Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems
Published 2022 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems
Authors
Keywords
Cyber–physical systems (CPSs), State estimation, Stealthy FDI attacks, Resource constraint
Journal
ISA TRANSACTIONS
Volume -, Issue -, Pages -
Publisher
Elsevier BV
Online
2022-03-04
DOI
10.1016/j.isatra.2022.02.045
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A Novel Networked Predictive Control Method for Systems with Random Communication Constraints
- (2021) Zhonghua Pang et al. Journal of Systems Science & Complexity
- False Data Injection Attacks Against Partial Sensor Measurements of Networked Control Systems
- (2021) Zhong-Hua Pang et al. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS
- An Output-Coding-Based Detection Scheme Against Replay Attacks in Cyber-Physical Systems
- (2021) Haibin Guo et al. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS
- Secure Distributed Adaptive Platooning Control of Automated Vehicles Over Vehicular Ad-Hoc Networks Under Denial-of-Service Attacks
- (2021) Shunyuan Xiao et al. IEEE Transactions on Cybernetics
- Event-trigger-based consensus secure control of linear multi-agent systems under DoS attacks over multiple transmission channels
- (2020) Yang Yang et al. Science China-Information Sciences
- Detection of Stealthy False Data Injection Attacks Against Networked Control Systems via Active Data Modification
- (2020) Zhong-Hua Pang et al. INFORMATION SCIENCES
- Optimal Denial-of-Service attack energy management against state estimation over an SINR-based network
- (2020) Jiahu Qin et al. AUTOMATICA
- Optimal Partial Feedback Attacks in Cyber-Physical Power Systems
- (2020) Guangyu Wu et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
- Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems
- (2020) Junhui Zhang et al. SYSTEMS & CONTROL LETTERS
- Observer-Based Incremental Predictive Control of Networked Multi-Agent Systems With Random Delays and Packet Dropouts
- (2020) Zhong-Hua Pang et al. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS
- Secure State Estimation and Control of Cyber-Physical Systems: A Survey
- (2020) Derui Ding et al. IEEE Transactions on Systems Man Cybernetics-Systems
- Optimal DoS Attack Against LQR Control Channels
- (2020) Jing Zhou et al. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS
- Recursive Filtering of Distributed Cyber-Physical Systems With Attack Detection
- (2020) Derui Ding et al. IEEE Transactions on Systems Man Cybernetics-Systems
- Optimal Stealthy False Data Injection Attacks in Cyber-Physical Systems
- (2019) Yi-Gang Li et al. INFORMATION SCIENCES
- Performance degradation of stealthy attacks against sensor measurements in vector systems
- (2019) Fangyuan Hou et al. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS
- Distributed Krein space-based attack detection over sensor networks under deception attacks
- (2019) Xiaohua Ge et al. AUTOMATICA
- Distributed Event-Triggered Estimation Over Sensor Networks: A Survey
- (2019) Xiaohua Ge et al. IEEE Transactions on Cybernetics
- Resilient Control Design Based on a Sampled-Data Model for a Class of Networked Control Systems Under Denial-of-Service Attacks
- (2019) Xian-Ming Zhang et al. IEEE Transactions on Cybernetics
- Optimal Stealthy Deception Attack Against Cyber-Physical Systems
- (2019) Qirui Zhang et al. IEEE Transactions on Cybernetics
- Worst-case stealthy innovation-based linear attack on remote state estimation
- (2018) Ziyang Guo et al. AUTOMATICA
- Cyber-Physical Attacks With Control Objectives
- (2018) Yuan Chen et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
- Optimal Data Injection Attacks in Cyber-Physical Systems
- (2018) Guangyu Wu et al. IEEE Transactions on Cybernetics
- False Data Injection Attack for Cyber-Physical Systems With Resource Constraint
- (2018) Fangfei Li et al. IEEE Transactions on Cybernetics
- The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems
- (2017) Enoch Kung et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- (2017) Cheng-Zong Bai et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
- Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems
- (2016) Zhong-Hua Pang et al. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now