False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach
暂无分享,去创建一个
[1] Rongxing Lu,et al. Defending Against False Data Injection Attacks on Power System State Estimation , 2017, IEEE Transactions on Industrial Informatics.
[2] Andrea Conti,et al. Wireless Sensor and Actuator Networks: Technologies, Analysis and Design , 2008 .
[3] Derong Liu,et al. Discrete-Time Optimal Control via Local Policy Iteration Adaptive Dynamic Programming , 2017, IEEE Transactions on Cybernetics.
[4] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[5] Vijay Gupta,et al. On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds , 2017, IEEE Transactions on Automatic Control.
[6] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks , 2018, IEEE Transactions on Automatic Control.
[7] Fengjun Li,et al. Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.
[8] Bruno Sinopoli,et al. Sensor selection strategies for state estimation in energy constrained wireless sensor networks , 2011, Autom..
[9] Beibei Li,et al. DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System , 2016, IEEE Transactions on Information Forensics and Security.
[10] Hyungbo Shim,et al. Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack , 2019, IEEE Transactions on Automatic Control.
[11] Guang-Hong Yang,et al. Input-to-State Stabilizing Control for Cyber-Physical Systems With Multiple Transmission Channels Under Denial of Service , 2018, IEEE Transactions on Automatic Control.
[12] Guang-Hong Yang,et al. Data-Driven Coordinated Attack Policy Design Based on Adaptive $\mathcal {L}_2$-Gain Optimal Theory , 2018, IEEE Transactions on Automatic Control.
[13] Pietro Tesi,et al. Resilient control under Denial-of-Service: Robust design , 2016, 2016 American Control Conference (ACC).
[14] Tongwen Chen,et al. False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis , 2018, IEEE Transactions on Automatic Control.
[15] Zhao Yang Dong,et al. A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.
[16] Yuanqing Xia,et al. Optimal Stealthy Deception Attack Against Cyber-Physical Systems , 2020, IEEE Transactions on Cybernetics.
[17] Qing-Long Han,et al. State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..
[18] S. Shankar Sastry,et al. Security of interdependent and identical networked control systems , 2013, Autom..
[19] Vijay Gupta,et al. Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..
[20] Athanasios V. Vasilakos,et al. False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.
[21] Dan Ye,et al. Stochastic coding detection scheme in cyber-physical systems against replay attack , 2019, Inf. Sci..
[22] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[23] Ling Shi,et al. Worst-case stealthy innovation-based linear attack on remote state estimation , 2018, Autom..
[24] Zhao Yang Dong,et al. The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.
[25] Ling Shi,et al. The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems , 2017, IEEE Transactions on Automatic Control.
[26] Guang-Hong Yang,et al. Optimal Stealthy Innovation-Based Attacks With Historical Data in Cyber-Physical Systems , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[27] Ruilong Deng,et al. On Feasibility and Limitations of Detecting False Data Injection Attacks on Power Grid State Estimation Using D-FACTS Devices , 2020, IEEE Transactions on Industrial Informatics.
[28] Dan Ye,et al. Distributed Secure Control Against Denial-of-Service Attacks in Cyber-Physical Systems Based on K-Connected Communication Topology , 2020, IEEE Transactions on Cybernetics.
[29] Guang-Hong Yang,et al. Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism , 2018, IEEE Transactions on Automatic Control.
[30] Xiaoqiang Ren,et al. Attack Allocation on Remote State Estimation in Multi-Systems: Structural Results and Asymptotic Solution , 2016, Autom..
[31] Guang-Hong Yang,et al. Data-Driven Methods for Stealthy Attacks on TCP/IP-Based Networked Control Systems Equipped With Attack Detectors , 2019, IEEE Transactions on Cybernetics.
[32] Chao Yang,et al. Distributed filtering under false data injection attacks , 2019, Autom..
[33] Donghua Zhou,et al. Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems , 2016, IEEE Transactions on Industrial Electronics.
[34] Ling Shi,et al. Accurate clock synchronization in wireless sensor networks with bounded noise , 2017, Autom..
[35] Wei Xing Zheng,et al. Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel , 2018, IEEE Transactions on Automatic Control.
[36] Dan Ye,et al. Summation Detector for False Data-Injection Attack in Cyber-Physical Systems , 2020, IEEE Transactions on Cybernetics.
[37] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.