A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Volume 13 Issue 1
Jan.  2026

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 19.2, Top 1 (SCI Q1)
    CiteScore: 28.2, Top 1% (Q1)
    Google Scholar h5-index: 95, TOP 5
Turn off MathJax
Article Contents
J. Shang, D. Zhao, H. Zhang, and D. Shi, “Single-dimensional encryption against stealthy attacks on stochastic event-based estimation,” IEEE/CAA J. Autom. Sinica, vol. 13, no. 1, pp. 233–235, Jan. 2026. doi: 10.1109/JAS.2025.125381
Citation: J. Shang, D. Zhao, H. Zhang, and D. Shi, “Single-dimensional encryption against stealthy attacks on stochastic event-based estimation,” IEEE/CAA J. Autom. Sinica, vol. 13, no. 1, pp. 233–235, Jan. 2026. doi: 10.1109/JAS.2025.125381

Single-Dimensional Encryption Against Stealthy Attacks on Stochastic Event-Based Estimation

doi: 10.1109/JAS.2025.125381
More Information
  • loading
  • [1]
    M. Wolf and D. Serpanos, “Safety and security in cyber-physical systems and internet-of-things systems,” Proc. IEEE, vol. 106, no. 1, pp. 9–20, 2017.
    [2]
    W. Duo, M. Zhou, and A. Abusorrah, “A survey of cyber attacks on cyber physical systems: Recent advances and challenges,” IEEE/CAA J. Autom. Sinica., vol. 9, no. 5, pp. 784–800, 2022. doi: 10.1109/JAS.2022.105548
    [3]
    H. Liu, Y. Li, K. H. Johansson, J. Mårtensson, and L. Xie, “Rollout approach to sensor scheduling for remote state estimation under integrity attack,” Automatica, vol. 144, p. 110473, 2022. doi: 10.1016/j.automatica.2022.110473
    [4]
    J. Zhou, J. Shang, and T. Chen, “Cybersecurity landscape on remote state estimation: A comprehensive review,” IEEE/CAA J. Autom. Sinica., vol. 11, no. 4, pp. 1–15, 2024. doi: 10.1109/JAS.2024.124386
    [5]
    H. Guo, J. Sun, and Z. Pang, “Residual-based false data injection attacks against multi-sensor estimation systems,” IEEE/CAA J. Autom. Sinica., vol. 10, no. 5, pp. 1181–1191, 2023. doi: 10.1109/JAS.2023.123441
    [6]
    J. Shang, M. Chen, and T. Chen, “Optimal linear encryption against stealthy attacks on remote state estimation,” IEEE Trans. Autom. Control, vol. 66, no. 8, pp. 3592–3607, 2021. doi: 10.1109/TAC.2020.3024143
    [7]
    Z. Guo, D. Shi, K. H. Johansson, and L. Shi, “Optimal linear cyberattack on remote state estimation,” IEEE Trans. Control Network Syst., vol. 4, no. 1, pp. 4–13, 2017. doi: 10.1109/TCNS.2016.2570003
    [8]
    Z. Guo, D. Shi, K. H. Johansson, and L. Shi, “Worst-case innovation-based integrity attacks with side information on remote state estimation,” IEEE Trans. Control Network Syst., vol. 6, no. 1, pp. 48–59, 2019. doi: 10.1109/TCNS.2018.2793664
    [9]
    J. Zhou, J. Shang, and T. Chen, “On information fusion in optimal linear FDI attacks against remote state estimation,” IEEE Trans. Control Network Syst., vol. 10, no. 4, pp. 2085–2096, 2023. doi: 10.1109/TCNS.2023.3260041
    [10]
    C. Bai, F. Pasqualetti, and V. Gupta, “Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs,” Automatica, vol. 82, pp. 251–260, 2017. doi: 10.1016/j.automatica.2017.04.047
    [11]
    Z. Guo, D. Shi, K. H. Johansson, and L. Shi, “Worst-case stealthy innovation-based linear attack on remote state estimation,” Automatica, vol. 89, pp. 117–124, 2018. doi: 10.1016/j.automatica.2017.11.018
    [12]
    J. Shang, H. Yu, and T. Chen, “Worst-case stealthy innovation-based linear attacks on remote state estimation under Kullback-Leibler divergence,” IEEE Trans. Autom. Control, vol. 67, no. 11, pp. 6082–6089, 2022. doi: 10.1109/TAC.2021.3125430
    [13]
    P. Cheng, Z. Yang, J. Chen, Y. Qi, and L. Shi, “An event-based stealthy attack on remote state estimation,” IEEE Trans. Autom. Control, vol. 65, no. 10, pp. 4348–4355, 2020. doi: 10.1109/TAC.2019.2956021
    [14]
    D. Han, Y. Mo, J. Wu, S. Weerakkody, B. Sinopoli, and L. Shi, “Stochastic event-triggered sensor schedule for remote state estimation,” IEEE Trans. Autom. Control, vol. 60, no. 10, pp. 2661–2675, 2015. doi: 10.1109/TAC.2015.2406975
    [15]
    L. Xu, Y. Mo, and L. Xie, “Remote state estimation with stochastic event-triggered sensor schedule and packet drops,” IEEE Trans. Autom. Control, vol. 65, no. 11, pp. 4981–4988, 2020. doi: 10.1109/TAC.2020.3004328
    [16]
    H. Yu, J. Shang, and T. Chen, “On stochastic and deterministic eventbased state estimation,” Automatica, vol. 123, p. 109314, 2021. doi: 10.1016/j.automatica.2020.109314
    [17]
    J. Shang, H. Yu, and T. Chen, “Worst-case stealthy attacks on stochastic event-based state estimation,” IEEE Trans. Autom. Control, vol. 67, no. 4, pp. 2052–2059, 2022. doi: 10.1109/TAC.2021.3071948
    [18]
    H. Guo, J. Sun, Z. Pang, and G. Liu, “Event-based optimal stealthy false data-injection attacks against remote state estimation systems,” IEEE Trans. Cybern., vol. 53, no. 10, pp. 6714–6724, 2023. doi: 10.1109/TCYB.2023.3255583
    [19]
    X. Zhao, L. Liu, M. V. Basin, and Z. Fei, “Event-triggered reverse attacks on remote state estimation,” IEEE Trans. Autom. Control, vol. 69, no. 2, pp. 998–1005, 2023.
    [20]
    J. Shang, J. Zhou, and T. Chen, “Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation,” Automatica, vol. 136, p. 110015, 2022. doi: 10.1016/j.automatica.2021.110015

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(1)

    Article Metrics

    Article views (35) PDF downloads(2) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return