scientific article; zbMATH DE number 6936864
From MaRDI portal
Publication:5375255
zbMATH Open1395.68076MaRDI QIDQ5375255FDOQ5375255
Authors: Jiahu Qin, Menglin Li, Ling Shi, Xinghuo Yu
Publication date: 14 September 2018
Title of this publication is not available (Why is that?)
Cited In (63)
- Multi‐consensus recovery of multi‐agent system with cyber‐attack based on topology reconstruction controller
- Cloud-fog computing-based distributed event-triggered consensus predictive compensation for optimal energy management in microgrid under DoS attack
- Consensus-based secondary frequency control under denial-of-service attacks of distributed generations for microgrids
- Secure remote state estimation against linear man-in-the-middle attacks using watermarking
- Security control for two-time-scale cyber physical systems with multiple transmission channels under DoS attacks: the input-to-state stability
- Novel attack‐defense framework for nonlinear complex networks: An important‐data‐based method
- Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems
- A secure clock synchronization scheme for wireless sensor networks against malicious attacks
- Probability-guaranteed secure consensus control for time-varying stochastic multi-agent systems under mixed attacks
- Optimal transmission scheduling for remote state estimation in CPSs with energy harvesting two-hop relay networks
- Deep reinforcement learning control approach to mitigating actuator attacks
- Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme
- Optimizing Attack Schedules Based on Energy Dispatch Over Two-Hop Relay Networks
- Finite‐time fault detection for nonlinear delayed system with dynamic quantization and multiple packet dropouts
- Leaderless consensus control of uncertain multi-agents systems with sensor and actuator attacks
- Stabilization of networked singular control systems under double-channel quantization and DoS attacks
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data
- Optimal power control for sensors and DoS attackers over a fading channel network
- Defensive deception against reactive jamming attacks in remote state estimation
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Optimal DoS attack scheduling for multi-sensor remote state estimation over interference channels
- Optimal sensor scheduling for state estimation under limited channel resources
- Optimal attack strategy against fault detectors for linear cyber-physical systems
- Rollout approach to sensor scheduling for remote state estimation under integrity attack
- Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint
- Optimal denial-of-service attack energy management against state estimation over an SINR-based network
- Adaptive finite-time control for cyber-physical systems with injection and deception attacks
- Event-triggered state estimation for networked control systems with lossy network communication
- Resilient quantized control for asynchronous sampled-data networked control systems under DoS attacks
- Dynamic event‐triggered approach for networked control systems under denial of service attacks
- Predictive output feedback control of networked control system with Markov DoS attack and time delay
- Event-triggered remote state estimation for cyber-physical systems under malicious DoS attacks
- Scaled consensus for multiagent systems under denial-of-service attacks and exogenous disturbance
- Observer-based adaptive secure control with nonlinear gain recursive sliding-mode for networked non-affine nonlinear systems under DoS attacks.
- Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol
- Adaptive control of cyber-physical systems under deception and injection attacks
- Security of networked control systems subject to deception attacks: a survey
- Optimal sensor attacks in cyber-physical systems with round-robin protocol
- Dynamic event-triggered control for nonlinear NCSs subject to DoS attacks
- Optimal completely stealthy attacks against remote estimation in cyber-physical systems
- Event‐triggered model‐free adaptive control for nonlinear cyber‐physical systems with false data injection attacks
- Malicious adversaries against secure state estimation: Sparse sensor attack design
- How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks
- State estimation and event-triggered control for cyber-physical systems under malicious attack
- Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation
- Optimal stealthy attack with historical data on cyber-physical systems
- Binary observation‐based FIR system identification under sequence denial of service attacks
- Dynamic event-triggered model-free adaptive control for nonlinear CPSs under aperiodic DoS attacks
- Event-triggered resilient control for cyber-physical systems under periodic DoS jamming attacks
- Quantized output feedback control for switched systems with DoS attacks and event-triggered sampling
- Optimizing DoS attack energy with imperfect acknowledgments and energy harvesting constraints in cyber-physical systems
- Important-data-based attack design and resilient remote estimation for recurrent neural networks
- Dynamic event-triggered control for multi-channel cyber-physical systems under denial-of-service attacks
- Optimal denial‐of‐service attack scheduling for remote state estimation with time‐varying interference power
- Network steganography based security framework for cyber-physical systems
- Cyber attacks on remote state estimation in cyber-physical systems: a game-theoretic approach
- Resilient consensus of heterogeneous multi-agent systems under asynchronous optimal DoS attack schedules
- Distributed event-triggered consensus control for multi-agent systems under independent DoS attacks: a randomized transmission approach
- Resilient event-triggered fault-tolerant optimization for Euler-Lagrange plants with intermittent communication and asynchronous DoS attacks
- Stochastic important-data-based attack model and defense strategies for cyber-physical system: a data-driven method
- \(H_{\infty}\) control with event-triggered mechanism for T-S fuzzy system under multiple cyber-attacks
- Resilient discrete-time quantization communication for distributed Nash equilibrium seeking under attacks
- Subsystem-importance-aware DoS attacks and countermeasures
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5375255)