X Liu, GH Yang - IEEE Transactions on Cybernetics, 2023 - ieeexplore.ieee.org
… To destroy the remotestateestimation performance to the largest extent, the attacker is required to coordinate the attack signals and attack schedule, which is introduced as follows. …
D Ye, J Wei - IET Control Theory & Applications, 2021 - Wiley Online Library
… [20] studied the optimalattackenergyallocation by formulating a finite Markov decision … an off-line energypowerallocation scheme to optimise the remotestateestimation quality in the …
X Liu, GH Yang - Information Sciences, 2024 - Elsevier
… the design and allocation problem for stealthy attacksagainstremotestateestimation for cyber-… With limited budget for the available energy at each step and total energy over the finite-…
R Liu, F Hao, H Yu - IEEE Transactions on Systems, Man, and …, 2020 - ieeexplore.ieee.org
… 1) We investigate a new SINR-based DoS attack problem and find the optimalattack … the energy consumption of the attacker simultaneously. Compared with [18], the proposed attack …
X Chang, L Peng, S Zhang - Sensors, 2024 - mdpi.com
… estimator. Compared to [27,28], this paper studies the optimalattackenergyallocation strategies from the … In this paper, the optimalattackallocation problem of remotestateestimation in …
Z Guo, D Shi, KH Johansson… - … on Control of Network …, 2016 - ieeexplore.ieee.org
… attacks in a remotestateestimation scenario. We study the optimal linear deception attack on … data detector at the remotestateestimator. The motivation of the current work is three-fold: …
S Zhang, L Peng, X Chang - Neurocomputing, 2024 - Elsevier
… optimalattack schedule againstremotestateestimation in cyber–physical systems (CPSs) under denial of service (DoS) attack… its local stateestimation to the remoteestimation terminal …
H Zhang, Y Qi, J Wu - 2017 American Control Conference …, 2017 - ieeexplore.ieee.org
… For a general case, we design a jamming powerallocation … from the viewpoint of jamming attacker, we consider the jamming attackpowerallocation problem againstremotestate …
L Yang, C Wen - IEEE Access, 2020 - ieeexplore.ieee.org
… Therefore, in order to maximize the terminal estimated error covariance, the purpose of this article is to design an optimalattack system from the attacker’s point of view based on the dif…