IEEE/CAA Journal of Automatica Sinica
Citation: | M. Lv, Y. Z. Lv, W. W. Yu, and H. F. Meng, “Finite-time attack detection and secure state estimation for cyber-physical systems,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 10, pp. 2032–2034, Oct. 2023. doi: 10.1109/JAS.2023.123351 |
[1] |
H. X. Hu, C. Wen, and G. Wen, “A distributed Lyapunov-based redesign approach for heterogeneous uncertain agents with cooperation-competition interactions,” IEEE Trans. Neural Networks Learning Systems, vol. 33, no. 11, pp. 6946–6960, 2022. doi: 10.1109/TNNLS.2021.3084142
|
[2] |
W. Duo, M. Zhou, and A. Abusorrah, “A survey of cyber attacks on cyber physical systems: Recent advances and challenges,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 5, pp. 784–800, 2022. doi: 10.1109/JAS.2022.105548
|
[3] |
R. Deng, G. Xiao, R. Lu, H. Liang, and A. V. Vasilakos, “False data injection on state estimation in power systems—Attacks, impacts, and defense: A survey,” IEEE Trans. Industrial Informatics, vol. 13, no. 2, pp. 411–423, 2017. doi: 10.1109/TII.2016.2614396
|
[4] |
J. Zhang, L. Pan, Q.-L. Han, et al., “Deep learning based attack detection for cyber-physical system cybersecurity: A survey,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 3, pp. 377–391, 2022. doi: 10.1109/JAS.2021.1004261
|
[5] |
Y. Shoukry and P. Tabuada, “Event-triggered state observers for sparse sensor noise/attacks,” IEEE Trans. Automatic Control, vol. 61, no. 8, pp. 2079–2091, 2016. doi: 10.1109/TAC.2015.2492159
|
[6] |
M. Showkatbakhsh, Y. Shoukry, S. Diggavi, et al., “Securing state reconstruction under sensor and actuator attacks: Theory and design,” Automatica, vol. 116, p. 108920, 2020. doi: 10.1016/j.automatica.2020.108920
|
[7] |
W. Zhang, H. Su, F. Zhu, et al., “Unknown input observer design for one-sided Lipschitz nonlinear systems,” Nonlinear Dynamics, vol. 79, no. 2, pp. 1469–1479, 2015. doi: 10.1007/s11071-014-1754-x
|
[8] |
Y. Lv, G. Wen, T. Huang, et al., “Adaptive protocol design for distributed tracking with relative output information: A distributed fixed-time observer approach,” IEEE Trans. Control Network Systems, vol. 7, no. 1, pp. 118–128, 2020. doi: 10.1109/TCNS.2019.2919855
|
[9] |
M. Mistry, A. C. D. Iddio, M. Huth, et al., “Satisfiability modulo theories for process systems engineering,” Computers &Chemical Engineering, vol. 113, pp. 98–114, 2018.
|
JAS-2022-1305-supp.pdf |