Observer‐based sensor attack diagnosis for cyber‐physical systems via zonotope theory

X Zhang, F Zhu - Asian Journal of Control, 2021 - Wiley Online Library
This paper investigates the attack detection, isolation and reconstruction problems for cyber‐
physical systems (CPSs) under sensor attacks. We deal with all the issues in view of an …

Optimal completely stealthy attacks against remote estimation in cyber-physical systems

YG Li, GH Yang - Information Sciences, 2022 - Elsevier
This paper investigates the problem of designing the optimal completely stealthy attacks in
cyber-physical systems. Different from the strictly stealthy attacks in the existing results which …

Optimal stealthy linear attack on remote state estimation with side information

D Ye, B Yang, TY Zhang - IEEE Systems Journal, 2021 - ieeexplore.ieee.org
In this article, the innovation-based linear attack against state estimation in cyber-physical
systems is studied. The scenario is considered where a sensor transmits its measurements …

A recursive algorithm for secure filtering for two-dimensional state-saturated systems under network-based deception attacks

F Wang, Z Wang, J Liang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper addresses the recursive secure filtering problem for an array of two-dimensional
shift-varying systems subject to state saturation under deception attacks. The network-based …

Optimal data injection attacks in cyber-physical systems

G Wu, J Sun, J Chen - IEEE transactions on cybernetics, 2018 - ieeexplore.ieee.org
The primary goal of this paper is to analyze the dynamic response of a system under optimal
data injection attacks from a control perspective. In this paper, optimal data injection attack …

Watermark-based proactive defense strategy design for cyber-physical systems with unknown-but-bounded noises

H Liu, Y Li, QL Han, T Raïssi - IEEE Transactions on Automatic …, 2022 - ieeexplore.ieee.org
In this article, a novel proactive attack defense strategy is proposed to deal with the secure
remote estimation issue in cyber-physical systems with unknown-but-bounded noises in the …

Dynamic reduced-order observer-based detection of false data injection attacks with application to smart grid systems

JJ Yan, GH Yang, Y Wang - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
This article investigates the problem of attack detection of false data injection attacks for a
class of large-scale smart grid systems in the context of cyber–physical systems. First, by …

Secure remote state estimation against linear man-in-the-middle attacks using watermarking

J Huang, DWC Ho, F Li, W Yang, Y Tang - Automatica, 2020 - Elsevier
In this paper, an attack defense method is proposed to address the secure remote state
estimation problem caused by linear man-in-the-middle attacks in cyber–physical systems …

Detection and isolation of false data injection attack via adaptive Kalman filter bank

X Luo, M Zhu, X Wang, X Guan - Journal of Control and Decision, 2024 - Taylor & Francis
Due to the integration of cyber–physical systems, smart grids have faced the new security
risks caused by false data injection attacks (FDIAs). FDIAs can bypass the traditional bad …

Brief survey on attack detection methods for cyber-physical systems

S Tan, JM Guerrero, P Xie, R Han… - IEEE Systems …, 2020 - ieeexplore.ieee.org
In recent years, cyber-physical systems (CPSs) have attracted intense attention due to their
potential applications in many areas. However, the strong reliance on communication …