S Xiao, QL Han, X Ge, Y Zhang - IEEE transactions on …, 2019 - ieeexplore.ieee.org
… over a sensornetwork in the presence of deceptionattacks. A group of intercommunicating sensors is densely … Each sensor is capable of sharing its measurement with its neighboring …
D Ding, Z Wang, DWC Ho, G Wei - Automatica, 2017 - Elsevier
… In this paper, the underlying sensornetwork has n sensor nodes which are distributed in space according to a fixed network topology represented by a directed graph G = ( V , E , ℋ ) of …
… An IDA captures the game between the environment and the supervisor considering the possibility that a subset of the sensornetwork channels may be compromised by a malicious …
… bounded disturbances and deceptionattacks over sensornetworks. The available measurements at each sensing node are collected not only from the individual sensor but also from its …
L Ma, Z Wang, Y Chen, X Yi - … Processing over Networks, 2021 - ieeexplore.ieee.org
… efforts to handle unknown deceptionattacks on the innovations by proposing a novel algorithm for the distributed state estimation problem with the aid of artificial neural networks (NN). …
X Bu, H Dong, F Han, G Li - International Journal of General …, 2018 - Taylor & Francis
… In this paper, it is assumed that the sensornetwork has n sensor … When the data are transmitted in the sensornetwork, the attacker … in this paper can deal with deceptionattacks as well. …
WA Zhang, L Yu, D He - IEEE Transactions on Aerospace and …, 2019 - ieeexplore.ieee.org
… estimation methods for sensornetworks with attacks in this paper. In this paper, the sequential fusion estimation problem will be studied for sensornetworks with deceptiveattacks. A …
H Yuan, Y Guo, Y Xia - ISA transactions, 2022 - Elsevier
… In this paper, distributed filtering for sensornetworks under the effect of bandwidth limitation and deceptionattacks is considered to ensure the predetermined H ∞ performance. The …
F Han, H Dong, Z Wang, G Li - International Journal of Robust …, 2019 - Wiley Online Library
… and deceptionattacks over sensornetworks. The target plant and the measuring sensors are … The malicious signal involved in deceptionattacks is constrained by a specific sector-like …