Articles with "deception attacks" as a keyword



Photo from wikipedia

Static output feedback control for discrete‐time hidden Markov jump systems against deception attacks

Sign Up to like & get
recommendations!
Published in 2019 at "International Journal of Robust and Nonlinear Control"

DOI: 10.1002/rnc.4737

Abstract: This paper investigates the static output feedback control problem for Markov jump systems subject to asynchronous mode information and deception attacks. A hidden Markov model is employed to observe the unmeasurable system mode. In this… read more here.

Keywords: static output; deception attacks; markov; output feedback ... See more keywords
Photo by jontyson from unsplash

Quantized control for switched systems suffered by deception attacks and unknown disturbance

Sign Up to like & get
recommendations!
Published in 2023 at "International Journal of Robust and Nonlinear Control"

DOI: 10.1002/rnc.6702

Abstract: The purpose of this paper is designing a feedback controller based on quantized sampled data to stabilize a continuous‐time switched system affected by unknown disturbance and deception attacks. Suppose that the switch is slow enough… read more here.

Keywords: time; control; unknown disturbance; deception ... See more keywords
Photo from wikipedia

Event-based asynchronous and resilient filtering for Markov jump singularly perturbed systems against deception attacks.

Sign Up to like & get
recommendations!
Published in 2020 at "ISA transactions"

DOI: 10.1016/j.isatra.2020.11.029

Abstract: The dynamic event-based asynchronous and resilient dissipative filter design for Markov jump singularly perturbed systems (MJSPSs) against stochastic deception attacks is discussed in this paper. Firstly, a novel dynamic event-based transmission protocol is provided to… read more here.

Keywords: event based; based asynchronous; asynchronous resilient; deception attacks ... See more keywords
Photo from wikipedia

Fusion estimation in clustering sensor networks under stochastic deception attacks

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Systems Science"

DOI: 10.1080/00207721.2018.1496301

Abstract: ABSTRACT In this paper, a fusion estimation problem in clustering sensor networks under stochastic deception attacks is investigated. The sensors are divided into several clusters, and a local estimator is embedded in each cluster. During… read more here.

Keywords: estimation; fusion estimation; clustering sensor; deception attacks ... See more keywords
Photo from wikipedia

Finite-time memory fault detection filter design for nonlinear discrete systems with deception attacks

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Systems Science"

DOI: 10.1080/00207721.2020.1765219

Abstract: ABSTRACT In this paper, the finite-time memory fault detection filter (MFDF) is designed for nonlinear discrete systems with randomly occurring deception attacks, where the phenomenon of the randomly occurring deception attacks is characterised by a… read more here.

Keywords: fault detection; detection; detection filter; deception attacks ... See more keywords
Photo from wikipedia

The safety region-based model predictive control for discrete-time systems under deception attacks

Sign Up to like & get
recommendations!
Published in 2021 at "International Journal of Systems Science"

DOI: 10.1080/00207721.2021.1879965

Abstract: In this paper, a resilient control problem is investigated for the discrete-time linear system subjected to both input constraint and additive disturbances. In addition, deception attacks are also taken into consideration which could compromise the… read more here.

Keywords: control; safety region; discrete time; deception attacks ... See more keywords
Photo from wikipedia

Observer-based non-fragile H ∞-consensus control for multi-agent systems under deception attacks

Sign Up to like & get
recommendations!
Published in 2021 at "International Journal of Systems Science"

DOI: 10.1080/00207721.2021.1884917

Abstract: This paper addresses the non-fragile -consensus control problem for multi-agent systems subject to deception attacks and missing measurements based on the designed observers. First of all, a sequence of Bernoulli distributed stochastic variables is applied… read more here.

Keywords: agent; fragile consensus; non fragile; multi agent ... See more keywords
Photo by aronvisuals from unsplash

Finite-Time Consensus-Based Clock Synchronization Under Deception Attacks

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3002577

Abstract: This paper concentrates on the finite-time clock synchronization problem for wireless sensor networks (WSNs) under deception attacks. Compared with adding additional communication links to a network, we introduce a new mechanism termed as “trusted link”… read more here.

Keywords: finite time; deception attacks; clock synchronization; time ... See more keywords
Photo from wikipedia

Adaptive neural security control for networked singular systems under deception attacks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3161672

Abstract: This paper studies the issue of the adaptive neural security controller design for uncertain networked singular systems in the presence of deception attacks. Considering that the attack signal is unknown, the neural networks technique is… read more here.

Keywords: neural security; singular systems; networked singular; adaptive neural ... See more keywords
Photo from wikipedia

Design of Stealthy Deception Attacks With Partial System Knowledge

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Automatic Control"

DOI: 10.1109/tac.2022.3146079

Abstract: This article investigates the design of stealthy deception attacks with the aim of destroying the estimate performance without knowing the filter gain. The residual used to detect attacks is generated by the parity space approach… read more here.

Keywords: stealthy deception; design stealthy; design; attack ... See more keywords
Photo from wikipedia

Secure Consensus of Multiagent Systems via Impulsive Control Subject to Deception Attacks

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Circuits and Systems II: Express Briefs"

DOI: 10.1109/tcsii.2022.3196042

Abstract: This brief studies the secure consensus problem of multiagent systems (MASs) via impulsive control under deception attacks. In most existing work, deception attackers are assumed to attack the agents rather than the communication channels, and… read more here.

Keywords: via impulsive; consensus; secure consensus; deception ... See more keywords