A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Volume 10 Issue 10
Oct.  2023

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 15.3, Top 1 (SCI Q1)
    CiteScore: 23.5, Top 2% (Q1)
    Google Scholar h5-index: 77, TOP 5
Turn off MathJax
Article Contents
M. Lv, Y. Z. Lv, W. W. Yu, and H. F. Meng, “Finite-time attack detection and secure state estimation for cyber-physical systems,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 10, pp. 2032–2034, Oct. 2023. doi: 10.1109/JAS.2023.123351
Citation: M. Lv, Y. Z. Lv, W. W. Yu, and H. F. Meng, “Finite-time attack detection and secure state estimation for cyber-physical systems,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 10, pp. 2032–2034, Oct. 2023. doi: 10.1109/JAS.2023.123351

Finite-Time Attack Detection and Secure State Estimation for Cyber-Physical Systems

doi: 10.1109/JAS.2023.123351
More Information
  • loading
  • [1]
    H. X. Hu, C. Wen, and G. Wen, “A distributed Lyapunov-based redesign approach for heterogeneous uncertain agents with cooperation-competition interactions,” IEEE Trans. Neural Networks Learning Systems, vol. 33, no. 11, pp. 6946–6960, 2022. doi: 10.1109/TNNLS.2021.3084142
    [2]
    W. Duo, M. Zhou, and A. Abusorrah, “A survey of cyber attacks on cyber physical systems: Recent advances and challenges,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 5, pp. 784–800, 2022. doi: 10.1109/JAS.2022.105548
    [3]
    R. Deng, G. Xiao, R. Lu, H. Liang, and A. V. Vasilakos, “False data injection on state estimation in power systems—Attacks, impacts, and defense: A survey,” IEEE Trans. Industrial Informatics, vol. 13, no. 2, pp. 411–423, 2017. doi: 10.1109/TII.2016.2614396
    [4]
    J. Zhang, L. Pan, Q.-L. Han, et al., “Deep learning based attack detection for cyber-physical system cybersecurity: A survey,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 3, pp. 377–391, 2022. doi: 10.1109/JAS.2021.1004261
    [5]
    Y. Shoukry and P. Tabuada, “Event-triggered state observers for sparse sensor noise/attacks,” IEEE Trans. Automatic Control, vol. 61, no. 8, pp. 2079–2091, 2016. doi: 10.1109/TAC.2015.2492159
    [6]
    M. Showkatbakhsh, Y. Shoukry, S. Diggavi, et al., “Securing state reconstruction under sensor and actuator attacks: Theory and design,” Automatica, vol. 116, p. 108920, 2020. doi: 10.1016/j.automatica.2020.108920
    [7]
    W. Zhang, H. Su, F. Zhu, et al., “Unknown input observer design for one-sided Lipschitz nonlinear systems,” Nonlinear Dynamics, vol. 79, no. 2, pp. 1469–1479, 2015. doi: 10.1007/s11071-014-1754-x
    [8]
    Y. Lv, G. Wen, T. Huang, et al., “Adaptive protocol design for distributed tracking with relative output information: A distributed fixed-time observer approach,” IEEE Trans. Control Network Systems, vol. 7, no. 1, pp. 118–128, 2020. doi: 10.1109/TCNS.2019.2919855
    [9]
    M. Mistry, A. C. D. Iddio, M. Huth, et al., “Satisfiability modulo theories for process systems engineering,” Computers &Chemical Engineering, vol. 113, pp. 98–114, 2018.
  • JAS-2022-1305-supp.pdf

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(1)

    Article Metrics

    Article views (274) PDF downloads(112) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return