Cyber–physical security of a smart grid infrastructure Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli Proceedings of the IEEE 100 (1), 195-209, 2011 | 1321 | 2011 |
Secure control against replay attacks Y Mo, B Sinopoli 2009 47th annual Allerton conference on communication, control, and …, 2009 | 1027 | 2009 |
Detecting integrity attacks on SCADA systems Y Mo, R Chabukswar, B Sinopoli IEEE Transactions on Control Systems Technology 22 (4), 1396-1407, 2013 | 606 | 2013 |
Integrity data attacks in power market operations L Xie, Y Mo, B Sinopoli IEEE Transactions on Smart Grid 2 (4), 659-666, 2011 | 536 | 2011 |
False data injection attacks in control systems Y Mo, B Sinopoli Preprints of the 1st workshop on Secure Control Systems 1, 2010 | 507 | 2010 |
Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs Y Mo, S Weerakkody, B Sinopoli IEEE Control Systems Magazine 35 (1), 93-109, 2015 | 501 | 2015 |
False data injection attacks against state estimation in wireless sensor networks Y Mo, E Garone, A Casavola, B Sinopoli 49th IEEE Conference on Decision and Control (CDC), 5967-5972, 2010 | 489 | 2010 |
False data injection attacks in electricity markets L Xie, Y Mo, B Sinopoli 2010 First IEEE International Conference on Smart Grid Communications, 226-231, 2010 | 483 | 2010 |
Privacy preserving average consensus Y Mo, RM Murray IEEE Transactions on Automatic Control 62 (2), 753-765, 2016 | 447 | 2016 |
On the performance degradation of cyber-physical systems under stealthy integrity attacks Y Mo, B Sinopoli IEEE Transactions on Automatic Control 61 (9), 2618-2624, 2015 | 392 | 2015 |
Stochastic event-triggered sensor schedule for remote state estimation D Han, Y Mo, J Wu, S Weerakkody, B Sinopoli, L Shi IEEE Transactions on Automatic Control 60 (10), 2661-2675, 2015 | 339 | 2015 |
Sensor selection strategies for state estimation in energy constrained wireless sensor networks Y Mo, R Ambrosino, B Sinopoli Automatica 47 (7), 1330-1338, 2011 | 230 | 2011 |
Secure estimation in the presence of integrity attacks Y Mo, B Sinopoli IEEE Transactions on Automatic Control 60 (4), 1145-1151, 2014 | 182 | 2014 |
Kalman filtering with intermittent observations: Tail distribution and critical value Y Mo, B Sinopoli IEEE Transactions on Automatic Control 57 (3), 677-689, 2011 | 173 | 2011 |
Integrity attacks on cyber-physical systems Y Mo, B Sinopoli Proceedings of the 1st international conference on High Confidence Networked …, 2012 | 142 | 2012 |
Detecting integrity attacks on control systems using robust physical watermarking S Weerakkody, Y Mo, B Sinopoli 53rd IEEE Conference on Decision and Control, 3757-3764, 2014 | 118 | 2014 |
A characterization of the critical value for Kalman filtering with intermittent observations Y Mo, B Sinopoli 2008 47th IEEE Conference on Decision and Control, 2692-2697, 2008 | 118 | 2008 |
Detection in adversarial environments KG Vamvoudakis, JP Hespanha, B Sinopoli, Y Mo IEEE Transactions on Automatic Control 59 (12), 3209-3223, 2014 | 116 | 2014 |
Multi-sensor scheduling for state estimation with event-based, stochastic triggers S Weerakkody, Y Mo, B Sinopoli, D Han, L Shi IEEE Transactions on Automatic Control 61 (9), 2695-2701, 2015 | 114 | 2015 |
The vulnerability of cyber-physical system under stealthy attacks T Sui, Y Mo, D Marelli, X Sun, M Fu IEEE Transactions on Automatic Control 66 (2), 637-650, 2020 | 108 | 2020 |