Secure distributed estimation against false data injection attack
暂无分享,去创建一个
Lidan Wang | Shuwei Deng | Yi Hua | Shukai Duan | Feng Chen | Feng Chen | Shukai Duan | Lidan Wang | Shuwei Deng | Yi Hua
[1] Fei Hu,et al. Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.
[2] Shukai Duan,et al. Diffusion Sparse Sign Algorithm with Variable Step-Size , 2019, Circuits Syst. Signal Process..
[3] Xiangjian He,et al. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2014, IEEE Transactions on Parallel and Distributed Systems.
[4] Guojiang Shen,et al. Communication-reducing diffusion LMS algorithm over multitask networks , 2017, Inf. Sci..
[5] H.C. Papadopoulos,et al. Locally constructed algorithms for distributed computations in ad-hoc networks , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[6] Chunguang Li,et al. Distributed Information Theoretic Clustering , 2014, IEEE Transactions on Signal Processing.
[7] Yu Zhu,et al. Stochastic gradient identification of Wiener system with maximum mutual information criterion , 2011 .
[8] Pramod K. Varshney,et al. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2011, IEEE Trans. Signal Process..
[9] Pramod K. Varshney,et al. Adaptive learning of Byzantines' behavior in cooperative spectrum sensing , 2011, 2011 IEEE Wireless Communications and Networking Conference.
[10] Peng Shi,et al. Finite-Time Distributed State Estimation Over Sensor Networks With Round-Robin Protocol and Fading Channels , 2018, IEEE Transactions on Cybernetics.
[11] Isao Yamada,et al. Diffusion Least-Mean Squares With Adaptive Combiners: Formulation and Performance Analysis , 2010, IEEE Transactions on Signal Processing.
[12] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[13] Chunguang Li,et al. Distributed Sparse Recursive Least-Squares Over Networks , 2014, IEEE Transactions on Signal Processing.
[14] Anupam Joshi,et al. AI based approach to identify compromised meters in data integrity attacks on smart grid , 2017 .
[15] Shuai Li,et al. An Adaptive Deviation-tolerant Secure Scheme for distributed cooperative spectrum sensing , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[16] Nanning Zheng,et al. Steady-State Mean-Square Error Analysis for Adaptive Filtering under the Maximum Correntropy Criterion , 2014, IEEE Signal Processing Letters.
[17] Shukai Duan,et al. Distributed Data-Selective DLMS Estimation Under Channel Attacks , 2019, IEEE Access.
[18] Shukai Duan,et al. Diffusion Logarithm-Correntropy Algorithm for Parameter Estimation in Non-Stationary Environments over Sensor Networks , 2018, Sensors.
[19] Soummya Kar,et al. Resilient Distributed Estimation Through Adversary Detection , 2017, IEEE Transactions on Signal Processing.
[20] Shukai Duan,et al. Diffusion least logarithmic absolute difference algorithm for distributed estimation , 2018, Signal Process..
[21] Nanning Zheng,et al. Generalized Correntropy for Robust Adaptive Filtering , 2015, IEEE Transactions on Signal Processing.
[22] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[23] Pramod K. Varshney,et al. On the performance analysis of data fusion schemes with Byzantines , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[24] N. Metropolis,et al. Equation of State Calculations by Fast Computing Machines , 1953, Resonance.
[25] A. Monticelli. State estimation in electric power systems : a generalized approach , 1999 .
[26] Ali H. Sayed,et al. Diffusion LMS Strategies for Distributed Estimation , 2010, IEEE Transactions on Signal Processing.
[27] Pramod K. Varshney,et al. Data Falsification Attacks on Consensus-Based Detection Systems , 2017, IEEE Transactions on Signal and Information Processing over Networks.
[28] Ali H. Sayed,et al. Diffusion Least-Mean Squares Over Adaptive Networks: Formulation and Performance Analysis , 2008, IEEE Transactions on Signal Processing.
[29] R. Moddemeijer. On estimation of entropy and mutual information of continuous distributions , 1989 .
[30] Lang Tong,et al. Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.
[31] Xiaohua Ge,et al. Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[32] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.
[33] Ying Liu,et al. Secure Distributed Estimation Over Wireless Sensor Networks Under Attacks , 2018, IEEE Transactions on Aerospace and Electronic Systems.
[34] Cédric Richard,et al. Diffusion LMS for Multitask Problems With Local Linear Equality Constraints , 2016, IEEE Transactions on Signal Processing.
[35] Chong-Ho Choi,et al. Input Feature Selection by Mutual Information Based on Parzen Window , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[36] Shukai Duan,et al. Diffusion generalized maximum correntropy criterion algorithm for distributed estimation over multitask network , 2018, Digit. Signal Process..
[37] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[38] Stephen P. Boyd,et al. Fast linear iterations for distributed averaging , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[39] Zhaoyang Zhang,et al. Diffusion Sparse Least-Mean Squares Over Networks , 2012, IEEE Transactions on Signal Processing.
[40] Jie Chen,et al. Multitask Diffusion Adaptation Over Networks , 2013, IEEE Transactions on Signal Processing.
[41] Ali H. Sayed,et al. Diffusion recursive least-squares for distributed estimation over adaptive networks , 2008, IEEE Transactions on Signal Processing.
[42] F. Richard Yu,et al. Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.
[43] Wen-An Zhang,et al. Distributed $H_\infty$ Estimation in Sensor Networks With Two-Channel Stochastic Attacks , 2020, IEEE Transactions on Cybernetics.