Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks
暂无分享,去创建一个
Xinyan Deng | Xiangyu Zhang | Dongyan Xu | Fan Fei | Zhan Tu | Taegyu Kim | Ruikun Yu | X. Zhang | Dongyan Xu | Xinyan Deng | Fan Fei | Zhan Tu | Ruikun Yu | Taegyu Kim
[1] Robert F. Stengel. Intelligent failure-tolerant control , 1991 .
[2] Saeid Habibi,et al. The Smooth Variable Structure Filter , 2007, Proceedings of the IEEE.
[3] Saeid Habibi,et al. Parameter Identification for a High-Performance Hydrostatic Actuation System Using the Variable Structure Filter Concept , 2007 .
[4] Guillermo Heredia,et al. Sensor and actuator fault detection in small autonomous helicopters , 2008 .
[5] Youmin Zhang,et al. Fault tolerant control of a quadrotor UAV using sliding mode control , 2010, 2010 Conference on Control and Fault-Tolerant Systems (SysTol).
[6] Inseok Hwang,et al. A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.
[7] M. Al-Shabi. The General Toeplitz/Observability Smooth Variable Structure Filter , 2011 .
[8] Quanyan Zhu,et al. Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.
[9] Inseok Hwang,et al. Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles , 2012, Infotech@Aerospace.
[10] Daniel P. Shepard,et al. Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks , 2012 .
[11] Weiqing Sun,et al. Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[12] Xiangyu Zhang,et al. PIEtrace: Platform independent executable trace , 2013, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[13] Weiyi Liu,et al. Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.
[14] Khaled S. Hatamleh,et al. UAV dynamics model parameters estimation techniques: A comparison study , 2013, 2013 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT).
[15] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[16] H. Aguilar-Sierra,et al. Fault Estimation for a Quad-Rotor MAV Using a Polynomial Observer , 2013, 2013 International Conference on Unmanned Aircraft Systems (ICUAS).
[17] Raffaello D'Andrea,et al. Stability and control of a quadrocopter despite the complete loss of one, two, or three propellers , 2014, 2014 IEEE International Conference on Robotics and Automation (ICRA).
[18] Victor A. Skormin,et al. Unmanned Aerial Vehicle security using Recursive parameter estimation , 2014 .
[19] Todd E. Humphreys,et al. Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.
[20] Guillaume Sanahuja,et al. Fault diagnosis and fault-tolerant control strategy for rotor failure in an octorotor , 2015, 2015 IEEE International Conference on Robotics and Automation (ICRA).
[21] Xiangyu Zhang,et al. Dual Execution for On the Fly Fine Grained Execution Comparison , 2015, ASPLOS.
[22] Aiko Pras,et al. Exploring security vulnerabilities of unmanned aerial vehicles , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[23] Ivan H. Beloev,et al. A Review on Current and Emerging Application Possibilities for Unmanned Aerial Vehicles , 2016 .
[24] Peng Liu,et al. Exploiting Physical Dynamics to Detect Actuator and Sensor Attacks in Mobile Robots , 2017, ArXiv.