• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4696821)   Today's Articles (5042)
For: Li F, Tang Y. False Data Injection Attack for Cyber-Physical Systems With Resource Constraint. IEEE Trans Cybern 2020;50:729-738. [PMID: 30307888 DOI: 10.1109/tcyb.2018.2871951] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
Number Cited by Other Article(s)
1
Wang L, Wu ZG. Shifting Attack Stabilization and Estimation of Hidden Markov Boolean Networks. IEEE TRANSACTIONS ON CYBERNETICS 2025;55:1930-1940. [PMID: 40031814 DOI: 10.1109/tcyb.2025.3535929] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 03/05/2025]
2
Xu N, Xu H, Lin Z, Zhang J. Extended state observer-based backstepping control for nonlinear systems under FDI attacks. ISA TRANSACTIONS 2025;159:80-91. [PMID: 39971679 DOI: 10.1016/j.isatra.2025.02.007] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/12/2024] [Revised: 02/07/2025] [Accepted: 02/07/2025] [Indexed: 02/21/2025]
3
Tian J, Wang B, Wang Z, Cao K, Li J, Ozay M. Joint Adversarial Example and False Data Injection Attacks for State Estimation in Power Systems. IEEE TRANSACTIONS ON CYBERNETICS 2022;52:13699-13713. [PMID: 34797772 DOI: 10.1109/tcyb.2021.3125345] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
4
Guo H, Sun J, Pang ZH. Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems. ISA TRANSACTIONS 2022;127:32-40. [PMID: 35292173 DOI: 10.1016/j.isatra.2022.02.045] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/30/2021] [Revised: 02/16/2022] [Accepted: 02/24/2022] [Indexed: 06/14/2023]
5
Zhao Z, Huang Y, Zhen Z, Li Y. Data-Driven False Data-Injection Attack Design and Detection in Cyber-Physical Systems. IEEE TRANSACTIONS ON CYBERNETICS 2021;51:6179-6187. [PMID: 32086230 DOI: 10.1109/tcyb.2020.2969320] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
6
Zhou Y, Vamvoudakis KG, Haddad WM, Jiang ZP. A Secure Control Learning Framework for Cyber-Physical Systems Under Sensor and Actuator Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2021;51:4648-4660. [PMID: 32735543 DOI: 10.1109/tcyb.2020.3006871] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
7
Gao S, Zhang H, Wang Z, Huang C. A Class of Optimal Switching Mixed Data Injection Attack in Cyber-Physical Systems. IEEE Robot Autom Lett 2021. [DOI: 10.1109/lra.2021.3056340] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
8
Li YG, Yang GH. Optimal stealthy switching location attacks against remote estimation in cyber-physical systems. Neurocomputing 2021. [DOI: 10.1016/j.neucom.2020.08.007] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
9
Abreu Maranhão JP, Carvalho Lustosa da Costa JP, Pignaton de Freitas E, Javidi E, Timóteo de Sousa Júnior R. Error-Robust Distributed Denial of Service Attack Detection Based on an Average Common Feature Extraction Technique. SENSORS 2020;20:s20205845. [PMID: 33081079 PMCID: PMC7602739 DOI: 10.3390/s20205845] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/27/2020] [Revised: 09/10/2020] [Accepted: 09/18/2020] [Indexed: 11/18/2022]
10
Zhang Q, Liu K, Xia Y, Ma A. Optimal Stealthy Deception Attack Against Cyber-Physical Systems. IEEE TRANSACTIONS ON CYBERNETICS 2020;50:3963-3972. [PMID: 31071059 DOI: 10.1109/tcyb.2019.2912622] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/09/2023]
11
Zhang TY, Ye D. Distributed Secure Control Against Denial-of-Service Attacks in Cyber-Physical Systems Based on K-Connected Communication Topology. IEEE TRANSACTIONS ON CYBERNETICS 2020;50:3094-3103. [PMID: 32142466 DOI: 10.1109/tcyb.2020.2973303] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA