共 16 条
[1]
Wang Q., Tai W., Tang Y., Et al., A review on false data injection attack toward cyber-physical power system, Acta Automatica Sinica, 45, 1, pp. 72-83, (2019)
[2]
Ren X.Q., Wu J.F., Dey S., Et al., Attack allocation on remote state estimation in multi-systems: Structural results and asymptotic solution, Automatica, 87, pp. 184-194, (2018)
[3]
Li L., Zhang H.X., Xia Y.Q., Et al., Security estimation under denial-of-service attack with energy constraint, Neurocomputing, 292, pp. 111-120, (2018)
[4]
Ding K.M., Li Y.Z., Quevedo D.E., Et al., A multi-channel transmission schedule for remote state estimation under DoS attacks, Automatica, 78, pp. 194-201, (2017)
[5]
Chang Y.H., Hu Q., Tomlin C.J., Secure estimation based Kalman Filter for cyber-physical systems against sensor attacks, Automatica, 95, pp. 399-412, (2018)
[6]
Peng D.T., Dong J.M., Cai Z.M., Et al., On the stability of cyber-physical systems under false data injection attacks, Acta Automatica Sinica, 45, 1, pp. 196-205, (2019)
[7]
Ao W., Song Y.D., Wen C.Y., Distributed secure state estimation and control for CPSs under sensor attacks: A finite time approach, Acta Automatica Sinica, 45, 1, pp. 174-184, (2019)
[8]
Guo Z.Y., Shi D.W., Johansson K.H., Et al., Worst-case stealthy innovation-based linear attack on remote state estimation, Automatica, 89, pp. 117-124, (2018)
[9]
Anderson B.D.O., Moore J.B., Eslami M., Optimal filtering, IEEE Transactions on Systems, Man, and Cybernetics, 12, 2, pp. 235-236, (1982)
[10]
Hu L., Wang Z.D., Han Q.L., Et al., State estimation under false data injection attacks: Security analysis and system protection, Automatica, 87, pp. 176-183, (2018)