State estimation for linear discrete-time systems with binary-valued quantized innovations against data tampering attacks

M Li, Y Hu, J Guo - Journal of the Franklin Institute, 2024 - Elsevier
In today's information era, cyber–physical systems (CPS) have been widely used in many
industrial and infrastructure fields, and the study of security problems of CPS has become a …

System identification with binary-valued observations under data tampering attacks

J Guo, X Wang, W Xue, Y Zhao - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the popularization and application of cyber–physical systems in many industry and
infrastructure fields, the security issue has been quite an important concern. This article …

System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy

J Guo, X Wang, Y Zhang, W Xue, Y Zhao - Control Theory and Technology, 2022 - Springer
With the development of wireless communication technology, cyber physical systems are
applied in various fields such as industrial production and infrastructure, where lots of …

Identification of FIR systems with binary-valued observations against data tampering attacks

J Guo, R Jia, R Su, Y Zhao - IEEE Transactions on Systems …, 2023 - ieeexplore.ieee.org
This article addresses the security issue against data tampering attacks in the identification
of finite impulse response (FIR) systems with binary-valued observations. First, the data …

Fusion State Estimation of CPS under Quantized Observations and Tampering Attacks

M Li, Y Hu, J Guo - IEEE Sensors Journal, 2024 - ieeexplore.ieee.org
With the development of industrialization, the security issue of remote state estimation in
cyber-physical systems (CPSs) has attracted widespread attention in recent years. This …

System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality

J Guo, X Wang, Y Zhang, W Xue, Y Zhao - Control Theory and Technology, 2022 - Springer
In this paper, we investigate the defense problem against the joint attacks of denial-of-
service attacks and data tampering attacks in the framework of system identification with …

False data injection attacks against state estimation without knowledge of estimators

AY Lu, GH Yang - IEEE Transactions on Automatic Control, 2022 - ieeexplore.ieee.org
This article investigates the stealthy false data injection attack design problem for a class of
cyber physical systems equipped with state estimators and attack detectors. The objective is …

False data injection attack for cyber-physical systems with resource constraint

F Li, Y Tang - IEEE transactions on cybernetics, 2018 - ieeexplore.ieee.org
Cyber-security is of the fundamental importance for cyber-physical systems (CPSs), since
CPSs are vulnerable to cyber attack. In order to make the defensive measures better, one …

Secure state estimation for systems under mixed cyber-attacks: Security and performance analysis

H Lin, J Lam, Z Wang - Information Sciences, 2021 - Elsevier
We study the state estimation for cyber-physical systems (CPSs) whose communication
channels are subject to mixed denial-of-service (DoS) and false data injection (FDI) attacks …

State estimation under joint false data injection attacks: Dealing with constraints and insecurity

W Xu, Z Wang, L Hu, J Kurths - IEEE Transactions on Automatic …, 2021 - ieeexplore.ieee.org
This article is concerned with the security issue in the state estimation problem for a
networked control system (NCS). A new model of joint false data injection (FDI) attack is …