共 34 条
[1]
Agarwal GK, 2018, IEEE DECIS CONTR P, P1476, DOI 10.1109/CDC.2018.8619457
[2]
Alpcan T., 2010, NETWORK SECURITY, DOI DOI 10.1017/CBO97805117607782-S2.0-84924666047
[3]
Secure Route Planning Using Dynamic Games with Stopping States
[J].
2020 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS (IROS),
2020,
:2404-2409
[5]
Secure Navigation of Robots in Adversarial Environments
[J].
IEEE CONTROL SYSTEMS LETTERS,
2020, 4 (01)
:1-6
[6]
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:2267-2281
[7]
Cormen T. H., 2009, Introduction To Algorithms, V3rd
[8]
Dahan M, 2015, ANN ALLERTON CONF, P353, DOI 10.1109/ALLERTON.2015.7447026
[9]
Hespanha, 2017, NONCOOPERATIVE GAME
[10]
Output-feedback Linear Quadratic Robust Control under Actuation and Deception Attacks
[J].
2019 AMERICAN CONTROL CONFERENCE (ACC),
2019,
:489-496