[1]
|
Wu Wei-Qiang, Song Chun-Yue, Zhao Jun, Xu Zu-Hua. Physicsinformed gated recurrent graph attention unit network for anomaly detection in industrial cyber-physical systems. Information Sciences, 2023, 629: 618−633 doi: 10.1016/j.ins.2023.01.136
|
[2]
|
Muhammad N N, Neetesh S, Alvaro C, Santiago G, Pete B. Smart grid cyber-physical situational awareness of complex operational technology attacks: A review. ACM Computing Surveys, 2023, 55(10): 1−36
|
[3]
|
LMarwa O, Fahd N A, Rana A, Majdi K, Mohammed A, Mohamed I A, et al. Artificial intelligence for traffic prediction and estimation in intelligent cyber-physical transportation systems. IEEE Transactions on Consumer Electronics, 2024, 70(1): 1706−1715 doi: 10.1109/TCE.2023.3320513
|
[4]
|
李洪阳, 魏慕恒, 黄洁, 邱伯华, 赵晔, 骆文, 等. 信息物理系统技术综述. 自动化学报, 2019, 45(1): 37−50Li Hong-Yang, Wei Mu-Heng, Huang Jie, Qiu Bo-Hua, Zhao Ye, Luo Wen-Cheng, et. al. Survey on Cyber-physical Systems. Acta Automatica Sinica, 2019, 45(1): 37−50
|
[5]
|
Liu Wei, Zhao Feng, Shankar A, Maple C, Peter J D, Kim B G, et al. Explainable ai for medical image analysis in medical cyber-physical systems: Enhancing transparency and trustworthiness of iomt. IEEE Journal of Biomedical and Health Informatics, 20231−12
|
[6]
|
Mouhyemen K, Karel H, Amr M, Khaled A H, Mohammad M H. Mobile target coverage and tracking on drone-be-gone uav cyber-physical testbed. IEEE Systems Journal, 2017, 12(4): 3485−3496
|
[7]
|
杨光红, 芦安洋, 安立伟. 网络攻击下的信息物理系统安全状态估计研究综述. 控制与决策, 2023, 38(8): 2093−2105Yang Guang-Hong, Lu An-Yang, An Li-Wei. A survey on secure state estimation of cyber-physical systems under cyber attacks. Control and Decision, 2023, 38(8): 2093−2105
|
[8]
|
Ding Ke-Mi, Li Yu-Zhe, Daniel E Q, Subhrakanti D, Shi Ling. A multi-channel transmission schedule for remote state estimation under dos attacks. Automatica, 2017, 78: 194−201 doi: 10.1016/j.automatica.2016.12.020
|
[9]
|
Qin Jia-Hu, Li Meng-Lin, Shi Ling, Yu Xing-Huo. Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE Transactions on Automatic Control, 2017, 63(6): 1648−1663
|
[10]
|
Li Yao, Zhu Shan-Ying, Chen Cai-Lian, Guan Xin-Ping. Optimal denial-of-service attack strategy on state estimation over infinite-time horizon. IEEE Transactions on Circuits and Systems Ⅱ: Express Briefs, 2021, 68(8): 2860−2864 doi: 10.1109/TCSII.2021.3057134
|
[11]
|
Ye Dan, Song Yun-Bo. Optimal periodic dos attack with energy harvester in cyber-physical systems. Neurocomputing, 2020, 390: 69−77 doi: 10.1016/j.neucom.2020.01.075
|
[12]
|
Guo Hai-Bin, Sun Jian, Pang Zhong-Hua, Liu Guo-Ping. Event-based optimal stealthy false data-injection attacks against remote state estimation systems. IEEE Transactions on Cybernetics, 2023, 53(10): 6714−6724 doi: 10.1109/TCYB.2023.3255583
|
[13]
|
张淇瑞, 孟思琪, 王兰豪, 刘坤, 代伟. 隐蔽攻击下信息物理系统的安全输出反馈控制. 自动化学报, 2024, 50(7): 1001−1010Zhang Qi-Rui, Meng Si-Qi, Wang Lan-Hao, Liu Kun, Dai Wei. Secure output-feedback control for cyber-physical systems under stealthy attacks. Acta Automatica Sinica, 2024, 50(7): 1001−1010
|
[14]
|
应晨铎, 伍益明, 徐明, 郑宁, 何熊熊. 欺骗攻击下具备隐私保护的多智能体系统均值趋同控制. 自动化学报, 2023, 49(2): 425−436Ying Chen-Duo, Wu Yi-Ming, Xu Ming, Zheng Ning, He Xiong-Xiong. Privacy-preserving average consensus control formultiagent systems under deception attacks. Acta Automatica Sinica, 2023, 49(2): 425−436
|
[15]
|
Ye Dan, Zhang Tian-Yu. Summation detector for false data injection attack in cyber-physical systems. IEEE Transactions on Cybernetics, 2020, 50(6): 2338−2345 doi: 10.1109/TCYB.2019.2915124
|
[16]
|
Mo Yi-Lin, Bruno S. On the performance degradation of cyber-physical systems under stealthy integrity attacks. IEEE Transactions on Automatic Control, 2016, 61(9): 2618−2624 doi: 10.1109/TAC.2015.2498708
|
[17]
|
Guo Zi-Yang, Shi Da-Wei, Karl H J, Shi Ling. Optimal linear cyber-attack on remote state estimation. IEEE Transactions on Control of Network Systems, 2016, 4(1): 4−13
|
[18]
|
Guo Zi-Yang, Shi Da-Wwei, Karl H J, Shi Ling. Worst-case stealthy innovation-based linear attack on remote state estimation. Automatica, 2018, 89: 117−124 doi: 10.1016/j.automatica.2017.11.018
|
[19]
|
Rijha S, Syed A P, Syed T A. False data injection attacks on networked control systems. Journal of Control and Decision, 20231−10
|
[20]
|
Li Yi-Gang, Yang Guang-Hong. Worst-case ϵ-stealthy false data injection attacks in cyber-physical systems. Information Sciences, 2020, 515: 352−364 doi: 10.1016/j.ins.2019.12.029
|
[21]
|
Andrew C B. The accuracy of the gaussian approximation to the sum of independent variates. Transactions of the American Mathematical Society, 1941, 49(1): 122−136 doi: 10.1090/S0002-9947-1941-0003498-3
|
[22]
|
Shang Jun, Chen Tong-Wen. Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of historical data. Automatica, 2021, 128: 109555 doi: 10.1016/j.automatica.2021.109555
|
[23]
|
Anderson B D, Moore J B. Optimal filtering. Courier Corporation, 2005
|
[24]
|
Pang Zhong-Hua, Fu Yuan, Guo Hai-Bin, Sun Jian. Analysis of stealthy false data injection attacks against networked control systems: Three case studies. Journal of Systems Science and Complexity, 2023, 36(4): 1407−1422 doi: 10.1007/s11424-022-2120-6
|