相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Sampled-Based Consensus for Nonlinear Multiagent Systems With Deception Attacks: The Decoupled Method
Ying Cui et al.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2021)
A New Switched System Approach to Leader-Follower Consensus of Heterogeneous Linear Multiagent Systems With DoS Attack
Dan Zhang et al.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2021)
Physical Safety and Cyber Security Analysis of Multi-Agent Systems: A Survey of Recent Advances
Dan Zhang et al.
IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2021)
Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems
Sravani Challa et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
A Markovian jump system approach to consensus of heterogeneous multiagent systems with partially unknown and uncertain attack strategies
Zhenhua Xu et al.
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL (2020)
LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment
Mohammad Wazid et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)
Distributed Deception Attack Detection in Platoon-Based Connected Vehicle Systems
Zhiyang Ju et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
Adaptive Event-triggered Control for Networked Switched T-S Fuzzy Systems Subject to False Data Injection Attacks
Yiwen Qi et al.
INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS (2020)
Detection and Isolation of False Data Injection Attacks in Smart Grid via Unknown Input Interval Observer
Xinyu Wang et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Data Integrity Monitoring Method of Digital Sensors for Internet-of-Things Applications
Gong-Xu Liu et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Summation Detector for False Data-Injection Attack in Cyber-Physical Systems
Dan Ye et al.
IEEE TRANSACTIONS ON CYBERNETICS (2020)
Focusing Matching Localization Method Based on Indoor Magnetic Map
Gong-Xu Liu et al.
IEEE SENSORS JOURNAL (2020)
Resilient Control Design for Load Frequency Control System Under False Data Injection Attacks
Alireza Abbaspour et al.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2020)
Security Research on Wireless Networked Control Systems Subject to Jamming Attacks
Hongjiu Yang et al.
IEEE TRANSACTIONS ON CYBERNETICS (2019)
Consensus of Heterogeneous Linear Multiagent Systems Subject to Aperiodic Sampled-Data and DoS Attack
Dan Zhang et al.
IEEE TRANSACTIONS ON CYBERNETICS (2019)
Robust Stochastic Sampled-data-based Output Consensus of Heterogeneous Multi-agent Systems Subject to Random DoS Attack: A Markovian Jumping System Approach
Hongjie Ni et al.
INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS (2019)
Event-based Distributed Filtering Approach to Nonlinear Stochastic Systems over Sensor Networks
Zhongrui Hu et al.
INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS (2019)
A systems and control perspective of CPS security
Seyed Mehran Dibaji et al.
ANNUAL REVIEWS IN CONTROL (2019)
Observer-Based Distributed Secure Consensus Control of a Class of Linear Multi-Agent Systems Subject to Random Attacks
Yang Yang et al.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2019)
Online Cyber-Attack Detection in Smart Grid: A Reinforcement Learning Approach
Mehmet Necip Kurt et al.
IEEE TRANSACTIONS ON SMART GRID (2019)
ADMM-Based Distributed State Estimation of Smart Grid Under Data Deception and Denial of Service Attacks
Dajun Du et al.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2019)
Detection and Isolation of False Data Injection Attacks in Smart Grids via Nonlinear Interval Observer
Xinyu Wang et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Defending Against Data Integrity Attacks in Smart Grid: A Deep Reinforcement Learning-Based Approach
Dou An et al.
IEEE ACCESS (2019)
Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism
Liwei An et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2018)
Secure estimation for cyber-physical systems with adversarial attacks and unknown inputs: An L-2-gain method
Chun-Hua Xie et al.
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL (2018)
Distributed Filtering for Discrete-Time T-S Fuzzy Systems With Incomplete Measurements
Dan Zhang et al.
IEEE TRANSACTIONS ON FUZZY SYSTEMS (2018)
Distributed Quickest Detection of Cyber-Attacks in Smart Grid
Mehmet Necip Kurt et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Real-Time Detection and Estimation of Denial of Service Attack in Connected Vehicle Systems
Zoleikha Abdollahi Biron et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2018)
Attack Detection and Identification for Automatic Generation Control Systems
Amir Ameli et al.
IEEE TRANSACTIONS ON POWER SYSTEMS (2018)
Secure filtering for stochastic non-linear systems under multiple missing measurements and deception attacks
Huanhuan Yuan et al.
IET CONTROL THEORY AND APPLICATIONS (2018)
Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries
Wei Ao et al.
INFORMATION SCIENCES (2018)
Improved adaptive resilient control against sensor and actuator attacks
Liwei An et al.
INFORMATION SCIENCES (2018)
Secure impulsive synchronization control of multi-agent systems under deception attacks
Wangli He et al.
INFORMATION SCIENCES (2018)
Unscented Kalman Filtering for Nonlinear State Estimation with Correlated Noises and Missing Measurements
Long Xu et al.
INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS (2018)
A survey on security control and attack detection for industrial cyber-physical systems
Derui Ding et al.
NEUROCOMPUTING (2018)
Asynchronous State Estimation for Discrete-Time Switched Complex Networks With Communication Constraints
Dan Zhang et al.
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2018)
Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks
Xin Huang et al.
IEEE TRANSACTIONS ON CYBERNETICS (2018)
Secure Estimation for Cyber-Physical Systems via Sliding Mode
Chengwei Wu et al.
IEEE TRANSACTIONS ON CYBERNETICS (2018)
A Novel Cyber Attack Detection Method in Networked Control Systems
Eman Mousavinejad et al.
IEEE TRANSACTIONS ON CYBERNETICS (2018)
Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks
Derui Ding et al.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2018)
A Physical Layer Security Scheme for Mobile Health Cyber-Physical Systems
Rachad Atat et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
A Survey of Physics-Based Attack Detection in Cyber-Physical Systems
Jairo Giraldo et al.
ACM COMPUTING SURVEYS (2018)
Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks
Dong Wang et al.
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL (2017)
A statistical unsupervised method against false data injection attacks: A visualization-based approach
Mostafa Mohammadpourfard et al.
EXPERT SYSTEMS WITH APPLICATIONS (2017)
Security and Privacy for Cloud-Based IoT: Challenges, Countermeasures, and Future Directions
Jun Zhou et al.
IEEE COMMUNICATIONS MAGAZINE (2017)
Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid
Mohammad Esmalifalak et al.
IEEE SYSTEMS JOURNAL (2017)
Distributed Filtering for Switched Linear Systems With Sensor Networks in Presence of Packet Dropouts and Quantization
Dan Zhang et al.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2017)
False Data Injection on State Estimation in Power Systems-Attacks, Impacts, and Defense: A Survey
Ruilong Deng et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)
Robust Detection of Cyber Attacks on State Estimators Using Phasor Measurements
Junbo Zhao et al.
IEEE TRANSACTIONS ON POWER SYSTEMS (2017)
Resilient Event-Triggering H∞ Load Frequency Control for Multi-Area Power Systems With Energy-Limited DoS Attacks
Chen Peng et al.
IEEE TRANSACTIONS ON POWER SYSTEMS (2017)
Robust detection and reconstruction of state and sensor attacks for cyber-physical systems using sliding modes
Maria Letizia Corradini et al.
IET CONTROL THEORY AND APPLICATIONS (2017)
Distributed networked control systems: A brief overview
Xiaohua Ge et al.
INFORMATION SCIENCES (2017)
Improved-ELM method for detecting false data attack in smart grid
Liqun Yang et al.
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS (2017)
Analysis and synthesis of networked control systems: A survey of recent advances and challenges
Dan Zhang et al.
ISA TRANSACTIONS (2017)
Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks
Zhi Feng et al.
IEEE TRANSACTIONS ON CYBERNETICS (2017)
Short-Term State Forecasting-Aided Method for Detection of Smart Grid General False Data Injection Attacks
Junbo Zhao et al.
IEEE TRANSACTIONS ON SMART GRID (2017)
Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism
Youbiao He et al.
IEEE TRANSACTIONS ON SMART GRID (2017)
Distributed Control of Large-Scale Networked Control Systems With Communication Constraints and Topology Switching
Dan Zhang et al.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2017)
Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment
Mohammad Wazid et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
A review of detection approaches for distributed denial of service attacks
Parneet Kaur et al.
SYSTEMS SCIENCE & CONTROL ENGINEERING (2017)
A Survey on Malware Detection Using Data Mining Techniques
Yanfang Ye et al.
ACM COMPUTING SURVEYS (2017)
Stochastic Game in Remote Estimation Under DoS Attacks
Kemi Ding et al.
IEEE CONTROL SYSTEMS LETTERS (2017)
Resilient control under Denial-of-Service: Robust design
Shuai Feng et al.
AUTOMATICA (2017)
Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks
Derui Ding et al.
AUTOMATICA (2017)
A multi-channel transmission schedule for remote state estimation under DoS attacks
Kemi Ding et al.
AUTOMATICA (2017)
Dynamic State Recovery for Cyber-Physical Systems Under Switching Location Attacks
Chensheng Liu et al.
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2017)
Event-Triggered Control Systems Under Denial-of-Service Attacks
V. S. Dolk et al.
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2017)
Distributed consensus tracking for multi-agent systems under two types of attacks
Zhi Feng et al.
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL (2016)
Event-Triggered State Observers for Sparse Sensor Noise/Attacks
Yasser Shoukry et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2016)
On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
Yilin Mo et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2016)
Recent Advances on Fuzzy-Model-Based Nonlinear Networked Control Systems: A Survey
Jianbin Qiu et al.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2016)
Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems
Zhong-Hua Pang et al.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2016)
Resilient Control of Networked Control System Under DoS Attacks: A Unified Game Approach
Yuan Yuan et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2016)
Survey on Recent Advances in Networked Control Systems
Xian-Ming Zhang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2016)
Adaptive cyber-physical system attack detection and reconstruction with application to power systems
Wei Ao et al.
