Nonlinear stealthy attacks on remote state estimation
From MaRDI portal
Publication:6585394
DOI10.1016/j.automatica.2024.111747zbMATH Open1542.93387MaRDI QIDQ6585394
Unnamed Author, Jing Zhou, Tongwen Chen
Publication date: 9 August 2024
Published in: Automatica (Search for Journal in Brave)
Estimation and detection in stochastic control theory (93E10) Linear systems in control theory (93C05)
Cites Work
- Unnamed Item
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Secure remote state estimation against linear man-in-the-middle attacks using watermarking
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data
- Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Optimal denial-of-service attack energy management against state estimation over an SINR-based network
- Security metrics and synthesis of secure control systems
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- Encryption scheduling for remote state estimation under an operation constraint
- Optimal deception attacks on remote state estimators equipped with interval anomaly detectors
- On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
- Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
- The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems
- Secure Control Systems: A Quantitative Risk Management Approach
- False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis
- DoS Attack Energy Management Against Remote State Estimation
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
- Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
- False Data Injection and Detection in LQG Systems: A Game Theoretic Approach
- Security Against False Data-Injection Attack in Cyber-Physical Systems
- Worst-Case Stealthy Attacks on Stochastic Event-Based State Estimation
- State-Secrecy Codes for Networked Linear Systems
- Secure State Estimation With Byzantine Sensors: A Probabilistic Approach
- Stealthy Actuator Signal Attacks in Stochastic Control Systems: Performance and Limitations
- Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack
- Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation
- DoS Attacks on Remote State Estimation With Asymmetric Information
- Optimal Linear Cyber-Attack on Remote State Estimation
- Probability Content of Regions Under Spherical Normal Distributions, IV: The Distribution of Homogeneous and Non-Homogeneous Quadratic Functions of Normal Variables
- The Vulnerability of Cyber-Physical System Under Stealthy Attacks
- Optimal Deception Attacks Against Remote State Estimation: An Information-Based Approach
- Worst-Case Stealthy Innovation-Based Linear Attacks on Remote State Estimation Under Kullback–Leibler Divergence
- Integrity attacks on remote estimation with spatial-temporal information sources
Related Items (1)
This page was built for publication: Nonlinear stealthy attacks on remote state estimation