IEEE/CAA Journal of Automatica Sinica
Citation: | X. Y. Zheng, H. Zhang, X. D. Yang, and H. C. Yan, “Distributed dimensionality reduction filtering for CPSs under DoS attacks,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 4, pp. 1080–1082, Apr. 2023. doi: 10.1109/JAS.2022.106034 |
[1] |
J. Y. Mao, X. Y. Meng, and D. R. Ding, “Fuzzy set-membership filtering for discrete-time nonlinear systems,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 6, pp. 1026–1036, 2022. doi: 10.1109/JAS.2022.105416
|
[2] |
Q. Li, B. Shen, Z. D. Wang, and W. G. Sheng, “Recursive distributed filtering over sensor networks on Gilbert-Elliott channels: A dynamic event-triggered approach,” Automatica, vol. 113, pp. 1–9, 2020.
|
[3] |
B. Chen, G. Hu, D. W. C. Ho, and L. Yu, “Distributed covariance intersection fusion estimation for cyber-physical systems with communication constraints,” IEEE Trans. Automat. Contr., vol. 61, no. 12, pp. 4020–4026, 2016. doi: 10.1109/TAC.2016.2539221
|
[4] |
B. Chen, D. W. C. Ho, W. Zhang, and L. Yu, “Distributed dimensionality reduction fusion estimation for cyber-physical systems under DoS sttacks,” IEEE Trans. Syst.,Man,and Cybern-Syst., vol. 49, no. 2, pp. 455–468, 2019. doi: 10.1109/TSMC.2017.2697450
|
[5] |
D. Zhang, G. Feng, Y. Shi, and D. Srinivasan, “Physical safety and cyber security analysis of multi-agent systems: A survey of recent advances,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 2, pp. 319–333, 2021. doi: 10.1109/JAS.2021.1003820
|
[6] |
H. Zhang, P. Cheng, L. Shi, and J. Chen, “Optimal DoS attack scheduling in wireless networked control system,” IEEE Trans. Contr. Syst. Tech., vol. 24, no. 3, pp. 843–852, 2016. doi: 10.1109/TCST.2015.2462741
|
[7] |
H. Karimipour and V. Dinavahi, “On false data injection attack against dynamic state estimation on smart power grids,” in Proc. IEEE Int. Conf. Smart Energy Grid Eng., 2017, pp. 388–393.
|
[8] |
B. DeBruhl and P. Tague, “Digital filter design for jamming mitigation in 802.15.4 communication”, in Proc. Int. Conf. Comput. Commun. Netw., Maui, USA, Jul. 2011.
|
[9] |
H. H. Yuan and Y. Q. Xia, “Resilient strategy design for cyber-physical system under DoS attack over a multi-channel framework,” Inf. Sciences, vol. 454, pp. 312–327, 2018.
|
[10] |
C. Deng, C. Wen, W. Wang, X. Li, and D. Yue, “Distributed adaptive tracking control for high-order nonlinear multi-agent systems over event-triggered communication,” IEEE Trans. Automat. Contr, vol. 68, no. 2, pp. 1176–1183, 2023. doi: 10.1109/TAC.2022.3148384
|
[11] |
H. Zhang, Z. Wang, H. Yan, F. Yang, and X. Zhou, “Adaptive event-triggered transmission scheme and
|
[12] |
B. D. O. Anderson, J. B. Moore, and M. Eslami, “Optimal filtering,” IEEE Trans. Syst. Man and Cybern., vol. 12, no. 2, pp. 235–236, 2007.
|