Two-channel false data injection attacks on multi-sensor remote state estimation
From MaRDI portal
Publication:6583191
DOI10.1002/ASJC.3067MaRDI QIDQ6583191FDOQ6583191
Authors: Jinxing Hua, Ruirui Liu, Fei Hao
Publication date: 6 August 2024
Published in: Asian Journal of Control (Search for Journal in Brave)
false data injection attackscyber physical systems\((\epsilon, \delta)\)-stealthinessmulti-sensor fusion Kalman filter
Cites Work
- Title not available (Why is that?)
- A multi-channel transmission schedule for remote state estimation under DoS attacks
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
- Optimal Linear Cyber-Attack on Remote State Estimation
- Collisions-Free Distributed Optimal Coordination for Multiple Euler-Lagrangian Systems
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Optimal \(\epsilon\)-stealthy attack in cyber-physical systems
- The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems
- Distributed Optimal Coordination for Heterogeneous Linear Multiagent Systems
- Optimal deception attacks against remote state estimation in cyber-physical systems
- Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- False Data Injection and Detection in LQG Systems: A Game Theoretic Approach
- Stealthy Actuator Signal Attacks in Stochastic Control Systems: Performance and Limitations
- Secure consensus of multi-agent systems under denial-of-service attacks
- Observer-based sensor attack diagnosis for cyber-physical systems via zonotope theory
- Deception attack monitoring in vulnerable hydroelectric generator system
- Interval observer-based consensus control of discrete-time multi-agent systems under stealthy attacks
Cited In (1)
This page was built for publication: Two-channel false data injection attacks on multi-sensor remote state estimation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6583191)