A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 15.3, Top 1 (SCI Q1)
    CiteScore: 23.5, Top 2% (Q1)
    Google Scholar h5-index: 77, TOP 5
Turn off MathJax
Article Contents
S. Zhang, L. Miao, and X. Zhao, “DoS attack schedules for remote state estimation in CPSs with two-hop relay networks under round-robin protocol,” IEEE/CAA J. Autom. Sinica, 2024. doi: 10.1109/JAS.2024.124755
Citation: S. Zhang, L. Miao, and X. Zhao, “DoS attack schedules for remote state estimation in CPSs with two-hop relay networks under round-robin protocol,” IEEE/CAA J. Autom. Sinica, 2024. doi: 10.1109/JAS.2024.124755

DoS Attack Schedules for Remote State Estimation in CPSs with two-hop relay networks Under Round-Robin Protocol

doi: 10.1109/JAS.2024.124755
More Information
  • loading
  • [1]
    W. Xing, X. Zhao, Başar, and W. Xia, “Optimal transmission scheduling for remote state estimation in CPSs with energy harvesting two-hop relay networks,” Automatica, vol. 152, p. 110963, 2023. doi: 10.1016/j.automatica.2023.110963
    [2]
    Z. Gao, N. Zhao, X. Zhao, B. Niu, N. Xu, “Event-triggered prescribed performance adaptive secure control for nonlinear cyber physical systems under denial-of-service attacks,” Commun. Nonlinear Sci. Numer. Simul., vol. 131, p. 107793, 2024. doi: 10.1016/j.cnsns.2023.107793
    [3]
    K. Ding, Y. Li, D. E. Quevedo, S. Dey, and L. Shi, “A multi-channel transmission schedule for remote state estimation under DoS attacks,” Automatica, vol. 78, pp. 194–201, 2017. doi: 10.1016/j.automatica.2016.12.020
    [4]
    C. Han, C. Li, F. He, and Y. Liu, “Receding horizon estimation for linear discrete-time systems with multi-channel observation delays,” IEEE/CAA J. Autom. Sinica, vol. 6, no. 2, pp. 478–484, 2018.
    [5]
    X.-H. Liu, J. Dong, and G.-H. Yang, “Optimal DoS attack scheduling for cyber-physical systems with channel hopping scheme,” IEEE Trans. Syst., Man, Cybern., Syst., vol. 54, no. 1, pp. 193–200, 2024. doi: 10.1109/TSMC.2023.3305287
    [6]
    L. Yang, J. Tao, Y.-H. Liu, Y. Xu, and C.-Y. Su, “Energy scheduling for DoS attack over multi-hop networks: Deep reinforcement learning approach,” Neural Netw., vol. 161, pp. 735–745, 2023. doi: 10.1016/j.neunet.2023.02.028
    [7]
    F. Yang, H. Dong, Y. S, X. Li, and D. Dai, “Protocol-based non-fragile state estimation for delayed recurrent neural networks subject to replay attacks,” IEEE/CAA J. Autom. Sinica, vol. 11, no. 1, pp. 249–251, 2024. doi: 10.1109/JAS.2023.123936
    [8]
    J. Zhang, J. Sun, and H. Lin, “Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol,” Automatica, vol. 127, p. 109517, 2021. doi: 10.1016/j.automatica.2021.109517
    [9]
    B. Sinopoli, L. Schenato, M. Franceschetti, K. Poolla, M. I. Jordan, and S. S. Sastry, “Kalman filtering with intermittent observations,” IEEE Trans. Autom. Control, vol. 49, no. 9, pp. 1453–1464, 2004. doi: 10.1109/TAC.2004.834121

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(2)

    Article Metrics

    Article views (38) PDF downloads(10) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return