Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks
From MaRDI portal
Publication:681196
DOI10.1016/j.jfranklin.2017.11.010zbMath1380.93241OpenAlexW2769283588MaRDI QIDQ681196
Bo Shen, Dong Wang, Zidong Wang, Fuad Eid S. Alsaadi
Publication date: 30 January 2018
Published in: Journal of the Franklin Institute (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jfranklin.2017.11.010
semidefinite programmingdeception attackscentralized security-guaranteed filteringlinear time-invariant stochastic systemsmultirate-sensor fusionsingle-rate discrete-time system
Semidefinite programming (90C22) Discrete-time control/observation systems (93C55) Linear systems in control theory (93C05) Stochastic systems in control theory (general) (93E03)
Related Items
Probability-guaranteed secure consensus control for time-varying stochastic multi-agent systems under mixed attacks ⋮ Robust particle filtering with enhanced outlier resilience and real-time disturbance compensation ⋮ Distributed set-membership filtering for time-varying systems under constrained measurements and replay attacks ⋮ Design of sampled-data controllers for the synchronization of complex dynamical networks under controller attacks ⋮ Hidden Markov model‐based control for networked fuzzy Markov jump systems against randomly occurring multichannel attacks ⋮ Stabilization of random nonlinear systems subject to deception attacks ⋮ Quadratic estimation for stochastic systems in the presence of random parameter matrices, time-correlated additive noise and deception attacks ⋮ Observer-based guaranteed cost control of cyber-physical systems under DoS jamming attacks ⋮ Event-driven finite-time control for continuous-time networked switched systems under cyber attacks ⋮ A novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) index ⋮ Optimal \(\epsilon\)-stealthy attack in cyber-physical systems ⋮ Security control for T-S fuzzy systems with multi-sensor saturations and distributed event-triggered mechanism ⋮ Security control for two-time-scale cyber physical systems with multiple transmission channels under DoS attacks: the input-to-state stability ⋮ Secure state estimation for systems under mixed cyber-attacks: security and performance analysis ⋮ Optimal linear attack for multi-sensor network against state estimation ⋮ Time-varying formation control of multiple unmanned surface vessels with heterogeneous hydrodynamics subject to actuator attacks ⋮ Distributed non-fragile set-membership filtering for nonlinear systems under fading channels and bias injection attacks
Cites Work
- Variance-constrained \(H_\infty\) control for a class of nonlinear stochastic discrete time-varying systems: the event-triggered design
- Recent advances on filtering and control for cyber-physical systems under security and resource constraints
- Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks
- Stabilization of networked control systems with multirate sampling
- Parity space-based fault detection for linear discrete time-varying systems with unknown input
- Envelope-constrained \(\mathcal{H}_\infty\) filtering with fading measurements and randomly occurring nonlinearities: the finite horizon case
- Security of interdependent and identical networked control systems
- A sampled-data approach to distributed \(H_\infty\) resilient state estimation for a class of nonlinear time-delay systems over sensor networks
- A new framework for output feedback controller design for a class of discrete-time stochastic nonlinear system with quantization and missing measurement
- Secure Estimation in the Presence of Integrity Attacks
- Multirate Observers for Nonlinear Sampled-Data Systems Using Input-to-State Stability and Discrete-Time Approximation
- Quantized/Saturated Control for Sampled-Data Systems Under Noisy Sampling Intervals: A Confluent Vandermonde Matrix Approach
- Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks