Citation: | M. Shi and Y. Shi, “Robust optimization control for cyber-physical systems subject to jamming attack: A nested game approach,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 0, pp. 1–3, Sept. 2023. |
[1] |
C. Sun, G. Cembrano, V. Puig, and J. Meseguer, “Cyber-physical systems for real-time management in the urban water cycle,” in Proc. Int. Workshop on Cyber-Physical Systems for Smart Water Networks, 2018, pp. 5-8. doi: 10.1109/CySWater.2018.00008.
|
[2] |
A. Neto, R. Resende, M. Nicolau, M. Pimentel, R. Ribeiro, G. Filho, F. Fruett, and J. Ramos, “A cyber-physical system for energy efficiency and indoor air conditioning of cultiple office rooms,” in Proc. Sympo. on Internet of Things, 2022, pp. 1−4. DOI: 10.1109/SIoT56383.2022.10070204.
|
[3] |
Q. Wang, W. Tai, Y. Tang, M. Ni, and S. You, “A two-layer game theoretical attack-defense model for a false data injection attack against power systems,” Int. J. Electrical Power &Energy Systems, vol. 104, pp. 169–177, 2019.
|
[4] |
Y. Hu, H. Zhang, Y. Guo, T. Li, and J. Ma, “A novel attack-and-defense signaling game for optimal deceptive defense strategy choice,” Wireless Communications and Mobile Computing, pp. 1–10, 2020.
|
[5] |
L. An and G. Yang, “LQ secure control for cyber-physical systems against sparse sensor and actuator attacks,” IEEE Trans. Control of Network Systems, vol. 6, no. 2, pp. 833–841, 2019. doi: 10.1109/TCNS.2018.2878507
|
[6] |
L. An and G. Yang, “Secure state estimation against sparse sensor attacks with adaptive switching mechanism,” IEEE Transactions on Automatic Control, vol. 63, no. 8, pp. 2596–2603, 2018. doi: 10.1109/TAC.2017.2766759
|
[7] |
C. Zhao, J. Lam, and H. Lin, “State estimation of CPSs with deception attacks: Stability analysis and approximate computation, Neurocomputing,” vol. 423, no. 7, pp. 318–326, 2021.
|
[8] |
Q. Zhu, H. Li, H. Zhu, and T Basar, “A stochastic game model for jamming in multi-channel cognitive radio systems,” in Proc. IEEE Int. Conf. Communications, 2015.
|
[9] |
H. Yang, Y. Xu, and J. Zhang, “Event-driven control for networked control systems with quantization and Markov packet losses,” IEEE Trans. Cybern., vol. 47, no. 8, pp. 2235–2243, 2016.
|
[10] |
D. Gadjov and L. Pavel, “A passivity-based approach to Nash equilibrium seeking over networks,” IEEE Trans. Autom. Control, vol. 64, no. 3, pp. 1077–1092, 2019. doi: 10.1109/TAC.2018.2833140
|
[11] |
H. Yang, M. Shi, Y. Xia, and P. Zhang, “Security research on wireless networked control systems subject to jamming attacks,” IEEE Trans. Cybern., vol. 49, no. 6, pp. 2022–2031, 2019. doi: 10.1109/TCYB.2018.2817249
|