Adaptive state estimation for cyber physical systems under sparse attacks
暂无分享,去创建一个
Hao Zhang | Hongtao Sun | Chen Peng | Dajun Du | Hao Zhang | Hongtao Sun | D. Du | Chen Peng
[1] Yonina C. Eldar,et al. Compressed Sensing with Coherent and Redundant Dictionaries , 2010, ArXiv.
[2] Qing-Long Han,et al. On Designing a Novel Self-Triggered Sampling Scheme for Networked Control Systems With Data Losses and Communication Delays , 2016, IEEE Transactions on Industrial Electronics.
[3] Mike E. Davies,et al. Normalized Iterative Hard Thresholding: Guaranteed Stability and Performance , 2010, IEEE Journal of Selected Topics in Signal Processing.
[4] Paulo Tabuada,et al. Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.
[5] Yuanqing Xia,et al. Back-stepping sliding mode control for missile systems based on an extended state observer , 2011 .
[6] Guangming Zhuang,et al. Fuzzy fault-detection filtering for uncertain stochastic time-delay systems with randomly missing data , 2015 .
[7] Min Zhao,et al. Event-triggered output tracking control for wireless networked control systems with communication delays and data dropouts , 2016 .
[8] Ling Shi,et al. Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.
[9] B. Svaiter,et al. A steepest descent method for vector optimization , 2005 .
[10] Olgica Milenkovic,et al. Subspace Pursuit for Compressive Sensing Signal Reconstruction , 2008, IEEE Transactions on Information Theory.
[11] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[12] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[13] Wansheng Tang,et al. Control of uncertain piecewise discrete-time linear systems via state and output feedback , 2012 .
[14] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[15] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[16] Ya-Xiang Yuan,et al. Alternate minimization gradient method , 2003 .
[17] Guang-Ren Duan,et al. Robust pole assignment in matrix descriptor second-order linear systems , 2005 .
[18] E.J. Candes,et al. An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.
[19] Paulo Tabuada,et al. Secure state-estimation for dynamical systems under active adversaries , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[20] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[21] Chen Peng,et al. Delay-Distribution-Dependent Load Frequency Control of Power Systems With Probabilistic Interval Delays , 2016, IEEE Transactions on Power Systems.
[22] Zhu Han,et al. Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.
[23] Jun Yang,et al. Reduced-order disturbance observer design for discrete-time linear stochastic systems , 2016 .