Optimal DoS Attack Against LQR Control Channels
暂无分享,去创建一个
Jun Shang | Jing Zhou | Yuzhe Li | Tongwen Chen | Tongwen Chen | Yuzhe Li | Jun Shang | Jing Zhou
[1] Panos J. Antsaklis,et al. Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies , 2015, IEEE Transactions on Automatic Control.
[2] Wei Zhang,et al. Stability of networked control systems , 2001 .
[3] Alessandro Trifiletti,et al. Leakage Power Analysis Attacks: A Novel Class of Attacks to Nanometer Cryptographic Circuits , 2010, IEEE Transactions on Circuits and Systems I: Regular Papers.
[4] Jianbin Qiu,et al. Fuzzy Adaptive Finite-Time Fault-Tolerant Control for Strict-Feedback Nonlinear Systems , 2020, IEEE Transactions on Fuzzy Systems.
[5] Stéphane Lafortune,et al. Detection and Mitigation of Classes of Attacks in Supervisory Control Systems , 2018, Autom..
[6] Jian Sun,et al. Optimal data integrity attack on actuators in Cyber-Physical Systems , 2016, 2016 American Control Conference (ACC).
[7] Qie He,et al. Optimal switching sequence for switched linear systems , 2018, SIAM J. Control. Optim..
[8] Tongwen Chen,et al. An Intrusion Detection System for Cyber Attacks in Wireless Networked Control Systems , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.
[9] Yongxiang Xia,et al. Vulnerability Assessment of Power Grids Against Link-Based Attacks , 2020, IEEE Transactions on Circuits and Systems II: Express Briefs.
[10] Ling Shi,et al. Optimal Denial-of-Service attack scheduling against linear quadratic Gaussian control , 2014, 2014 American Control Conference.
[11] Li Yu,et al. Packet-Based State Feedback Control Under DoS Attacks in Cyber-Physical Systems , 2019, IEEE Transactions on Circuits and Systems II: Express Briefs.
[12] Tamer Basar,et al. Optimal control of LTI systems over unreliable communication links , 2006, Autom..
[13] Ling Shi,et al. Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.
[14] Ruochi Zhang,et al. Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff , 2017, IEEE Transactions on Information Forensics and Security.
[15] Jian Sun,et al. Optimal Data Injection Attacks in Cyber-Physical Systems , 2018, IEEE Transactions on Cybernetics.
[16] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[17] Luca Schenato,et al. To Zero or to Hold Control Inputs With Lossy Links? , 2009, IEEE Transactions on Automatic Control.