SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Shi Ling) srt2:(2015-2019)"

Sökning: WFRF:(Shi Ling) > (2015-2019)

  • Resultat 1-10 av 75
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  • 2019
  • Tidskriftsartikel (refereegranskat)
  •  
3.
  •  
4.
  •  
5.
  •  
6.
  • 2017
  • swepub:Mat__t
  •  
7.
  • Guo, Ziyang, et al. (författare)
  • Optimal Linear Cyber-Attack on Remote State Estimation
  • 2017
  • Ingår i: IEEE Transactions on Control of Network Systems. - : IEEE Press. - 2325-5870. ; 4:1, s. 4-13
  • Tidskriftsartikel (refereegranskat)abstract
    • Recent years have witnessed the surge of interest of security issues in cyber-physical systems. In this paper, we consider malicious cyber attacks in a remote state estimation application where a smart sensor node transmits data to a remote estimator equipped with a false data detector. It is assumed that all the sensor data can be observed and modified by the malicious attacker and a residue-based detection algorithm is used at the remote side to detect data anomalies. We propose a linear deception attack strategy and present the corresponding feasibility constraint which guarantees that the attacker is able to successfully inject false data without being detected. The evolution of the estimation error covariance at the remote estimator is derived and the degradation of system performance under the proposed linear attack policy is analyzed. Furthermore, we obtain a closed-form expression of the optimal attack strategy among all linear attacks. Comparison of attack strategies through simulated examples are provided to illustrate the theoretical results.
  •  
8.
  • Guo, Ziyang, et al. (författare)
  • Worst-case Analysis of Innovation-based Linear Attack on Remote State Estimation with Resource Constraint
  • 2016
  • Ingår i: 2016 IEEE 55th Conference on Decision and Control, CDC 2016. - : Institute of Electrical and Electronics Engineers (IEEE). - 9781509018376 ; , s. 6303-6308
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, a security problem in remote estimation scenario is studied. We consider a multi-sensor system where each sensor transmits its local innovation to a remote estimator through a wireless communication network. A centralized residue-based detection criterion is adopted to monitor system anomalies. We propose a linear attack strategy and present the corresponding feasibility constraints to guarantee stealthiness. For a resource-limited attacker, who is able to listen to all the channels while only launches an attack on one sensor at each time instant, we investigate which sensor should be attacked and what strategy should be used such that the remote estimation error covariance is maximized A closed-form expression of the optimal linear attack strategy is obtained. Simulation examples are provided to illustrate the theoretical results.
  •  
9.
  • Guo, Ziyang, et al. (författare)
  • Worst-Case Innovation-Based Integrity Attacks With Side Information on mote State Estimation
  • 2019
  • Ingår i: IEEE Transactions on Control of Network Systems. - : Institute of Electrical and Electronics Engineers (IEEE). - 2325-5870. ; 6:1, s. 48-59
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we study the worst-case consequence of innovation-based tegrity attacks with side information in a remote state estimation enario where a sensor transmits its measurement to a remote estimator uipped with a false-data detector. If a malicious attacker is not only le to compromise the transmitted data packet but also able to measure e system state itself, the attack strategy can be designed based on e intercepted data, the sensing data, or alternatively the combined formation. Surprisingly, we show that launching attacks using the mbined information are not always optimal. First, we characterize the ealthiness constraints for different types of attack strategies to oid being noticed by the false-data detector. Then, we derive the olution of the remote estimation error covariance in the presence of tacks, based on which the worst-case attack policies are obtained by lving convex optimization problems. Furthermore, the closed-form pressions of the worst-case attacks are obtained for scalar systems d the attack consequences are compared with the existing work to termine which strategy is more critical in deteriorating system rformance. Simulation examples are provided to illustrate the alytical results.
  •  
10.
  • Ren, Xiaoqiang, et al. (författare)
  • Infinite Horizon Optimal Transmission Power Control for Remote State Estimation Over Fading Channels
  • 2018
  • Ingår i: IEEE Transactions on Automatic Control. - : Institute of Electrical and Electronics Engineers (IEEE). - 0018-9286 .- 1558-2523. ; 63:1, s. 85-100
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper studies the joint design over an infinite horizon of the transmission power controller and remote estimator for state estimation over fading channels. A sensor observes a dynamic process and sends its observations to a remote estimator over a wireless fading channel characterized by a time-homogeneous Markov chain. The successful transmission probability depends on both the channel gains and the transmission power used by the sensor. The transmission power control rule and the remote estimator should be jointly designed, aiming to minimize an infinite-horizon cost consisting of the power usage and the remote estimation error. We formulate the joint optimization problem as an average cost belief-state Markov decision process and prove that there exists an optimal deterministic and stationary policy. We then show that when the monitored dynamic process is scalar or the system matrix is orthogonal, the optimal remote estimates depend only on the most recently received sensor observation, and the optimal transmission power is symmetric and monotonically increasing with respect to the norm of the innovation error.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 75
Typ av publikation
tidskriftsartikel (66)
konferensbidrag (7)
Typ av innehåll
refereegranskat (73)
Författare/redaktör
Zhang, J. (38)
Wang, Z. (38)
Xu, L. (37)
Wang, D. (37)
Zhang, L. (36)
Liu, Q. (36)
visa fler...
Pan, Y. (36)
Yang, L. (36)
Liu, D. (35)
Zhang, Y. (35)
Wu, Z. (35)
Wang, M. (35)
Fang, Y. (34)
Jin, S. (34)
Liu, B. (34)
Liu, J. B. (34)
Ouyang, Q. (34)
Wang, K. (34)
Zhou, L. (34)
Gao, Y. (34)
Ma, L. L. (34)
Lu, Y (34)
Zhao, Q (34)
Ban, Y. (34)
Liu, X (33)
Cetin, S. A. (33)
Peters, K. (33)
Zhemchugov, A. (33)
Qi, M. (33)
Sun, X. H. (33)
Zeng, Y. (33)
Hu, Y. (33)
Cai, X. (33)
Ferroli, R. Baldini (33)
Li, G. (33)
Zhu, Y. C. (33)
Boyko, I. (33)
Dedovich, D. (33)
Han, S. (33)
..., Wiedner U. (33)
Hussain, T. (33)
Li, H. B. (33)
Ablikim, M. (33)
Johansson, Tord (33)
Zou, J. H. (33)
Albrecht, M. (33)
An, F. F. (33)
An, Q. (33)
Bennett, D. W. (33)
Bennett, J. V. (33)
visa färre...
Lärosäte
Uppsala universitet (49)
Kungliga Tekniska Högskolan (14)
Karolinska Institutet (12)
Lunds universitet (8)
Umeå universitet (5)
Chalmers tekniska högskola (5)
visa fler...
Högskolan Dalarna (5)
Stockholms universitet (3)
Linköpings universitet (2)
Göteborgs universitet (1)
Luleå tekniska universitet (1)
Högskolan i Halmstad (1)
Södertörns högskola (1)
Linnéuniversitetet (1)
Sveriges Lantbruksuniversitet (1)
visa färre...
Språk
Engelska (75)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (43)
Teknik (19)
Medicin och hälsovetenskap (11)
Samhällsvetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy