Finite-time covert attacks on reference tracking systems with unknown-but-bounded noises
From MaRDI portal
Publication:6144134
DOI10.1016/j.cnsns.2023.107648zbMath1530.93453OpenAlexW4387849911MaRDI QIDQ6144134
Publication date: 5 January 2024
Published in: Communications in Nonlinear Science and Numerical Simulation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.cnsns.2023.107648
Cites Work
- Finite-time trajectory tracking control in a task space of robotic manipulators
- Constrained zonotopes: a new tool for set-based estimation and fault detection
- Trajectory tracking control of thrust-vectoring UAVs
- Zonotopes and Kalman observers: gain optimality under distinct uncertainty paradigms and robust convergence
- Fault-tolerant iterative learning control for mobile robots non-repetitive trajectory tracking with output constraints
- Adaptive event-based tracking control of unmanned marine vehicle systems with DoS attack
- Secure remote state estimation against linear man-in-the-middle attacks using watermarking
- A zonotopic set-invariance analysis of replay attacks affecting the supervisory layer
- Security analysis and defense strategy of distributed filtering under false data injection attacks
- Neutralizing zero dynamics attack on sampled-data systems via generalized holds
- Event-triggering-based leader-following bounded consensus of multi-agent systems under DoS attacks
- Practical trajectory tracking of random Lagrange systems
- Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems
- Distributed implementation of nonlinear model predictive control for AUV trajectory tracking
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- Attack-tolerant control and observer-based trajectory tracking for cyber-physical systems
- Tracking control for sampled-data systems with uncertain time-varying sampling intervals and delays
- Positive invariant sets for fault tolerant multisensor control schemes
- Sequential approximation of feasible parameter sets for identification with set membership uncertainty
- Active Security Control Approach Against DoS Attacks in Cyber-Physical Systems
- Security Against False Data-Injection Attack in Cyber-Physical Systems
- Switching-Like Event-Triggered Control for Networked Control Systems Under Malicious Denial of Service Attacks
- Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack
This page was built for publication: Finite-time covert attacks on reference tracking systems with unknown-but-bounded noises