共 19 条
[1]
An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System
[J].
IEEE ACCESS,
2020, 8
:83965-83973
[2]
Barker E., 2019, Recommendation for Key Management: Part 2Best Practices for Key Management Organizations
[3]
CSIRO's Data61, 2013, Python paillier library
[5]
Encrypted MPC based on ADMM real-time iterations
[J].
IFAC PAPERSONLINE,
2020, 53 (02)
:3508-3514
[6]
Encrypted cloud-based MPC for linear systems with input constraints
[J].
IFAC PAPERSONLINE,
2018, 51 (20)
:535-542
[7]
Towards Encrypted MPC for Linear Constrained Systems
[J].
IEEE CONTROL SYSTEMS LETTERS,
2018, 2 (02)
:195-200