This study is concerned with the event-based security control problem for a class of discrete-time stochastic systems with multiplicative noises subject to both randomly occurring denial-of-service (DoS) attacks and randomly occurring deception attacks. An event-triggered mechanism is adopted with hope to reduce the communication burden, where the measurement signal is transmitted only when a certain triggering condition is violated. A novel attack model is proposed to reflect the randomly occurring behaviours of the DoS attacks as well as the deception attacks within a unified framework via two sets of Bernoulli distributed white sequences with known conditional probabilities. A new concept of mean-square security domain is put forward to ...
In order to address questions like fault diagnosis and optimization in large, complex systems, it is...
International audienceBased on the traditional linear algebra theory, this paper propose the attack ...
In this technical note, the trade-off between the attack detectability and the performance degradati...
In this paper, the security-guaranteed filtering problem is studied for a class of nonlinear stochas...
peer reviewedBased on frequency-domain transformation technique, this paper proposes an attack detec...
This letter studies remote state estimation under denial-of-service (DoS) attacks. A sensor transmit...
In this paper, a synthesized design of fault-detection filter and fault estimator is considered for ...
This paper is concerned with the security control problem of the networked control system (NCSs) sub...
This paper focuses on resilient control of networked control systems (NCSs) under the denial of serv...
International audienceThis paper considers the event-triggered control problem for a class of Networ...
summary:This paper addresses event-triggered control cyber-physical systems under asynchronous denia...
In this paper, we propose a systematic design framework for output-based dynamic event-triggered con...
National Natural Science Foundation of China under Grant 61873148, Grant 61873169, and Grant 6193300...
This paper considers a cyber-physical system (CPS) under denial-of-service (DoS) attacks. The measur...
Event-triggered schemes are characterized in less communication traffic while maintaining the result...
In order to address questions like fault diagnosis and optimization in large, complex systems, it is...
International audienceBased on the traditional linear algebra theory, this paper propose the attack ...
In this technical note, the trade-off between the attack detectability and the performance degradati...
In this paper, the security-guaranteed filtering problem is studied for a class of nonlinear stochas...
peer reviewedBased on frequency-domain transformation technique, this paper proposes an attack detec...
This letter studies remote state estimation under denial-of-service (DoS) attacks. A sensor transmit...
In this paper, a synthesized design of fault-detection filter and fault estimator is considered for ...
This paper is concerned with the security control problem of the networked control system (NCSs) sub...
This paper focuses on resilient control of networked control systems (NCSs) under the denial of serv...
International audienceThis paper considers the event-triggered control problem for a class of Networ...
summary:This paper addresses event-triggered control cyber-physical systems under asynchronous denia...
In this paper, we propose a systematic design framework for output-based dynamic event-triggered con...
National Natural Science Foundation of China under Grant 61873148, Grant 61873169, and Grant 6193300...
This paper considers a cyber-physical system (CPS) under denial-of-service (DoS) attacks. The measur...
Event-triggered schemes are characterized in less communication traffic while maintaining the result...
In order to address questions like fault diagnosis and optimization in large, complex systems, it is...
International audienceBased on the traditional linear algebra theory, this paper propose the attack ...
In this technical note, the trade-off between the attack detectability and the performance degradati...