共 46 条
[2]
Dual-Rate Control Framework With Safe Watermarking Against Deception Attacks
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS,
2022, 52 (12)
:7494-7506
[3]
Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
[J].
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS,
2018, 5 (03)
:1157-1168
[4]
Chow Y, 2018, ADV NEUR IN, V31
[7]
Data-Driven Injection Attack Strategy for Linear Cyber-Physical Systems: An Input-Output Data-Based Approach
[J].
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING,
2023, 10 (06)
:4082-4095
[10]
Haarnoja T, 2018, PR MACH LEARN RES, V80