J Qin, M Li, J Wang, L Shi, Y Kang, WX Zheng - Automatica, 2020 - repository.ust.hk
We consider a scenario in which a DoS attacker with the limited power resource and the
purpose of degrading the system performance, jams a wireless network through which the …