Volume 12
Issue 12
IEEE/CAA Journal of Automatica Sinica
| Citation: | J. Liu, J. Tang, L. Zha, and E. Tian, “Non-fragile filtering for discrete-time networked systems subject to fading measurements: An encryption and decryption scheme,” IEEE/CAA J. Autom. Sinica, vol. 12, no. 12, pp. 2618–2620, Dec. 2025. doi: 10.1109/JAS.2025.125402 |
| [1] |
H. Guo, J. Sun, Z.-H. Pang, and G.-P. Liu, “Event-based optimal stealthy false data-injection attacks against remote state estimation systems,” IEEE Trans. Cybern., vol. 53, no. 10, pp. 6714–6724, 2023. doi: 10.1109/TCYB.2023.3255583
|
| [2] |
H. Guo, J. Sun, and Z.-H. Pang, “Analysis of replay attacks with countermeasure for state estimation of cyber-physical systems,” IEEE Trans. Circuits and Systems II: Express Briefs, vol. 71, no. 1, pp. 206–210, 2024.
|
| [3] |
C. Lu, X.-M. Zhang, M. Wu, Q.-L. Han, and Y. He, “Energy-to-peak state estimation for static neural networks with interval time-varying delays,” IEEE Trans. Cybern., vol. 48, no. 10, pp. 2823–2835, 2018. doi: 10.1109/TCYB.2018.2836977
|
| [4] |
L. Zou, Z. Wang, H. Dong, and Q.-L. Han, “Energy-to-peak state estimation with intermittent measurement outliers: The single-output case,” IEEE Trans. Cybern., vol. 52, no. 11, pp. 504–515, 2022.
|
| [5] |
Q. Zheng, S. Xu, and Z. Zhang, “Nonfragile H∞ control for uncertain takagi-sugeno fuzzy systems under digital communication channels and its application,” IEEE Trans. Systems, Man, and Cybern.: Systems, vol. 52, no. 6, pp. 3638–3647, 2021.
|
| [6] |
L. Zou, Z. Wang, B. Shen, H. Dong, and G. Lu, “Encrypted finitehorizon energy-to-peak state estimation for time-varying systems under eavesdropping attacks: Tackling secrecy capacity,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 4, pp. 985–996, 2023. doi: 10.1109/JAS.2023.123393
|
| [7] |
L. Wang, Z. Wang, D. Zhao, and G. Wei, “Event-based state estimation under constrained bit rate: An encoding-decoding approach,” Automatica, vol. 143, p. 110421, 2022. doi: 10.1016/j.automatica.2022.110421
|
| [8] |
L. Zou, Z. Wang, B. Shen, and H. Dong, “Encryption-decryption-based state estimation with multirate measurements against eavesdroppers: A recursive minimum-variance approach,” IEEE Trans. Autom. Control, vol. 68, no. 12, pp. 8111–8118, 2023. doi: 10.1109/TAC.2023.3288624
|
| [9] |
W. Chen, Z. Wang, J. Hu, and G.-P. Liu, “Differentially private average consensus with logarithmic dynamic encoding-decoding scheme,” IEEE Trans. Cybern., vol. 53, no. 10, pp. 6725–6736, 2023. doi: 10.1109/TCYB.2022.3233296
|
| [10] |
Z. Zhang, P. Cheng, J. Wu, and J. Chen, “Secure state estimation using hybrid homomorphic encryption scheme,” IEEE Trans. Control Systems Technology, vol. 29, no. 4, pp. 1704–1720, 2021. doi: 10.1109/TCST.2020.3019501
|
| [11] |
K. Reif, S. Gunther, E. Yaz, and R. Unbehauen, “Stochastic stability of the discrete-time extended kalman filter,” IEEE Trans. Autom. control, vol. 44, no. 4, pp. 714–728, 1999. doi: 10.1109/9.754809
|