Distributed encryption fusion estimation against full eavesdropping
From MaRDI portal
Publication:6110290
DOI10.1016/j.automatica.2023.111025zbMath1520.94068OpenAlexW4365812710MaRDI QIDQ6110290
No author found.
Publication date: 5 July 2023
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.automatica.2023.111025
differential privacyeavesdropping attackdistributed fusion estimationartificial noisefusion-based encryption
Cites Work
- Sequential fusion estimation for clustered sensor networks
- Privacy preserving distributed optimization using homomorphic encryption
- Nonlinear state estimation under bounded noises
- Multi-sensor optimal information fusion Kalman filter
- Secure remote state estimation against linear man-in-the-middle attacks using watermarking
- Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
- Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation
- An encoding mechanism for secrecy of remote state estimation
- Resilient consensus for multi-agent systems subject to differential privacy requirements
- Fusion estimation under binary sensors
- New approach to information fusion steady-state Kalman filtering
- Modular control under privacy protection: fundamental trade-offs
- Encryption scheduling for remote state estimation under an operation constraint
- Distributed Covariance Intersection Fusion Estimation for Cyber-Physical Systems With Communication Constraints
- Distributed Mixed H2/H Fusion Estimation With Limited Communication Capacity
- Differentially Private Filtering
- Privacy Preserving Average Consensus
- Networked Fusion Estimation With Bounded Noises
- Synthesis of Dynamic Masks for Infinite-Step Opacity
- State-Secrecy Codes for Networked Linear Systems
- Transmission Scheduling for Remote State Estimation Over Packet Dropping Links in the Presence of an Eavesdropper
- Remote State Estimation in the Presence of an Active Eavesdropper
- Theory of Cryptography
This page was built for publication: Distributed encryption fusion estimation against full eavesdropping