Adaptive-width generalized correntropy diffusion algorithm for secure distributed estimation

H Zayyani, M Korki - … Transactions on Circuits and Systems II …, 2023 - ieeexplore.ieee.org
In this brief, a secure distributed estimation algorithm is devised, based on a generalized
correntropy kernel function, which is robust against malicious attacks with false data …

Correction-based diffusion LMS algorithms for secure distributed estimation under attacks

H Chang, W Li - Digital Signal Processing, 2020 - Elsevier
In this paper, we mainly study the distributed estimation problem under attacks, which is
mainly used to estimate an unknown parameter. To solve this problem, a correction-based …

Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks

Y Guan, X Ge - IEEE Transactions on Signal and Information …, 2017 - ieeexplore.ieee.org
This paper is concerned with the problem of joint distributed attack detection and distributed
secure estimation for a networked cyber-physical system under physical and cyber attacks …

Distributed secure state estimation under stochastic linear attacks

W Yang, W Luo, X Zhang - IEEE Transactions on Network …, 2020 - ieeexplore.ieee.org
With the widespread applications of Cyber-Physical Systems, the security problem of
distributed state estimation has been exposed, and attracted considerable attentions. In this …

Resilient distributed state estimation under stealthy attack

Y Lv, J Lu, Y Liu, J Lou - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
Network security issues are significant for cyber-physical systems while existing wireless
networks are vulnerable to cyber-attacks. This paper proposes a novel detector for stealthy …

An adversary-resilient doubly compressed diffusion LMS algorithm for distributed estimation

H Zayyani, F Oruji, I Fijalkow - Circuits, Systems, and Signal Processing, 2022 - Springer
This paper proposes an adversary-resilient communication-efficient distributed estimation
algorithm for time-varying networks. It is a generalization of the doubly compressed diffusion …

Distributed filtering algorithm based on local outlier factor under data integrity attacks

Y Luo, Y Liu, W Yang, J Zhou, T Lv - Journal of the Franklin Institute, 2023 - Elsevier
Network security is becoming a prominent issue for the development of information
technology, and intelligent network attacks pose great challenges to system security due to …

Distributed estimation with cross-verification under false data-injection attacks

Y Hua, F Wan, H Gan, Y Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Under false data-injection (FDI) attacks, the data of some agents are tampered with by the
FDI attackers, which causes that the distributed algorithm cannot estimate the ideal unknown …

Watermarking-based protection strategy against stealthy integrity attack on distributed state estimation

J Zhou, W Yang, W Ding, WX Zheng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This article studies the security of distributed state estimation under data integrity attacks.
Each sensor is equipped with a Kullback–Leibler (K–L) divergence detector to diagnose the …

Secure distributed estimation under Byzantine attack and manipulation attack

F Wan, T Ma, Y Hua, B Liao, X Qing - Engineering Applications of Artificial …, 2022 - Elsevier
Wireless sensor networks (WSN) with distributed cooperation has been widely used in
various fields due to their strong adaptive learning ability. However, WSN is vulnerable to …