System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy
From MaRDI portal
Publication:2082774
DOI10.1007/s11768-021-00075-7zbMath1500.93021OpenAlexW4210639271MaRDI QIDQ2082774
Yanlong Zhao, Wenchao Xue, Yanling Zhang, Jin Guo, Xue Bin Wang
Publication date: 4 October 2022
Published in: Control Theory and Technology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11768-021-00075-7
System identification (93B30) Control/observation systems involving computers (process control, etc.) (93C83) Networked control (93B70)
Cites Work
- Asymptotically efficient identification of FIR systems with quantized observations and general quantized inputs
- System identification with quantized observations
- Event-triggered identification of FIR systems with binary-valued output observations
- Distributed filtering under false data injection attacks
- Variational Bayesian approach for ARX systems with missing observations and varying time-delays
- Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems
- Optimal Attack Energy Allocation against Remote State Estimation
- System Identification With Binary-Valued Observations Under Data Tampering Attacks
- Identification Using Binary Measurements for IIR Systems
- Identification of Linear Models From Quantized Data: A Midpoint-Projection Approach
- Robust event‐triggered model predictive control for cyber‐physical systems under denial‐of‐service attacks
This page was built for publication: System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy