A novel adaptive cooperative attack design against cyber-physical systems via mixed H∞/H- index
暂无分享,去创建一个
[1] Guang-Hong Yang,et al. Input-to-State Stabilizing Control for Cyber-Physical Systems With Multiple Transmission Channels Under Denial of Service , 2018, IEEE Transactions on Automatic Control.
[2] Guang-Hong Yang,et al. Adaptive sliding mode fault tolerant control for nonlinearly chaotic systems against DoS attack and network faults , 2017, J. Frankl. Inst..
[3] Qing-Long Han,et al. State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..
[4] Jian Liu,et al. An LMI approach to H_ index and mixed H_/Hinfinit fault detection observer design , 2007, Autom..
[5] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.
[6] Xiaoqiang Ren,et al. Attack Allocation on Remote State Estimation in Multi-Systems: Structural Results and Asymptotic Solution , 2016, Autom..
[7] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[8] Jie Cao,et al. H∞ filtering for networked systems with hybrid-triggered communication mechanism and stochastic cyber attacks , 2017, J. Frankl. Inst..
[9] Ling Shi,et al. SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.
[10] Guang-Hong Yang,et al. Fault Detection for T–S Fuzzy Systems With Unknown Membership Functions , 2014, IEEE Transactions on Fuzzy Systems.
[11] Qing-Long Han,et al. An Overview of Recent Advances in Fixed-Time Cooperative Control of Multiagent Systems , 2018, IEEE Transactions on Industrial Informatics.
[12] Frank L. Lewis,et al. Reinforcement Learning for Partially Observable Dynamic Processes: Adaptive Dynamic Programming Using Measured Output Data , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[13] Qing-Long Han,et al. Network-based H∞H∞ filtering using a logic jumping-like trigger , 2013, Autom..
[14] Qing-Long Han,et al. A Threshold-Parameter-Dependent Approach to Designing Distributed Event-Triggered $H_{\infty}$ Consensus Filters Over Sensor Networks , 2019, IEEE Transactions on Cybernetics.
[15] Guang-Hong Yang,et al. Decentralized Adaptive Fuzzy Secure Control for Nonlinear Uncertain Interconnected Systems Against Intermittent DoS Attacks , 2019, IEEE Transactions on Cybernetics.
[16] Dan Ye,et al. A cooperative detection and compensation mechanism against Denial-of-Service attack for cyber-physical systems , 2018, Inf. Sci..
[17] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[18] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[19] Qing-Long Han,et al. Distributed event-triggered H1 filtering over sensor networks with communication delays , 2014 .
[20] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.
[21] Ling Shi,et al. Worst-case stealthy innovation-based linear attack on remote state estimation , 2018, Autom..
[22] Vijay Gupta,et al. Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..
[23] Pietro Tesi,et al. Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.
[24] Guang-Hong Yang,et al. Data-Driven Coordinated Attack Policy Design Based on Adaptive $\mathcal {L}_2$-Gain Optimal Theory , 2018, IEEE Transactions on Automatic Control.
[25] Ling Shi,et al. A multi-channel transmission schedule for remote state estimation under DoS attacks , 2017, Autom..
[26] Quanyan Zhu,et al. Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.
[27] Zhihua Qu,et al. Competitive Interaction Design of Cooperative Systems Against Attacks , 2018, IEEE Transactions on Automatic Control.
[28] Qing-Long Han,et al. Consensus of Multiagent Systems Subject to Partially Accessible and Overlapping Markovian Network Topologies , 2017, IEEE Transactions on Cybernetics.
[29] Peter Xiaoping Liu,et al. A stochastic game approach to the security issue of networked control systems under jamming attacks , 2014, J. Frankl. Inst..
[30] Heng Wang,et al. Fault detection observer design for linear discrete-time systems in finite frequency domain , 2007, 2007 46th IEEE Conference on Decision and Control.
[31] Fuad E. Alsaadi,et al. Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks , 2018, J. Frankl. Inst..
[32] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.