Author of the publication

Worst-case analysis of innovation-based linear attack on remote state estimation with resource constraint.

, , , and . CDC, page 6303-6308. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimisation of moving target's low-power and high-precision monitoring with RSSI based on static and dynamic clustering., , , and . Int. J. Embed. Syst., 7 (3/4): 334-344 (2015)Distributed Kalman Filters with State Equality Constraints: Time-based and Event-triggered Communications., , , , and . CoRR, (2017)Kalman filtering over a packet dropping network: A probabilistic approach., , and . ICARCV, page 41-46. IEEE, (2008)Networked state estimation of MIMO Systems., , and . ICARCV, page 424-429. IEEE, (2012)Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks., , , and . IEEE Trans. Automat. Contr., 63 (6): 1648-1663 (2018)Pricing and Selection of Channels for Remote State Estimation Using a Stackelberg Game Framework., , , and . IEEE Trans. Signal and Information Processing over Networks, 5 (4): 657-668 (2019)Sparse Linear Injection Attack on Multi-Agent Consensus Control Systems., , , and . IEEE Control. Syst. Lett., 5 (2): 665-670 (2021)A Game-Theoretic Approach to Fake-Acknowledgment Attack on Cyber-Physical Systems., , , and . IEEE Trans. Signal Inf. Process. over Networks, 3 (1): 1-11 (2017)Multi-Sensor-Based Aperiodic Least-Squares Estimation for Networked Systems With Transmission Constraints., , , and . IEEE Trans. Signal Process., 63 (9): 2349-2363 (2015)Distributed filtering under false data injection attacks., , , , and . Autom., (2019)