System identification with binary-valued observations under data tampering attacks

J Guo, X Wang, W Xue, Y Zhao - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the popularization and application of cyber–physical systems in many industry and
infrastructure fields, the security issue has been quite an important concern. This article …

Identification of FIR systems with binary-valued observations against data tampering attacks

J Guo, R Jia, R Su, Y Zhao - IEEE Transactions on Systems …, 2023 - ieeexplore.ieee.org
This article addresses the security issue against data tampering attacks in the identification
of finite impulse response (FIR) systems with binary-valued observations. First, the data …

State estimation for linear discrete-time systems with binary-valued quantized innovations against data tampering attacks

M Li, Y Hu, J Guo - Journal of the Franklin Institute, 2024 - Elsevier
In today's information era, cyber–physical systems (CPS) have been widely used in many
industrial and infrastructure fields, and the study of security problems of CPS has become a …

Summation detector for false data-injection attack in cyber-physical systems

D Ye, TY Zhang - IEEE transactions on cybernetics, 2019 - ieeexplore.ieee.org
In this paper, from the perspectives of defenders, we consider the detection problems of
false data-injection attacks in cyber-physical systems (CPSs) with white noise. The false …

Identification of FIR systems with binary-valued observations against denial-of-service attacks

J Guo, R Jia, R Su, Y Zhao, Y Song - Applied Mathematics and …, 2023 - Elsevier
Abstract DoS (Denial-of-Service) attack is a very common network attack, under which it is of
great practical significance to study the system performance. This paper addresses the …

Window-type detector for stealthy false data injection attack in cyber-physical systems

C Ning, Z Xi - International Journal of Systems Science, 2023 - Taylor & Francis
In recent years, the security issues of cyber-physical systems (CPSs) have attracted
extensive attention from researchers. In this paper, a novel window-type detector (WTD) is …

A secure strategy for a cyber physical system with multi-sensor under linear deception attack

C Wang, J Huang, D Wang, F Li - Journal of the Franklin Institute, 2021 - Elsevier
Linear deception attacks can bypass the χ 2 detector by tampering with data. In this paper,
we provide a secure strategy for a cyber physical system (CPS) against such attacks. In …

State estimation for linear systems with unknown input and random false data injection attack

L Li, H Yang, Y Xia, H Yang - IET Control Theory & Applications, 2019 - Wiley Online Library
This study focuses on the state estimation problem for a linear system with unknown input
and random false data injection attack. The unknown input is treated as a process with a non …

False data injection attacks against state estimation without knowledge of estimators

AY Lu, GH Yang - IEEE Transactions on Automatic Control, 2022 - ieeexplore.ieee.org
This article investigates the stealthy false data injection attack design problem for a class of
cyber physical systems equipped with state estimators and attack detectors. The objective is …

Analysis of stealthy false data injection attacks against networked control systems: Three case studies

Z Pang, Y Fu, H Guo, J Sun - Journal of Systems Science and Complexity, 2023 - Springer
This paper mainly investigates the security problem of a networked control system based on
a Kalman filter. A false data injection attack scheme is proposed to only tamper the …