Sign Up to like & get
recommendations!
0
Published in 2017 at "Iet Control Theory and Applications"
DOI: 10.1049/iet-cta.2017.0561
Abstract: Almost all of the available literature on secure state estimation focus on sensor attacks. Unlike the existing results, this study investigates the attack-resilient state estimation problem for continuous-time linear systems with sparse actuator attacks and…
read more here.
Keywords:
estimation;
estimation cyber;
secure estimation;
state estimation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Circuits and Systems I: Regular Papers"
DOI: 10.1109/tcsi.2022.3187725
Abstract: This paper is concerned with the secure estimation problem for the state of charge of Lithium-ion batteries subject to malicious attacks during the data transmission from sensors to cloud-based battery management system terminal. First, the…
read more here.
Keywords:
ion batteries;
lithium ion;
estimation;
secure estimation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE transactions on cybernetics"
DOI: 10.1109/tcyb.2022.3151234
Abstract: In this article, we focus on the state estimation problems for a system with protecting user privacy. Regarding whether the user has conducted a sensitive action in the system as a kind of privacy, we…
read more here.
Keywords:
estimation privacy;
privacy;
privacy protection;
estimation ... See more keywords