Security Defense of Large-Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach

Y Suo, S Chai, R Chai, ZH Pang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In large-scale networks, communication links between nodes are easily injected with false
data by adversaries. This paper proposes a novel security defense strategy from the …

A model-free false data injection attack strategy in networked control systems

X Luo, C Fang, C Zhao, J He - 2022 IEEE 61st Conference on …, 2022 - ieeexplore.ieee.org
The data-driven attack strategies recently have received much attention when the full
knowledge of the system model is unknown or difficult to be obtained for the adversary. Note …

Limitation of Reactance Perturbation Strategy Against False Data Injection Attacks on IoT-based Smart Grid

Z Zhang, B Wang, M Liu, Y Qin, J Wang… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
With the goal of defending against false data injection attacks (FDIAs) on state estimation
(SE) of the Internet of Things (IoT)-based smart grid, recently, the reactance perturbation …

Optimal sequential false data injection attack scheme: Finite-time inverse convergence

X Luo, C Fang, C Zhao, P Cheng… - 2023 62nd IEEE …, 2023 - ieeexplore.ieee.org
In this paper, we explore the relationship between the injected attack signal and the attack
selection strategy in networked control systems where the adversary desires to steer the …

Heuristic Learning for Co-Design Scheme of Optimal Sequential Attack

X Luo, H Pan, C Fang, C Zhao, P Cheng… - arXiv preprint arXiv …, 2023 - arxiv.org
This paper considers a novel co-design problem of the optimal\textit {sequential} attack,
whose attack strategy changes with the time series, and in which the\textit {sequential} attack …