynamic Programming And The Control Of Queueing Systems , 2016 .
[32] Ling Shi,et al. SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.
[33] Bruno Sinopoli,et al. Secure Estimation in the Presence of Integrity Attacks , 2013, IEEE Transactions on Automatic Control.
[34] Dimitri P. Bertsekas,et al. Dynamic Programming and Optimal Control, Two Volume Set , 1995 .
[35] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[36] Subhrakanti Dey,et al. Estimation in Wireless Sensor Networks With Security Constraints , 2017, IEEE Transactions on Aerospace and Electronic Systems.
[37] K. Loparo,et al. Optimal state estimation for stochastic systems: an information theoretic approach , 1997, IEEE Trans. Autom. Control..
[38] Milan S. Derpich,et al. A Framework for Control System Design Subject to Average Data-Rate Constraints , 2011, IEEE Transactions on Automatic Control.
[39] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[40] M. Lemmon,et al. Event-triggered state estimation in vector linear processes , 2010, Proceedings of the 2010 American Control Conference.
[41] George J. Pappas,et al. State Estimation with Secrecy against Eavesdroppers , 2016, ArXiv.
[42] Shlomo Shamai,et al. Mutual information and minimum mean-square error in Gaussian channels , 2004, IEEE Transactions on Information Theory.
[43] Pramod K. Varshney,et al. Distributed inference in the presence of eavesdroppers: a survey , 2015, IEEE Communications Magazine.
[44] Sebastian Trimpe,et al. Event-Based State Estimation With Variance-Based Triggering , 2012, IEEE Transactions on Automatic Control.
[45] Bruno Sinopoli,et al. Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.
[46] Daniel E. Quevedo,et al. State estimation over Markovian packet dropping links in the presence of an eavesdropper , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[47] J.P. Hespanha,et al. Estimation under uncontrolled and controlled communications in Networked Control Systems , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.
[48] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[49] Daniel E. Quevedo,et al. On Remote State Estimation in the Presence of an Eavesdropper , 2017 .
[50] Henrik Sandberg,et al. SDP-based joint sensor and controller design for information-regularized optimal LQG control , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[51] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[52] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[53] George J. Pappas,et al. Differentially Private Filtering , 2012, IEEE Transactions on Automatic Control.
[54] João M. F. Xavier,et al. Filter Design With Secrecy Constraints: The MIMO Gaussian Wiretap Channel , 2013, IEEE Transactions on Signal Processing.
[55] Lingyang Song,et al. Physical Layer Security in Wireless Communications , 2013 .
[56] Mark W. Spong,et al. Mechanical Design and Control of the Pendubot , 1995 .
[57] Ling Shi,et al. Scheduling Two Gauss–Markov Systems: An Optimal Solution for Remote State Estimation Under Bandwidth Constraint , 2012, IEEE Transactions on Signal Processing.