Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks
暂无分享,去创建一个
Guoqiang Hu | Daniel W. C. Ho | Li Yu | Bo Chen | G. Hu | Li Yu | D. Ho | Bo Chen
[1] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[2] Guoqiang Hu,et al. Information Fusion Estimation for spatially distributed cyber-physical systems with communication delay and bandwidth constraints , 2015, 2015 American Control Conference (ACC).
[3] Huijun Gao,et al. Aggregation and Charging Control of PHEVs in Smart Grid: A Cyber–Physical Perspective , 2016, Proceedings of the IEEE.
[4] Karl Henrik Johansson,et al. Attack models and scenarios for networked control systems , 2012, HiCoNS '12.
[5] Balasubramaniam Natarajan,et al. State Estimation Over a Lossy Network in Spatially Distributed Cyber-Physical Systems , 2014, IEEE Transactions on Signal Processing.
[6] Guoqiang Hu,et al. Distributed Mixed $H_{2}/H_{\infty}$ Fusion Estimation With Limited Communication Capacity , 2016, IEEE Transactions on Automatic Control.
[7] Guoqiang Hu,et al. Distributed Fusion Estimation With Communication Bandwidth Constraints , 2015, IEEE Transactions on Automatic Control.
[8] Jing Huang,et al. State Estimation in Electric Power Grids: Meeting New Challenges Presented by the Requirements of the Future Grid , 2012, IEEE Signal Processing Magazine.
[9] György Dán,et al. Security of Fully Distributed Power System State Estimation: Detection and Mitigation of Data Integrity Attacks , 2014, IEEE Journal on Selected Areas in Communications.
[10] Chongzhao Han,et al. Optimal Linear Estimation Fusion — Part I : Unified Fusion Rules , 2001 .
[11] Yugang Niu,et al. Distributed estimation and filtering for sensor networks , 2011 .
[12] Vijay Kumar,et al. Robust Control for Mobility and Wireless Communication in Cyber–Physical Systems With Application to Robot Teams , 2012, Proceedings of the IEEE.
[13] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[14] Michail Maniatakos,et al. Cyber-physical systems: A security perspective , 2015, 2015 20th IEEE European Test Symposium (ETS).
[15] J. A. Roecker,et al. Comparison of two-sensor tracking methods based on state vector fusion and measurement fusion , 1988 .
[16] Te-son Kuo,et al. Trace bounds on the solution of the algebraic matrix Riccati and Lyapunov equation , 1986 .
[17] Shuzhi Sam Ge,et al. Cognitive Radio Based State Estimation in Cyber-Physical Systems , 2014, IEEE Journal on Selected Areas in Communications.
[18] G. Giannakis,et al. Kalman Filtering in Wireless Sensor Networks , 2010, IEEE Control Systems.
[19] Thia Kirubarajan,et al. Estimation with Applications to Tracking and Navigation: Theory, Algorithms and Software , 2001 .
[20] Jun Fang,et al. Hyperplane-Based Vector Quantization for Distributed Estimation in Wireless Sensor Networks , 2009, IEEE Transactions on Information Theory.
[21] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[22] Chongzhao Han,et al. Optimal linear estimation fusion .I. Unified fusion rules , 2003, IEEE Trans. Inf. Theory.
[23] Sonia Martínez,et al. On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.
[24] Yuan Gao,et al. New approach to information fusion steady-state Kalman filtering , 2005, Autom..
[25] Qiang Zhang,et al. Node Topology Effect on Target Tracking Based on UWSNs Using Quantized Measurements , 2015, IEEE Transactions on Cybernetics.
[26] H. Vincent Poor,et al. Multicast Routing for Decentralized Control of Cyber Physical Systems with an Application in Smart Grid , 2012, IEEE Journal on Selected Areas in Communications.
[27] Andrey V. Savkin,et al. On false-data attacks in robust multi-sensor-based estimation , 2011, 2011 9th IEEE International Conference on Control and Automation (ICCA).
[28] Aniruddha S. Gokhale,et al. A Cyber Physical Systems Perspective on the Real-time and Reliable Dissemination of Information in Intelligent Transportation Systems , 2010, Netw. Protoc. Algorithms.
[29] George J. Pappas,et al. Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.
[30] Bruno Sinopoli,et al. Secure Estimation in the Presence of Integrity Attacks , 2013, IEEE Transactions on Automatic Control.
[31] Yuanqing Xia,et al. Design and Stability Analysis of Networked Predictive Control Systems , 2013, IEEE Transactions on Control Systems Technology.
[32] F. Maan,et al. Vulnerability assessment of AODV and SAODV routing protocols against network routing attacks and performance comparisons , 2011, 2011 Wireless Advanced.
[33] Rick S. Blum,et al. Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.
[34] Wen-an Zhang,et al. Distributed Finite-Horizon Fusion Kalman Filtering for Bandwidth and Energy Constrained Wireless Sensor Networks , 2014, IEEE Transactions on Signal Processing.
[35] Daniel W. C. Ho,et al. Networked Fusion Estimation With Bounded Noises , 2017, IEEE Transactions on Automatic Control.
[36] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.