IET CONTROL THEORY AND APPLICATIONS (2016)
A survey of network anomaly detection techniques
Mohiuddin Ahmed et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)
Machine Learning Methods for Attack Detection in the Smart Grid
Mete Ozay et al.
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2016)
Byzantine Attack and Defense in Cognitive Radio Networks: A Survey
Linyuan Zhang et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)
Detection of False Data Injection Attacks in Smart Grid Communication Systems
Danda B. Rawat et al.
IEEE SIGNAL PROCESSING LETTERS (2015)
Input-to-State Stabilizing Control Under Denial-of-Service
Claudio De Persis et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2015)
Distributed Bayesian Detection in the Presence of Byzantine Data
Bhavya Kailkhura et al.
IEEE TRANSACTIONS ON SIGNAL PROCESSING (2015)
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks
Shahaboddin Shamshirband et al.
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2014)
Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
Hamza Fawzi et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2014)
D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks
Shahaboddin Shamshirband et al.
MEASUREMENT (2014)
Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter
Kebina Manandhar et al.
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2014)
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems
P. Arun Raj Kumar et al.
COMPUTER COMMUNICATIONS (2013)
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
Saman Taghavi Zargar et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)
Distributed Inference with Byzantine Data [State-of-the-art review on data falsification attacks]
Aditya Vempaty et al.
IEEE SIGNAL PROCESSING MAGAZINE (2013)
Unscented Kalman Filter Over Unreliable Communication Networks With Markovian Packet Dropouts
Li Li et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2013)
H-infinity Filtering for Networked Systems With Multiple Time-Varying Transmissions and Random Packet Dropouts
Dan Zhang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2013)
H-infinity Controller Design of Networked Control Systems With Markov Packet Dropouts
Dong Wang et al.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2013)
H∞ Filtering for a Class of Networked Control Systems with Packet Dropouts
Huajing Zhang et al.
MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4 (2013)
Real time DDoS detection using fuzzy estimators
Stavros N. Shiaeles et al.
COMPUTERS & SECURITY (2012)
Network-Based H∞ Filtering for Discrete-Time Systems
Xian-Ming Zhang et al.
IEEE TRANSACTIONS ON SIGNAL PROCESSING (2012)
Cyber-Physical Systems: A Perspective at the Centennial
Kyoung-Dae Kim et al.
PROCEEDINGS OF THE IEEE (2012)
Mean square stability for Kalman filtering with Markovian packet losses
Keyou You et al.
AUTOMATICA (2011)
A Switched System Approach to Networked H∞ Filtering with Packet Losses
Shu Yin et al.
CIRCUITS SYSTEMS AND SIGNAL PROCESSING (2011)
Distributed denial of service attack detection using an ensemble of neural classifier
P. Arun Raj Kumar et al.
COMPUTER COMMUNICATIONS (2011)
Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks
Ankit Singh Rawat et al.
IEEE TRANSACTIONS ON SIGNAL PROCESSING (2011)
Stabilization of Sampled-Data Control Systems With Control Inputs Missing
Wen-An Zhang et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2010)
Networked Control System: Overview and Research Trends
Rachana Ashok Gupta et al.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2010)
Robust filtering with stochastic nonlinearities and multiple missing measurements
Guoliang Wei et al.
AUTOMATICA (2009)
H∞ filtering of networked discrete-time systems with random packet losses
Wen-An Zhang et al.
INFORMATION SCIENCES (2009)
A denial of service detector based on maximum likelihood detection and the random neural network
Guelay Oeke et al.
COMPUTER JOURNAL (2007)
Output feedback stabilization of networked control systems with packet dropouts
Wen-An Zhang et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2007)
Robust H∞ control for networked systems with random packet losses
Zidong Wang et al.
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS (2007)
Design of networked control systems with packet dropouts
Jing Wu et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2007)
Stability of Kalman filtering with Markovian packet losses
Minyi Huang et al.
AUTOMATICA (2007)
Delayed observers for linear systems with unknown inputs
Shreyas Sundaram et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2007)
Control and communication challenges in networked real-time systems
John Baillieul et al.
PROCEEDINGS OF THE IEEE (2007)
A survey of recent results in networked control systems
Joao P. Hespanha et al.
PROCEEDINGS OF THE IEEE (2007)
Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features
D Gavrilis et al.
COMPUTER NETWORKS (2005)
Kalman filtering with intermittent observations
B Sinopoli et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2004)
Asymptotic results for decentralized detection in power constrained wireless sensor networks
JF Chamberland et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2004)