暂无分享,去创建一个
Urbashi Mitra | Erik G. Ström | Arpan Chattopadhyay | Moulik Choraria | U. Mitra | E. Ström | Arpan Chattopadhyay | Moulik Choraria
[1] Paulo Tabuada,et al. Secure State Estimation Against Sensor Attacks in the Presence of Noise , 2015, IEEE Transactions on Control of Network Systems.
[2] Stefan Werner,et al. Coordinated Data-Falsification Attacks in Consensus-based Distributed Kalman Filtering , 2019, 2019 IEEE 8th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).
[3] Reza Olfati-Saber,et al. Kalman-Consensus Filter : Optimality, stability, and performance , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.
[4] Chengnian Long,et al. Dynamic State Recovery for Cyber-Physical Systems Under Switching Location Attacks , 2017, IEEE Transactions on Control of Network Systems.
[5] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[6] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[7] Jian Sun,et al. Optimal Data Injection Attacks in Cyber-Physical Systems , 2018, IEEE Transactions on Cybernetics.
[8] Claire J. Tomlin,et al. Secure State Estimation and Control for Cyber Security of the Nonlinear Power Systems , 2018, IEEE Transactions on Control of Network Systems.
[9] J. Spall. Multivariate stochastic approximation using a simultaneous perturbation gradient approximation , 1992 .
[10] Insup Lee,et al. Attack-Resilient State Estimation for Noisy Dynamical Systems , 2017, IEEE Transactions on Control of Network Systems.
[11] Urbashi Mitra,et al. Attack detection and secure estimation under false data injection attack in cyber-physical systems , 2018, 2018 52nd Annual Conference on Information Sciences and Systems (CISS).
[12] Ling Shi,et al. Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.
[13] Panganamala Ramana Kumar,et al. Dynamic Watermarking: Active Defense of Networked Cyber–Physical Systems , 2016, Proceedings of the IEEE.
[14] Dimitri P. Bertsekas,et al. Dynamic Programming and Optimal Control, Vol. II , 1976 .
[15] Elad Hazan,et al. Introduction to Online Convex Optimization , 2016, Found. Trends Optim..
[16] Soummya Kar,et al. Cyber physical attacks with control objectives and detection constraints , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[17] Yilin Mo,et al. Attack-Resilient H2, H-infinity, and L1 State Estimator , 2018 .
[18] Quanyan Zhu,et al. Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.
[19] Urbashi Mitra,et al. Optimal deception attack on networked vehicular cyber physical systems , 2019, 2019 53rd Asilomar Conference on Signals, Systems, and Computers.
[20] Florian Dörfler,et al. Distributed detection of cyber-physical attacks in power networks: A waveform relaxation approach , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[21] Ling Shi,et al. Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.
[22] Soummya Kar,et al. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems , 2016, IEEE Transactions on Control of Network Systems.
[23] V. Borkar. Stochastic Approximation: A Dynamical Systems Viewpoint , 2008 .
[24] Urbashi Mitra,et al. Security Against False Data-Injection Attack in Cyber-Physical Systems , 2018, IEEE Transactions on Control of Network Systems.
[25] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[26] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[27] Fei Hu,et al. Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.
[28] Xiaohua Ge,et al. Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[29] Vijay Gupta,et al. On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds , 2017, IEEE Transactions on Automatic Control.
[30] Urbashi Mitra,et al. Secure Estimation in V2X Networks with Injection and Packet Drop Attacks , 2018, 2018 15th International Symposium on Wireless Communication Systems (ISWCS).
[31] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[32] Zhao Yang Dong,et al. A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.