Optimizing Attack Schedules Based on Energy Dispatch Over Two-Hop Relay Networks
暂无分享,去创建一个
Wei Xing Zheng | Yue Xiao | Jinliang Shao | Ruimeng Gan | Heng Zhang | W. Zheng | Jinliang Shao | Yue Xiao | Ruimeng Gan | Heng Zhang
[1] Jiming Chen,et al. Energy-Efficient Data Forwarding for State Estimation in Multi-Hop Wireless Sensor Networks , 2016, IEEE Transactions on Automatic Control.
[2] Xiuzhen Cheng,et al. Jamming Strategies for Physical Layer Security , 2018, IEEE Wireless Communications.
[3] Bimal K. Roy,et al. Two channel hopping schemes for jamming resistant wireless communication , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[4] Ling Shi,et al. A multi-channel transmission schedule for remote state estimation under DoS attacks , 2017, Autom..
[5] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks , 2018, IEEE Transactions on Automatic Control.
[6] Ling Shi,et al. Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.
[7] Michael Gastpar,et al. Cooperative strategies and capacity theorems for relay networks , 2005, IEEE Transactions on Information Theory.
[8] Ling Shi,et al. Optimal Attack Energy Allocation against Remote State Estimation , 2018, IEEE Transactions on Automatic Control.
[9] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[10] Daniel E. Quevedo,et al. Co-design of jump estimators and transmission policies for wireless multi-hop networks with fading channels , 2017, Autom..
[11] Mohamed-Slim Alouini,et al. Average SNR of dual selection combining over correlated Nakagami-m fading channels , 2000, IEEE Communications Letters.
[12] Ling Shi,et al. Data-Driven Power Control for State Estimation: A Bayesian Inference Approach , 2015, Autom..
[13] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.
[14] Syed Mahfuzul Aziz,et al. Review of Cyber-Physical System in Healthcare , 2014, Int. J. Distributed Sens. Networks.
[15] Lingkun Fu,et al. DoS Attack Energy Management Against Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.
[16] Ming Li,et al. Disrupting MIMO Communications With Optimal Jamming Signal Design , 2015, IEEE Transactions on Wireless Communications.
[17] Changyin Sun,et al. Energy efficient jamming attack schedule against remote state estimation in wireless cyber-physical systems , 2018, Neurocomputing.
[18] Panganamala Ramana Kumar,et al. The transport capacity of wireless networks over fading channels , 2004, IEEE Transactions on Information Theory.
[19] Daniel E. Quevedo,et al. On the use of a relay for Kalman filtering over packet dropping links , 2013, 2013 American Control Conference.
[20] Wei Xing Zheng,et al. Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel , 2018, IEEE Transactions on Automatic Control.
[21] Xin Liu,et al. Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.
[22] Daniel E. Quevedo,et al. Power Control and Coding Formulation for State Estimation With Wireless Sensors , 2013, IEEE Transactions on Control Systems Technology.
[23] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[24] Jiming Chen,et al. Building-Environment Control With Wireless Sensor and Actuator Networks: Centralized Versus Distributed , 2010, IEEE Transactions on Industrial Electronics.
[25] Dongweon Yoon,et al. On the general BER expression of one- and two-dimensional amplitude modulations , 2002, IEEE Trans. Commun..
[26] Ling Shi,et al. Scheduling Two Gauss–Markov Systems: An Optimal Solution for Remote State Estimation Under Bandwidth Constraint , 2012, IEEE Transactions on Signal Processing.
[27] Ling Shi,et al. A Game-Theoretic Approach to Fake-Acknowledgment Attack on Cyber-Physical Systems , 2017, IEEE Transactions on Signal and Information Processing over Networks.
[28] Huaiyu Dai,et al. A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions , 2017, IEEE Communications Surveys & Tutorials.
[29] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[30] Guoxiang Gu,et al. Generalized LQR control and Kalman filtering with relations to computations of inner-outer and spectral factorizations , 2006, IEEE Transactions on Automatic Control.
[31] Ling Shi,et al. On optimal partial broadcasting of wireless sensor networks for Kalman filtering , 2011, Proceedings of the 2011 American Control Conference.
[32] Ling Shi,et al. Optimal DoS Attacks on Remote State Estimation with a Router , 2018, 2018 IEEE Conference on Decision and Control (CDC).
[33] Xiaoqiang Ren,et al. Attack Allocation on Remote State Estimation in Multi-Systems: Structural Results and Asymptotic Solution , 2016, Autom..
[34] Kwang-Cheng Chen,et al. Information Fusion to Defend Intentional Attack in Internet of Things , 2014, IEEE Internet of Things Journal.
[35] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[36] Gerhard Fettweis,et al. Relay-based deployment concepts for wireless and mobile broadband radio , 2004, IEEE Communications Magazine.
[37] Jinliang Shao,et al. An Analysis on Optimal Attack Schedule Based on Channel Hopping Scheme in Cyber-Physical Systems , 2019, IEEE Transactions on Cybernetics.
[38] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[39] Martin L. Puterman,et al. Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994 .
[40] Tansel Yucelen,et al. An Adaptive Control Architecture for Mitigating Sensor and Actuator Attacks in Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.
[41] Guang-Hong Yang,et al. Input-to-State Stabilizing Control for Cyber-Physical Systems With Multiple Transmission Channels Under Denial of Service , 2018, IEEE Transactions on Automatic Control.
[42] Mahmoud Ahmadian-Attari,et al. Worst-Case Jamming Attack and Optimum Defense Strategy in Cooperative Relay Networks , 2019, IEEE Control Systems Letters.