Adaptive neural dynamic-memory event-triggered control of high-order random nonlinear systems with deferred output constraints

S Liu, B Niu, G Zong, X Zhao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This paper investigates the deferred output constraint (DOC) issues of high-order random
nonlinear systems. The DOC indicates that the system output is constrained within a given …

Security Defense of Large-scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach

Y Suo, S Chai, R Chai, ZH Pang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In large-scale networks, communication links between nodes are easily injected with false
data by adversaries. This paper proposes a novel security defense strategy from the …

State Estimation for Delayed Memristive Neural Networks With Multichannel Round-Robin Protocol and Multimodal Injection Attacks

L Zha, J Miao, J Liu, X Xie, E Tian - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This article explores the state estimation problem of memristive neural networks (MNNs) with
mixed delays subject to multichannel round-robin protocol (MRRP) and multimodal injection …

Stealthy FDI attacks on modified Kalman filtering in complex networks with non-Gaussian-Lévy noise

W Yuan, T Tong, Q Dong, J Sun - Chaos, Solitons & Fractals, 2024 - Elsevier
This paper investigates the problem of network security for stealthy false data injection (FDI)
attacks under modified Kalman filtering (MKF) over complex networks with non-Gaussian …

Stealthy attacks against distributed state estimation of stochastic multi-agent systems under composite attack detection mechanisms

DY Zhang, XJ Li - Information Sciences, 2024 - Elsevier
This paper is concerned with the security problem of distributed state estimation for
stochastic multi-agent systems (MASs) under directed topology. First, in the absence of …

Design of strictly stealthy attacks for nonlinear multiagent systems under distributed attack detection mechanism

DY Zhang, XJ Li - Information Sciences, 2023 - Elsevier
This paper focuses on the problem of strictly stealthy attacks design against nonlinear multi-
agent systems (MASs) with directed communication topology. First, a distributed attack …

Physical Invariant Subspace based Unsupervised Anomaly Detection for Internet of Vehicles

M Zhou, L Han, J Wang - IEEE Transactions on Intelligent …, 2024 - ieeexplore.ieee.org
Due to the dynamic and uncertain nature of the autonomous driving environment, traditional
detection methods are ineffective in detecting complex and diverse anomalies. Additionally …

Two‐channel stealthy false data injection attacks design without estimator knowledge

H Wang, Y Ren, Y Fang, A Liu - Asian Journal of Control, 2024 - Wiley Online Library
This paper primarily focuses on designing stealthy false data injection attacks targeting two
communication channels in cyber‐physical systems equipped with state estimators and …

Event‐triggered adaptive secure lateral stabilization for autonomous vehicles under actuator attacks

HT Sun, X Chen, Y Shen, C Peng… - International Journal of …, 2024 - Wiley Online Library
False data injection attacks can disrupt the steering control actions and make a real threat to
both the security and safety of autonomous vehicles. In this paper, a secure event‐triggered …

A Resilient Distributed Kalman Filtering Under Bidirectional Stealthy Attack

W Ding, W Yang, C Yang, X Ren… - IEEE Signal Processing …, 2024 - ieeexplore.ieee.org
False data injection attacks are widely investigated to exploit the cyber-vulnerability of Cyber-
Physical System. However, the existing attack policies only consider the cyber-vulnerability …