IEEE/CAA Journal of Automatica Sinica
Citation: | H. Guo, Z.-H. Pang, and C. Li, “Side information-based stealthy false data injection attacks against multi-sensor remote estimation,” IEEE/CAA J. Autom. Sinica, vol. 11, no. 4, pp. 1054–1056, Apr. 2024. doi: 10.1109/JAS.2023.124086 |
[1] |
D. Ding, Q.-L. Han, X. Ge, and J. Wang, “Secure state estimation and control of cyber-physical systems: A survey,” IEEE Trans. Syst. Man Cybern.: Syst., vol. 51, no. 1, pp. 176–190, Jan. 2021. doi: 10.1109/TSMC.2020.3041121
|
[2] |
C.-B. Zheng, Z.-H. Pang, J.-X. Wang, J. Sun, G.-P. Liu, and Q.-L. Han, “Null-space-based time-varying formation control of uncertain nonlinear second-order multi-agent systems with collision avoidance,” IEEE Trans. Ind. Electron., vol. 70, no. 10, pp. 10476–10485, Oct. 2023. doi: 10.1109/TIE.2022.3217585
|
[3] |
H. Guo, J. Sun, Z.-H. Pang, and G.-P. Liu, “Event-based optimal stealthy false data injection attacks against remote state estimation systems,” IEEE Trans. Cybern., vol. 53, no. 10, pp. 6714–6724, Oct. 2023. doi: 10.1109/TCYB.2023.3255583
|
[4] |
M. Xie, D. Ding, X. Ge, Q.-L. Han, H. Dong, and Y. Song, “Distributed platooning control of automated vehicles subject to replay attacks based on proportional integral observers,” IEEE/CAA J. Autom. Sinica, 2022. DOI: 10.1109/JAS.2022.105941
|
[5] |
Z.-H. Pang, L.-Z. Fan, H. Guo, Y. Shi, R. Chai, J. Sun, and G. -P. Liu, “Security of networked control systems subject to deception attacks: A survey,” Int. J. Syst. Sci., vol. 53, no. 16, pp. 3577–3598, Dec. 2022. doi: 10.1080/00207721.2022.2143735
|
[6] |
Z. Guo, D. Shi, K. H. Johansson, and L. Shi, “Optimal linear cyber-attack on remote state estimation,” IEEE Trans. Control Netw. Syst., vol. 4, no. 1, pp. 4–13, Mar. 2017. doi: 10.1109/TCNS.2016.2570003
|
[7] |
H. Liu, Y. Ni, L. Xie, and K. H. Johansson, “How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks,” Automatica, vol. 136, p. 110079, Feb. 2022. doi: 10.1016/j.automatica.2021.110079
|
[8] |
Z. Guo, D. Shi, K. H. Johansson, and L. Shi, “Worst-case innovation-based integrity attacks with side information on remote state estimation,” IEEE Trans. Control Netw. Syst., vol. 6, no. 1, pp. 48–59, Mar. 2019. doi: 10.1109/TCNS.2018.2793664
|
[9] |
D. Ye, B. Yang, and T.-Y. Zhang, “Optimal stealthy linear attack on remote state estimation with side information,” IEEE Syst. J., vol. 16, no. 1, pp. 1499–1507, Mar. 2022. doi: 10.1109/JSYST.2021.3063735
|
[10] |
Y. Li, L. Shi, and T. Chen, “Detection against linear deception attacks on multi-sensor remote state estimation,” IEEE Trans. Control Netw. Syst., vol. 5, no. 3, pp. 846–856, 2018. doi: 10.1109/TCNS.2017.2648508
|
[11] |
H. Guo, J. Sun, and Z.-H. Pang, “Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems,” ISA Trans., vol. 127, pp. 32–40, Aug. 2022. doi: 10.1016/j.isatra.2022.02.045
|
[12] |
H. Guo, J. Sun, and Z.-H. Pang, “Residual-based false data injection attacks against multi-sensor estimation systems,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 5, pp. 1181–1191, May 2023. doi: 10.1109/JAS.2023.123441
|
[13] |
Q. Zhang, K. Liu, D. Han, G. Su, and Y. Xia, “Design of stealthy deception attacks with partial system knowledge,” IEEE Trans. Autom. Control, vol. 68, no. 2, pp. 1069–1076, Feb. 2023. doi: 10.1109/TAC.2022.3146079
|
[14] |
Z.-H. Pang, W.-C. Luo, G.-P. Liu, and Q.-L. Han, “Observer-based incremental predictive control of networked multi-agent systems with random delays and packet dropouts,” IEEE Trans. Circuits Syst. II Express Briefs, vol. 68, no. 1, pp. 426–430, Jan. 2021.
|