Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "International Journal of Robust and Nonlinear Control"
DOI: 10.1002/rnc.4737
Abstract: This paper investigates the static output feedback control problem for Markov jump systems subject to asynchronous mode information and deception attacks. A hidden Markov model is employed to observe the unmeasurable system mode. In this…
read more here.
Keywords:
static output;
deception attacks;
markov;
output feedback ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "International Journal of Robust and Nonlinear Control"
DOI: 10.1002/rnc.6702
Abstract: The purpose of this paper is designing a feedback controller based on quantized sampled data to stabilize a continuous‐time switched system affected by unknown disturbance and deception attacks. Suppose that the switch is slow enough…
read more here.
Keywords:
time;
control;
unknown disturbance;
deception ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "ISA transactions"
DOI: 10.1016/j.isatra.2020.11.029
Abstract: The dynamic event-based asynchronous and resilient dissipative filter design for Markov jump singularly perturbed systems (MJSPSs) against stochastic deception attacks is discussed in this paper. Firstly, a novel dynamic event-based transmission protocol is provided to…
read more here.
Keywords:
event based;
based asynchronous;
asynchronous resilient;
deception attacks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "International Journal of Systems Science"
DOI: 10.1080/00207721.2018.1496301
Abstract: ABSTRACT In this paper, a fusion estimation problem in clustering sensor networks under stochastic deception attacks is investigated. The sensors are divided into several clusters, and a local estimator is embedded in each cluster. During…
read more here.
Keywords:
estimation;
fusion estimation;
clustering sensor;
deception attacks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "International Journal of Systems Science"
DOI: 10.1080/00207721.2020.1765219
Abstract: ABSTRACT In this paper, the finite-time memory fault detection filter (MFDF) is designed for nonlinear discrete systems with randomly occurring deception attacks, where the phenomenon of the randomly occurring deception attacks is characterised by a…
read more here.
Keywords:
fault detection;
detection;
detection filter;
deception attacks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "International Journal of Systems Science"
DOI: 10.1080/00207721.2021.1879965
Abstract: In this paper, a resilient control problem is investigated for the discrete-time linear system subjected to both input constraint and additive disturbances. In addition, deception attacks are also taken into consideration which could compromise the…
read more here.
Keywords:
control;
safety region;
discrete time;
deception attacks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "International Journal of Systems Science"
DOI: 10.1080/00207721.2021.1884917
Abstract: This paper addresses the non-fragile -consensus control problem for multi-agent systems subject to deception attacks and missing measurements based on the designed observers. First of all, a sequence of Bernoulli distributed stochastic variables is applied…
read more here.
Keywords:
agent;
fragile consensus;
non fragile;
multi agent ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3002577
Abstract: This paper concentrates on the finite-time clock synchronization problem for wireless sensor networks (WSNs) under deception attacks. Compared with adding additional communication links to a network, we introduce a new mechanism termed as “trusted link”…
read more here.
Keywords:
finite time;
deception attacks;
clock synchronization;
time ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3161672
Abstract: This paper studies the issue of the adaptive neural security controller design for uncertain networked singular systems in the presence of deception attacks. Considering that the attack signal is unknown, the neural networks technique is…
read more here.
Keywords:
neural security;
singular systems;
networked singular;
adaptive neural ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Transactions on Automatic Control"
DOI: 10.1109/tac.2022.3146079
Abstract: This article investigates the design of stealthy deception attacks with the aim of destroying the estimate performance without knowing the filter gain. The residual used to detect attacks is generated by the parity space approach…
read more here.
Keywords:
stealthy deception;
design stealthy;
design;
attack ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Transactions on Circuits and Systems II: Express Briefs"
DOI: 10.1109/tcsii.2022.3196042
Abstract: This brief studies the secure consensus problem of multiagent systems (MASs) via impulsive control under deception attacks. In most existing work, deception attackers are assumed to attack the agents rather than the communication channels, and…
read more here.
Keywords:
via impulsive;
consensus;
secure consensus;
deception ... See more keywords