Game learning-based system identification with binary-valued observations under DoS attacks
DOI10.1002/ACS.3718zbMATH Open1545.93709MaRDI QIDQ6558261FDOQ6558261
Authors: Chongyuan Hu, Yanling Zhang, Jin Guo
Publication date: 19 June 2024
Published in: International Journal of Adaptive Control and Signal Processing (Search for Journal in Brave)
Recommendations
- Binary observation-based FIR system identification against replay attacks
- Data driven secure control for cyber-physical systems under hybrid attacks: a Stackelberg game approach
- Binary observation‐based FIR system identification under sequence denial of service attacks
- Event‐triggered security control for fuzzy‐model‐based cyber‐physical systems under Denial‐of‐Service attacks and actuator faults
- Event-triggered secure observer-based control for cyber-physical systems under adversarial attacks
Applications of game theory (91A80) System identification (93B30) Identification in stochastic control theory (93E12) Stochastic learning and adaptive control (93E35) Control/observation systems involving computers (process control, etc.) (93C83) Networked control (93B70)
Cites Work
- System identification with quantized observations
- System identification using binary sensors
- Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
- Data based identification and prediction of nonlinear and complex dynamical systems
- A game theoretic approach to multi-channel transmission scheduling for multiple linear systems under DoS attacks
- SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach
- System identification with binary-valued output observations under either-or communication and data packet dropout
- False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis
- System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy
- System Identification With Binary-Valued Observations Under Data Tampering Attacks
- Zero-Sum Game-Based Optimal Secure Control Under Actuator Attacks
- Stochastic detection against deception attacks in CPS: performance evaluation and game-theoretic analysis
Cited In (2)
This page was built for publication: Game learning-based system identification with binary-valued observations under DoS attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6558261)