The problem of deception attacks utilizing both disclosure and disruption resources in the multiple types of sensors setting against remote state estimation is investigated in this paper. A group of sensors, including reliable and unreliable ones, measure system states and transmit innovations to a remote fusion center via wireless channels, wherein a malicious attacker can modify the data packets of unreliable sensors. By virtue of disclosure resources of reliable sensors and disruption resources of unreliable ones, a stealthy linear attack strategy is given, which can deceive the anomaly detectors and degrade the estimation performance. We obtain feasible criteria under which such attack policies can bypass existing detectors. The evoluti...
We consider a class of malicious attacks against remote state estimation. A sensor with limited reso...
This paper focuses on the distributed fusion estimation problem in which a signal transmitted over w...
This paper considers security issues of a cyber-physical system (CPS) under denial-of-service (DoS) ...
The problem of deception attacks utilizing both disclosure and disruption resources in the multiple ...
The security issue in the state estimation problem is investigated for a networked control system (N...
This paper considers a synthetic counter-measure, combining transmission scheduling and defensive de...
A class of malicious attacks against remote state estimation in cyber-physical systems is considered...
A class of malicious attacks against remote state estimation in cyber-physical systems is considered...
This paper is concerned with the problem of how secure the innovation-based remote state estimation ...
The vulnerability analysis of remote state estimation with batch-data detectors is investigated in t...
State estimation in critical networked infrastructure such as the transportation and electricity (sm...
In this paper, we consider the security of remote state estimation in cyber-physical systems, where ...
We consider remote state estimation in the presence of an active eavesdropper. A sensor forward loca...
This paper is concerned with the security issue in the state estimation problem for a networked cont...
This paper considers security issues of a cyber-physical system (CPS) under denial-of-service (DoS) ...
We consider a class of malicious attacks against remote state estimation. A sensor with limited reso...
This paper focuses on the distributed fusion estimation problem in which a signal transmitted over w...
This paper considers security issues of a cyber-physical system (CPS) under denial-of-service (DoS) ...
The problem of deception attacks utilizing both disclosure and disruption resources in the multiple ...
The security issue in the state estimation problem is investigated for a networked control system (N...
This paper considers a synthetic counter-measure, combining transmission scheduling and defensive de...
A class of malicious attacks against remote state estimation in cyber-physical systems is considered...
A class of malicious attacks against remote state estimation in cyber-physical systems is considered...
This paper is concerned with the problem of how secure the innovation-based remote state estimation ...
The vulnerability analysis of remote state estimation with batch-data detectors is investigated in t...
State estimation in critical networked infrastructure such as the transportation and electricity (sm...
In this paper, we consider the security of remote state estimation in cyber-physical systems, where ...
We consider remote state estimation in the presence of an active eavesdropper. A sensor forward loca...
This paper is concerned with the security issue in the state estimation problem for a networked cont...
This paper considers security issues of a cyber-physical system (CPS) under denial-of-service (DoS) ...
We consider a class of malicious attacks against remote state estimation. A sensor with limited reso...
This paper focuses on the distributed fusion estimation problem in which a signal transmitted over w...
This paper considers security issues of a cyber-physical system (CPS) under denial-of-service (DoS) ...