Articles with "secure estimation" as a keyword



Photo from wikipedia

Secure estimation for cyber-physical systems under adversarial actuator attacks

Sign Up to like & get
recommendations!
Published in 2017 at "Iet Control Theory and Applications"

DOI: 10.1049/iet-cta.2017.0561

Abstract: Almost all of the available literature on secure state estimation focus on sensor attacks. Unlike the existing results, this study investigates the attack-resilient state estimation problem for continuous-time linear systems with sparse actuator attacks and… read more here.

Keywords: estimation; estimation cyber; secure estimation; state estimation ... See more keywords
Photo from wikipedia

Secure Estimation Against Malicious Attacks for Lithium-Ion Batteries Under Cloud Environments

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Circuits and Systems I: Regular Papers"

DOI: 10.1109/tcsi.2022.3187725

Abstract: This paper is concerned with the secure estimation problem for the state of charge of Lithium-ion batteries subject to malicious attacks during the data transmission from sensors to cloud-based battery management system terminal. First, the… read more here.

Keywords: ion batteries; lithium ion; estimation; secure estimation ... See more keywords
Photo by dtopkin1 from unsplash

Secure Estimation With Privacy Protection.

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE transactions on cybernetics"

DOI: 10.1109/tcyb.2022.3151234

Abstract: In this article, we focus on the state estimation problems for a system with protecting user privacy. Regarding whether the user has conducted a sensitive action in the system as a kind of privacy, we… read more here.

Keywords: estimation privacy; privacy; privacy protection; estimation ... See more keywords