Author:
Yang Guang-Yuan,Li Xiao-Jian
Funder
State Key Laboratory of Synthetical Automation for Process Industries
Fundamental Research Funds for the Central Universities
Liaoning Revitalization Talents Program
National Natural Science Foundation of China
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference41 articles.
1. An intrusion detection system for cyber attacks in wireless networked control systems;Al-Dabbagh;IEEE Transactions on Circuits and Systems II: Express Briefs,2018
2. Optimal filtering;Anderson;Courier Corporation,2012
3. On Kalman Filtering with compromised sensors: Attack stealthiness and performance bounds;Bai;IEEE Transactions on Automatic Control,2017
4. Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs;Bai;Automatica,2017
5. Matrix mathematics: theory, facts, and formulas;Bernstein,2009
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献