A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 15.3, Top 1 (SCI Q1)
    CiteScore: 23.5, Top 2% (Q1)
    Google Scholar h5-index: 77, TOP 5
Turn off MathJax
Article Contents
M. Shi and Y. Shi, “Robust optimization control for cyber-physical systems subject to jamming attack: A nested game approach,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 0, pp. 1–3, Sept. 2023.
Citation: M. Shi and Y. Shi, “Robust optimization control for cyber-physical systems subject to jamming attack: A nested game approach,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 0, pp. 1–3, Sept. 2023.

Robust Optimization Control for Cyber-Physical Systems Subject to Jamming Attack: A Nested Game Approach

More Information
  • loading
  • [1]
    C. Sun, G. Cembrano, V. Puig, and J. Meseguer, “Cyber-physical systems for real-time management in the urban water cycle,” in Proc. Int. Workshop on Cyber-Physical Systems for Smart Water Networks, 2018, pp. 5-8. doi: 10.1109/CySWater.2018.00008.
    [2]
    A. Neto, R. Resende, M. Nicolau, M. Pimentel, R. Ribeiro, G. Filho, F. Fruett, and J. Ramos, “A cyber-physical system for energy efficiency and indoor air conditioning of cultiple office rooms,” in Proc. Sympo. on Internet of Things, 2022, pp. 1−4. DOI: 10.1109/SIoT56383.2022.10070204.
    [3]
    Q. Wang, W. Tai, Y. Tang, M. Ni, and S. You, “A two-layer game theoretical attack-defense model for a false data injection attack against power systems,” Int. J. Electrical Power &Energy Systems, vol. 104, pp. 169–177, 2019.
    [4]
    Y. Hu, H. Zhang, Y. Guo, T. Li, and J. Ma, “A novel attack-and-defense signaling game for optimal deceptive defense strategy choice,” Wireless Communications and Mobile Computing, pp. 1–10, 2020.
    [5]
    L. An and G. Yang, “LQ secure control for cyber-physical systems against sparse sensor and actuator attacks,” IEEE Trans. Control of Network Systems, vol. 6, no. 2, pp. 833–841, 2019. doi: 10.1109/TCNS.2018.2878507
    [6]
    L. An and G. Yang, “Secure state estimation against sparse sensor attacks with adaptive switching mechanism,” IEEE Transactions on Automatic Control, vol. 63, no. 8, pp. 2596–2603, 2018. doi: 10.1109/TAC.2017.2766759
    [7]
    C. Zhao, J. Lam, and H. Lin, “State estimation of CPSs with deception attacks: Stability analysis and approximate computation, Neurocomputing,” vol. 423, no. 7, pp. 318–326, 2021.
    [8]
    Q. Zhu, H. Li, H. Zhu, and T Basar, “A stochastic game model for jamming in multi-channel cognitive radio systems,” in Proc. IEEE Int. Conf. Communications, 2015.
    [9]
    H. Yang, Y. Xu, and J. Zhang, “Event-driven control for networked control systems with quantization and Markov packet losses,” IEEE Trans. Cybern., vol. 47, no. 8, pp. 2235–2243, 2016.
    [10]
    D. Gadjov and L. Pavel, “A passivity-based approach to Nash equilibrium seeking over networks,” IEEE Trans. Autom. Control, vol. 64, no. 3, pp. 1077–1092, 2019. doi: 10.1109/TAC.2018.2833140
    [11]
    H. Yang, M. Shi, Y. Xia, and P. Zhang, “Security research on wireless networked control systems subject to jamming attacks,” IEEE Trans. Cybern., vol. 49, no. 6, pp. 2022–2031, 2019. doi: 10.1109/TCYB.2018.2817249

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(1)

    Article Metrics

    Article views (9) PDF downloads(7) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return