YG Li, GH Yang - Information Sciences, 2022 - Elsevier
This paper investigates the problem of designing the optimal completely stealthy attacks in cyber-physical systems. Different from the strictly stealthy attacks in the existing results which …
D Ye, B Yang, TY Zhang - IEEE Systems Journal, 2021 - ieeexplore.ieee.org
In this article, the innovation-based linear attack against state estimation in cyber-physical systems is studied. The scenario is considered where a sensor transmits its measurements …
F Wang, Z Wang, J Liang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper addresses the recursive secure filtering problem for an array of two-dimensional shift-varying systems subject to state saturation under deception attacks. The network-based …
G Wu, J Sun, J Chen - IEEE transactions on cybernetics, 2018 - ieeexplore.ieee.org
The primary goal of this paper is to analyze the dynamic response of a system under optimal data injection attacks from a control perspective. In this paper, optimal data injection attack …
H Liu, Y Li, QL Han, T Raïssi - IEEE Transactions on Automatic …, 2022 - ieeexplore.ieee.org
In this article, a novel proactive attack defense strategy is proposed to deal with the secure remote estimation issue in cyber-physical systems with unknown-but-bounded noises in the …
JJ Yan, GH Yang, Y Wang - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
This article investigates the problem of attack detection of false data injection attacks for a class of large-scale smart grid systems in the context of cyber–physical systems. First, by …
J Huang, DWC Ho, F Li, W Yang, Y Tang - Automatica, 2020 - Elsevier
In this paper, an attack defense method is proposed to address the secure remote state estimation problem caused by linear man-in-the-middle attacks in cyber–physical systems …
X Luo, M Zhu, X Wang, X Guan - Journal of Control and Decision, 2024 - Taylor & Francis
Due to the integration of cyber–physical systems, smart grids have faced the new security risks caused by false data injection attacks (FDIAs). FDIAs can bypass the traditional bad …
In recent years, cyber-physical systems (CPSs) have attracted intense attention due to their potential applications in many areas. However, the strong reliance on communication …