H Guo, J Sun, ZH Pang - ISA transactions, 2022 - Elsevier
This paper mainly investigates how to maximally degrade estimation performance of a cyber– physical system under limited resource. A stealthy false data injection (FDI) attack scheme is …
YG Li, GH Yang - Information Sciences, 2020 - Elsevier
In this paper, the problem of designing the worst-case ϵ-stealthy false data injection attacks in cyber-physical systems is investigated. The attacker attempts to degrade the remote state …
AY Lu, GH Yang - IEEE Transactions on Automatic Control, 2022 - ieeexplore.ieee.org
This article investigates the stealthy false data injection attack design problem for a class of cyber physical systems equipped with state estimators and attack detectors. The objective is …
YG Li, GH Yang - Information Sciences, 2019 - Elsevier
In this paper, the problem of false data injection attacks for cyber-physical systems is investigated. The Kullback–Leibler divergence is utilized to measure the stealthiness of the …
JR Huo, XJ Li - Journal of the Franklin Institute, 2023 - Elsevier
In this paper, the problem about the false data injection attacks on sensors to degrade the state estimation performance in cyber-physical systems (CPSs) is investigated. The attack …
W Xu, Z Wang, L Hu, J Kurths - IEEE Transactions on Automatic …, 2021 - ieeexplore.ieee.org
This article is concerned with the security issue in the state estimation problem for a networked control system (NCS). A new model of joint false data injection (FDI) attack is …
In this paper, we consider the security problem of dynamic state estimations in cyber– physical systems (CPSs) when the sensors are compromised by false data injection (FDI) …
YG Li, GH Yang - IEEE Transactions on Systems, Man, and …, 2019 - ieeexplore.ieee.org
The problem of stealthy innovation-based attacks in cyber-physical systems is studied in this paper. Different from the existing results which only utilize the current data, a more general …
Y Liu, L Cheng - IEEE Transactions on Circuits and Systems II …, 2022 - ieeexplore.ieee.org
An effective false data injection attack should cause enough damage to the system while avoiding being spotted by detection methods. This brief proposes an extremely stealthy …