On Remote State Estimation in the Presence of an Eavesdropper
暂无分享,去创建一个
Daniel E. Quevedo | Daniel Dolz | Subhrakanti Dey | Alex S. Leong | S. Dey | D. Quevedo | D. Dolz | Alex S. C. Leong
[1] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[2] Bruno Sinopoli,et al. Secure Estimation in the Presence of Integrity Attacks , 2013, IEEE Transactions on Automatic Control.
[3] João M. F. Xavier,et al. Filter Design With Secrecy Constraints: The MIMO Gaussian Wiretap Channel , 2013, IEEE Transactions on Signal Processing.
[4] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[5] Karl Henrik Johansson,et al. Secure Control Systems: A Quantitative Risk Management Approach , 2015, IEEE Control Systems.
[6] Daniel E. Quevedo,et al. Sensor Scheduling in Variance Based Event Triggered Estimation With Packet Drops , 2015, IEEE Transactions on Automatic Control.
[7] Luca Schenato,et al. Optimal Estimation in Networked Control Systems Subject to Random Delay and Packet Drop , 2008, IEEE Transactions on Automatic Control.
[8] Subhrakanti Dey,et al. Distortion Outage Minimization in Distributed Estimation With Estimation Secrecy Outage Constraints , 2017, IEEE Transactions on Signal and Information Processing over Networks.
[9] Kenneth E. Barner,et al. Sensor Data Cryptography in Wireless Sensor Networks , 2008, IEEE Transactions on Information Forensics and Security.
[10] Ling Shi,et al. Scheduling Two Gauss–Markov Systems: An Optimal Solution for Remote State Estimation Under Bandwidth Constraint , 2012, IEEE Transactions on Signal Processing.
[11] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.