Worst-case stealthy innovation-based linear attack on remote state estimation
From MaRDI portal
Recommendations
- How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems
- Optimal deception attacks against remote state estimation in cyber-physical systems
- Optimal stealthy false data injection attacks in cyber-physical systems
- Optimal linear attack for multi-sensor network against state estimation
Cites work
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- Event-based state estimation of linear dynamic systems with unknown exogenous inputs
- Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
- On Finite-State Stochastic Modeling and Secure Estimation of Cyber-Physical Systems
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- Optimal Linear Cyber-Attack on Remote State Estimation
- Secure Control Systems: A Quantitative Risk Management Approach
Cited in
(60)- Fuzzy adaptive secure tracking control against unknown false data injection attacks for uncertain nonlinear systems with input quantization
- Integrity attacks on remote estimation with spatial-temporal information sources
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Secure remote state estimation against linear man-in-the-middle attacks using watermarking
- Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
- Network theoretic analysis of maximum a posteriori detectors for optimal input detection
- False data injection attacks on sensors against state estimation in cyber-physical systems
- Optimal stealthy false data injection attacks in cyber-physical systems
- Stochastic coding detection scheme in cyber-physical systems against replay attack
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems
- Man-in-the-middle attack against cyber-physical systems under random access protocol
- On the confidentiality of controller states under sensor attacks
- Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme
- Complete stealthiness false data injection attack design in multisensor systems with attack resource constraints
- Optimal sensor attacks in cyber-physical systems with round-robin protocol
- Optimal deception attacks on remote state estimators equipped with interval anomaly detectors
- Security of networked control systems subject to deception attacks: a survey
- Optimal completely stealthy attacks against remote estimation in cyber-physical systems
- A robust dynamic compensation approach for cyber-physical systems against multiple types of actuator attacks
- Security analysis and fault detection against stealthy replay attacks
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data
- Optimal attack strategy against fault detectors for linear cyber-physical systems
- A novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) index
- Performance degradation of stealthy attacks against sensor measurements in vector systems
- Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems
- Vulnerability analysis of distributed state estimation under joint deception attacks
- An encoding mechanism for secrecy of remote state estimation
- Robust adaptive control for nonlinear cyber‐physical systems with FDI attacks via attack estimation
- Design of false data injection attacks in cyber-physical systems
- Optimal stealthy attack with historical data on cyber-physical systems
- Attack and estimator design for multi-sensor systems with undetectable adversary
- Design of strictly stealthy attacks for nonlinear multiagent systems under distributed attack detection mechanism
- Resilient synchronization of distributed multi-agent systems under attacks
- Malicious adversaries against secure state estimation: Sparse sensor attack design
- How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks
- Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint
- Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems
- Stealthy multiplicative attacks against cyber‐physical systems: A gap metric approach
- A secure strategy for a cyber physical system with multi-sensor under linear deception attack
- Optimal stealthy attack against stochastic event‐based scheduling for remote state estimation in cyber‐physical systems
- Innovation-based stealthy attack against distributed state estimation over sensor networks
- Optimal linear attack for multi-sensor network against state estimation
- Optimal deception attacks against remote state estimation in cyber-physical systems
- Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach
- Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
- Performance based attack detection and security analysis for cyber‐physical systems
- Optimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channels
- On vulnerability of Kalman filtering with holistic estimation performance loss
- A transmission scheme for secure estimation of cyber-physical systems against malicious attack
- Neural-network-based output feedback adaptive resilient control for stochastic nonlinear systems subject to sensor and actuator attacks
- Two-channel false data injection attacks on multi-sensor remote state estimation
- Network steganography based security framework for cyber-physical systems
- Nonlinear stealthy attacks on remote state estimation
- Ripple effect of cooperative attacks in multi-agent systems: results on minimum attack targets
- State estimation for linear discrete-time systems with binary-valued quantized innovations against data tampering attacks
- Analysis of stealthy false data injection attacks against networked control systems: three case studies
- Data-driven attack policy design for cyber-physical systems under channel constraints
- Secure state estimation via robust optimization for nonlinear cyber-physical systems
- Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems
- Stealthy attack against distributed state estimation for cyber-physical systems
This page was built for publication: Worst-case stealthy innovation-based linear attack on remote state estimation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1640242)