• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4643497)   Today's Articles (6101)   Subscriber (50549)
For: Gu Y, Yu X, Guo K, Qiao J, Guo L. Detection, estimation, and compensation of false data injection attack for UAVs. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.08.055] [Citation(s) in RCA: 11] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
Number Cited by Other Article(s)
1
Hu J, Yang X, Yang LX. A Framework for Detecting False Data Injection Attacks in Large-Scale Wireless Sensor Networks. SENSORS (BASEL, SWITZERLAND) 2024;24:1643. [PMID: 38475179 DOI: 10.3390/s24051643] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/10/2024] [Revised: 02/25/2024] [Accepted: 02/29/2024] [Indexed: 03/14/2024]
2
Liu H. Trajectory tracking control for a quadrotor helicopter in the presence of cyber attacks. ISA TRANSACTIONS 2023:S0019-0578(23)00452-4. [PMID: 37813782 DOI: 10.1016/j.isatra.2023.09.034] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/01/2023] [Revised: 09/09/2023] [Accepted: 09/29/2023] [Indexed: 10/11/2023]
3
Li Z, Xu H, Lin Z, Dong L, Chen Y. Event-triggered robust distributed output feedback model predictive control for nonlinear MASs against false data injection attacks. ISA TRANSACTIONS 2023;141:197-211. [PMID: 37481438 DOI: 10.1016/j.isatra.2023.06.039] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/08/2023] [Revised: 06/18/2023] [Accepted: 06/30/2023] [Indexed: 07/24/2023]
4
Liu X, Yang GH. Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: A Stackelberg game approach. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.08.025] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
5
Li S, Chen M, Wang Y, Wu Q. A fast algorithm to solve large-scale matrix games based on dimensionality reduction and its application in multiple unmanned combat air vehicles attack-defense decision-making. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.02.025] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
6
Li YG, Yang GH. Optimal completely stealthy attacks against remote estimation in cyber-physical systems. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.01.014] [Citation(s) in RCA: 8] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
7
Dong L, Xu H, Wei X, Hu X. Security correction control of stochastic cyber-physical systems subject to false data injection attacks with heterogeneous effects. ISA TRANSACTIONS 2022;123:1-13. [PMID: 34092392 DOI: 10.1016/j.isatra.2021.05.015] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/19/2020] [Revised: 05/04/2021] [Accepted: 05/12/2021] [Indexed: 06/12/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA