Secure synchronization control for a class of cyber-physical systems with unknown dynamics

N Wang, X Li - IEEE/CAA Journal of Automatica Sinica, 2020 - ieeexplore.ieee.org
This paper investigates the secure synchronization control problem for a class of cyber-
physical systems (CPSs) with unknown system matrices and intermittent denial-of-service …

Identification of FIR Systems With Binary-Valued Observations Against Data Tampering Attacks

J Guo, R Jia, R Su, Y Zhao - IEEE Transactions on Systems …, 2023 - ieeexplore.ieee.org
This article addresses the security issue against data tampering attacks in the identification
of finite impulse response (FIR) systems with binary-valued observations. First, the data …

Multi-sensor Power Allocation for Remote Estimation Over Semi-Markov Fading Channels

M Mei, D Ye, J Wei - IEEE Transactions on Control of Network …, 2023 - ieeexplore.ieee.org
This paper investigates the multi-sensor power allocation (MSPA) problem for remote state
estimation in cyber-physical systems (CPSs). Multiple sensors observe different linear time …

Optimal attack schedule for two sensors state estimation under jamming attack

Z Ai, L Peng, M Cao - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we investigate stable state estimation and optimal attack schedule problems of
the wireless Cyber-Physical Systems (CPS) with two sensors under Denial-of-Service (DoS) …

Allocation of Eavesdropping Attacks for Multi-System Remote State Estimation

X Chang, L Peng, S Zhang - Sensors, 2024 - mdpi.com
In recent years, the problem of cyber–physical systems' remote state estimations under
eavesdropping attacks have been a source of concern. Aiming at the existence of …

基于机器学习的信息物理系统安全控制

刘坤, 马书鹤, 马奥运, 张淇瑞, 夏元清 - 自动化学报, 2021 - aas.net.cn
研究了控制信号被恶意篡改的信息物理系统的安全控制问题. 首先, 提出一种改进果蝇优化核
极限学习机算法(Kernel extreme learning machine with improved fruit fly optimization …

Joint state estimation under attack of discrete event systems

Q Zhang, C Seatzu, Z Li, A Giua - IEEE Access, 2021 - ieeexplore.ieee.org
The problem of state estimation in the setting of partially-observed discrete event systems
subject to cyber attacks is considered. An operator observes a plant through a natural …

An outlier‐resistant approach to observer‐based security control for interval type‐2 T‐S fuzzy systems subject to deception attacks

S Zhang, J He, Y Yang, T Yan - IET Control Theory & …, 2023 - Wiley Online Library
This article focuses on the outlier‐resistant observer‐based controller for the interval type‐2
T‐S fuzzy discrete‐time systems with distributed delays under deception attacks. The …

Optimal Deception Attacks Against Remote State Estimation: An Information-Based Approach

J Zhou, J Shang, T Chen - IEEE Transactions on Automatic …, 2022 - ieeexplore.ieee.org
This paper studies the problem of deception attacks against remote state estimation from an
information perspective. The Kullback–Leibler divergence between the compromised …

An Optimal DoS Attack Strategy With Pause and Restart Rules Under Energy Constraints

D Wang, P Jia, J Lian, X Pei - IEEE Transactions on Control of …, 2022 - ieeexplore.ieee.org
This study investigates a denial-of-service (DoS) attack strategy against cyber-physical
systems (CPS) under energy constraints. A DoS attacker with eavesdropping ability under a …