A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Volume 10 Issue 1
Jan.  2023

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 7.847, Top 10% (SCI Q1)
    CiteScore: 13.0, Top 5% (Q1)
    Google Scholar h5-index: 64, TOP 7
Turn off MathJax
Article Contents
S. Gao, H. Zhang, Z. P. Wang, C. Huang, and H. C. Yan, “Optimal injection attack for UCPS under vertical depth-keeping task via game approach,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 1, pp. 287–289, Jan. 2023. doi: 10.1109/JAS.2023.123048
Citation: S. Gao, H. Zhang, Z. P. Wang, C. Huang, and H. C. Yan, “Optimal injection attack for UCPS under vertical depth-keeping task via game approach,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 1, pp. 287–289, Jan. 2023. doi: 10.1109/JAS.2023.123048

Optimal Injection Attack for UCPS Under Vertical Depth-Keeping Task Via Game Approach

doi: 10.1109/JAS.2023.123048
More Information
  • loading
  • [1]
    T. T. J. Prestero, “Verification of a six-degree of freedom simulation model for the remus autonomous underwater vehicle,” Ph.D. dissertation, MIT, Massachusetts, USA, 2001.
    [2]
    G. N. Roberts and R. Sutton, Advances in Unmanned Marine Vehicles. LET Contr. Eng. Series, 2006.
    [3]
    D. Zhang, G. Feng, Y. Shi, and D. Srinivasan, “Physical safety and cyber security analysis of multi-agent systems: A survey of recent advances,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 2, pp. 319–333, 2021. doi: 10.1109/JAS.2021.1003820
    [4]
    G. Wu, J. Sun, and J. Chen, “Optimal data injection attacks in cyber-physical systems,” IEEE Trans. Cybern., vol. 48, no. 12, pp. 3302–3312, 2018. doi: 10.1109/TCYB.2018.2846365
    [5]
    G. Wu, G. Wang, J. Sun, and L. Xiong, “Optimal switching attacks and countermeasures in cyber-physical systems,” IEEE Trans. Syst.,Man and Cybern.: Syst., vol. 51, no. 8, pp. 4825–4835, 2021. doi: 10.1109/TSMC.2019.2945067
    [6]
    T. Zhang and D. Ye, “False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach,” Automatica, vol. 120, p. 109117, 2020.
    [7]
    J. Zhang, L. Pan, Q.-L. Han, C. Chen, S. Wen, and Y. Xiang, “Deep learning based attack detection for cyber-physical system cybersecurity: A survey,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 3, pp. 377–391, 2022. doi: 10.1109/JAS.2021.1004261
    [8]
    F. Pasqualetti, F. Dörfler, and F. Bullo, “Attack detection and identification in cyber-physical systems,” IEEE Trans. Autom. Control, vol. 58, no. 11, pp. 2715–2729, 2013. doi: 10.1109/TAC.2013.2266831
    [9]
    Z. Hou and S. Jin, Model Free Adaptive Control: Theory and Applications. Boca Raton, USA: CRC Press, 2019.
    [10]
    T. Başar and G. J. Olsder, Dynamic Noncooperative Game Theory, 2nd Edition. Philadelphia, USA: SIAM, 1998.
    [11]
    R. Bellman, Dynamic Programming. Princeton, USA: Princeton University Press, 1957.

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(3)

    Article Metrics

    Article views (71) PDF downloads(11) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return