CC Lin, CT Tsai, YL Liu, TT Chang… - Mobile Networks and …, 2023 - Springer
To implement various artificial intelligence and automation applications in smart factories, edge computing and industrial Internet of Things (IIoT) devices must be widely deployed, so …
Z Zhao, Y Xu, Y Li, Y Zhao, B Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This article aims to investigate the data-driven attack detection and identification problem for cyber–physical systems under sparse actuator attacks, by developing tools from subspace …
C Yang, X Cao, Z Shi - IEEE Transactions on Vehicular …, 2023 - ieeexplore.ieee.org
Ground multi-target tracking (MTT) is one of the core tasks of airborne ground moving target indicator (GMTI) radar and automotive radar. However, ground MTT still remains a …
YG Li, GH Yang, X Wang - ISA transactions, 2023 - Elsevier
This paper studies the issue of developing the optimal deception attacks on the multiple channels in cyber–physical systems, where the attackers are limited by energy constraints …
X Sun, Z Yu, H Gao, X Li - Information Sciences, 2023 - Elsevier
Command and control systems are a typical kind of cyber-physical systems (CPSs), usually called command and control CPSs (C 3 PSs). C 3 PSs are in general thought of as the most …
The problem of multiple integrity attacks (attackers) detection and identification (MIADI) in cyber–physical systems (CPSs) is still a challenging problem to date. The goal of this article …
C Ning, Z Xi - International Journal of Systems Science, 2023 - Taylor & Francis
In recent years, the security issues of cyber-physical systems (CPSs) have attracted extensive attention from researchers. In this paper, a novel window-type detector (WTD) is …
To defend the cyber–physical system (CPSs) from cyber-attacks, this work proposes an unified intrusion detection mechanism which is capable to fast hunt various types of attacks …
C Yang, X Cao, L He, H Zhang - IEEE Transactions on Systems …, 2023 - ieeexplore.ieee.org
This article is concerned with the problem of multiple attacks detection (MAD) for distributed sensor networks (SNs) under multiple malicious attacks. The goal of this article is to develop …