Attack and estimator design for multi-sensor systems with undetectable adversary
DOI10.1016/J.AUTOMATICA.2019.108545zbMATH Open1429.93374OpenAlexW2970458365MaRDI QIDQ2280939FDOQ2280939
Authors: Haiyu Song, Peng Shi, Wen-An Zhang, C. C. Lim, Li Yu
Publication date: 19 December 2019
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.automatica.2019.108545
Recommendations
- Malicious adversaries against secure state estimation: Sparse sensor attack design
- Secure estimation for cyber-physical systems with adversarial attacks and unknown inputs: an \(L_{2}\)-gain method
- Innovation-based stealthy attack against distributed state estimation over sensor networks
- Optimal linear attack for multi-sensor network against state estimation
- Secure nonlinear fusion estimation for cyber-physical systems under FDI attacks
Design techniques (robust design, computer-aided design, etc.) (93B51) Estimation and detection in stochastic control theory (93E10) Networked control (93B70)
Cites Work
- Linear Matrix Inequalities in System and Control Theory
- A survey of design methods for failure detection in dynamic systems
- Attack Detection and Identification in Cyber-Physical Systems
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks
- Robust filter design with time-varying parameter uncertainty and error variance constraints
- Optimal Linear Cyber-Attack on Remote State Estimation
- State estimation under false data injection attacks: security analysis and system protection
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Distributed Kalman filtering for time-varying discrete sequential systems
- Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism
Cited In (21)
- Important-data-based attack design and resilient remote estimation for recurrent neural networks
- Innovation-based stealthy attack against distributed state estimation over sensor networks
- Linear system security -- detection and correction of adversarial sensor attacks in the noise-free case
- Novel attack‐defense framework for nonlinear complex networks: An important‐data‐based method
- Distributed dual objective control of an energy storage system under jointly connected switching networks
- Distributed Krein space-based attack detection over sensor networks under deception attacks
- Security analysis and defense strategy of distributed filtering under false data injection attacks
- Discrete-event systems subject to unknown sensor attacks
- Persuasion-Based Robust Sensor Design Against Attackers With Unknown Control Objectives
- Geometrical characterization of sensor placement for cone-invariant and multi-agent systems against undetectable zero-dynamics attacks
- How to Calibrate Your Adversary's Capabilities? Inverse Filtering for Counter-Autonomous Systems
- Hybrid-triggered interval type-2 fuzzy control for networked systems under attacks
- Efficient resilient dynamic co-estimation framework for cyber-physical systems under sensor attacks
- Security analysis for cyber-physical systems under undetectable attacks: a geometric approach
- Malicious adversaries against secure state estimation: Sparse sensor attack design
- Unknown input filtering under full accessibility attacks
- Interval observer design of discrete-time systems under stealthy attacks
- Adaptive distributed Kalman-like filter for power system with cyber attacks
- Secure trajectory planning against undetectable spoofing attacks
- System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy
- A multi-observer based estimation framework for nonlinear systems under sensor attacks
This page was built for publication: Attack and estimator design for multi-sensor systems with undetectable adversary
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2280939)