Security of networked control systems subject to deception attacks: A survey

ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …

Optimal stealthy deception attack against cyber-physical systems

Q Zhang, K Liu, Y Xia, A Ma - IEEE transactions on cybernetics, 2019 - ieeexplore.ieee.org
This paper studies the problem of designing the optimal deception attack to maximize a
utility function with the Kullback-Leibler divergence adopted as a detection constraint. The …

Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review

J Zhou, J Shang, T Chen - IEEE/CAA Journal of Automatica …, 2024 - ieeexplore.ieee.org
Cyber-physical systems (CPSs) have emerged as an essential area of research in the last
decade, providing a new paradigm for the integration of computational and physical units in …

An output-coding-based detection scheme against replay attacks in cyber-physical systems

H Guo, ZH Pang, J Sun, J Li - IEEE Transactions on Circuits and …, 2021 - ieeexplore.ieee.org
This brief studies the detection problem of replay attacks against measurement data
transmitted over the feedback channel of a cyber-physical system. In order to detect such …

A stream learning approach for real-time identification of false data injection attacks in cyber-physical power systems

E Hallaji, R Razavi-Far, M Wang, M Saif… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
This paper presents a novel data-driven framework to aid in system state estimation when
the power system is under unobservable false data injection attacks. The proposed …

Deep learning for online AC false data injection attack detection in smart grids: An approach using LSTM-autoencoder

L Yang, Y Zhai, Z Li - Journal of Network and Computer Applications, 2021 - Elsevier
The Power system is a crucial Cyber-Physical system and is prone to the False Data
Injection Attack (FDIA). The existing FDIA detection mechanism focuses on DC state …

State estimation in smart grids using temporal graph convolution networks

MJ Hossain… - 2021 North American …, 2021 - ieeexplore.ieee.org
State estimation (SE) is one of the key functions of smart grids. The availability of large
volumes of measurement data introduces new opportunities for improving and …

Reachability analysis of cyber-physical systems under stealthy attacks

Q Zhang, K Liu, Z Pang, Y Xia… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This article studies the reachable set of cyber-physical systems subject to stealthy attacks
with the Kullback–Leibler divergence adopted to describe the stealthiness. The reachable …

An online Kullback–Leibler divergence-based stealthy attack against cyber-physical systems

Q Zhang, K Liu, AMH Teixeira, Y Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This article investigates the design of online stealthy attacks with the aim of moving the
system's state to the desired target. Different from the design of offline attacks, which is only …

Distributed filtering algorithm based on local outlier factor under data integrity attacks

Y Luo, Y Liu, W Yang, J Zhou, T Lv - Journal of the Franklin Institute, 2023 - Elsevier
Network security is becoming a prominent issue for the development of information
technology, and intelligent network attacks pose great challenges to system security due to …