Articles with "malicious attacks" as a keyword



Photo from wikipedia

Secure Estimation Against Malicious Attacks for Lithium-Ion Batteries Under Cloud Environments

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Circuits and Systems I: Regular Papers"

DOI: 10.1109/tcsi.2022.3187725

Abstract: This paper is concerned with the secure estimation problem for the state of charge of Lithium-ion batteries subject to malicious attacks during the data transmission from sensors to cloud-based battery management system terminal. First, the… read more here.

Keywords: ion batteries; lithium ion; estimation; secure estimation ... See more keywords
Photo from wikipedia

Event-Triggered Adaptive Formation Keeping and Interception Scheme for Autonomous Surface Vehicles Under Malicious Attacks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2021.3111219

Abstract: In leader-following formation, the leader plays a central role and is more vulnerable to malicious attacks. To effectively protect the leader, this article investigates an event-based formation control problem of autonomous surface vehicles (ASVs) with… read more here.

Keywords: event; autonomous surface; scheme; formation keeping ... See more keywords
Photo from wikipedia

Game-Theoretic Switching Detection of Malicious Attacks in Switched Systems

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Network Science and Engineering"

DOI: 10.1109/tnse.2022.3225146

Abstract: This paper is concerned with the detection of malicious attacks during the operation of switched systems. A novel game-theoretic switching detection scheme is proposed where the switching between subsystems is constructed aiming to reveal the… read more here.

Keywords: switched systems; game theoretic; detection malicious; detection ... See more keywords