System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality
From MaRDI portal
Publication:2082773
DOI10.1007/S11768-021-00074-8zbMath1500.93020OpenAlexW4207029958MaRDI QIDQ2082773
Jin Guo, Yanling Zhang, Wenchao Xue, Yanlong Zhao, Xue Bin Wang
Publication date: 4 October 2022
Published in: Control Theory and Technology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11768-021-00074-8
System identification (93B30) Control/observation systems involving computers (process control, etc.) (93C83) Networked control (93B70)
Cites Work
- Unnamed Item
- Asymptotically efficient identification of FIR systems with quantized observations and general quantized inputs
- A concrete approach to classical analysis
- System identification with quantized observations
- Event-triggered identification of FIR systems with binary-valued output observations
- Variational Bayesian approach for ARX systems with missing observations and varying time-delays
- Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems
- System Identification With Binary-Valued Observations Under Data Tampering Attacks
- Measure Theory and Probability Theory
This page was built for publication: System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality