A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 15.3, Top 1 (SCI Q1)
    CiteScore: 23.5, Top 2% (Q1)
    Google Scholar h5-index: 77, TOP 5
Turn off MathJax
Article Contents
Z. Wang, H. Zhang, C. Yang, and X. Cao, “Improved zero-dynamics attack scheduling with state estimation,” IEEE/CAA J. Autom. Sinica, vol. 12, no. 2, pp. 1–3, Jul. 2024.
Citation: Z. Wang, H. Zhang, C. Yang, and X. Cao, “Improved zero-dynamics attack scheduling with state estimation,” IEEE/CAA J. Autom. Sinica, vol. 12, no. 2, pp. 1–3, Jul. 2024.

Improved Zero-Dynamics Attack Scheduling With State Estimation

More Information
  • loading
  • [1]
    S. Zhao, Q. Yang, P. Cheng, R. Deng, and J. Xia, “Adaptive resilient control for variable-speed wind turbines against false data injection attacks,” IEEE Trans. Sustain. Energy, vol. 13, no. 2, pp. 971–985, Jan. 2022. doi: 10.1109/TSTE.2022.3141766
    [2]
    X.-M. Zhang, Q.-L. Han, X. Ge, D. Ding, L. Ding, D. Yue, and C. Peng, “Networked control systems: a survey of trends and techniques,” IEEE/CAA J. Autom. Sinica, vol. 7, no. 1, pp. 1–17, 2020. doi: 10.1109/JAS.2019.1911651
    [3]
    H. Shim, J. Back, Y. Eun, G. Park, and J. Kim, “Zero-dynamics attack, variations, and countermeasures,” in Secur. Resilience of Control Syst., 2022, pp. 31–61.
    [4]
    Y. Chen, S. Kar, and J. M. Moura, “Dynamic attack detection in cyberphysical systems with side initial state information,” IEEE Trans. Autom. Control, vol. 62, no. 9, pp. 4618–4624, Nov. 2016.
    [5]
    S. Weerakkody, X. Liu, and B. Sinopoli, “Robust structural analysis and design of distributed control systems to prevent zero dynamics attacks,” in Proc. IEEE Conf. Decis. Control, Melbourne, Australia, Dec. 2017, pp. 1356–1361.
    [6]
    Y. Zhu, H. Zhang, H. Li, J. Zhang, and D. Zhang, “Optimal jamming strategy against two-state switched system,” IEEE Commun. Lett., vol. 26, no. 3, pp. 706–710, 2022. doi: 10.1109/LCOMM.2022.3142080
    [7]
    Z. Guo, D. Shi, K. H. Johansson, and L. Shi, “Optimal linear cyber-attack on remote state estimation,” IEEE Trans. Control of Netw. Syst., vol. 4, no. 1, pp. 4–13, 2017. doi: 10.1109/TCNS.2016.2570003
    [8]
    Z. Wang, H. Zhang, X. Cao, E. Liu, H. Li, and J. Zhang, “Modeling and detection scheme for zero-dynamics attack on wind power system,” IEEE Trans. Smart Grid, vol. 15, no. 1, pp. 934–943, 2024. doi: 10.1109/TSG.2023.3279878
    [9]
    D. Simon, Optimal State Estimation: Kalman, H Infinity, and Nonlinear Approaches. John Wiley & Sons, 2006.

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(1)

    Article Metrics

    Article views (4) PDF downloads(1) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return