Optimal DoS attack against LQR control channels J Zhou, J Shang, Y Li, T Chen IEEE Transactions on Circuits and Systems II: Express Briefs 68 (4), 1348-1352, 2020 | 33 | 2020 |
Deception attacks on remote estimation with disclosure and disruption resources Y Li, Y Yang, Z Zhao, J Zhou, DE Quevedo IEEE Transactions on Automatic Control 68 (7), 4096-4112, 2022 | 24 | 2022 |
Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation J Shang, J Zhou, T Chen Automatica 136, 110015, 2022 | 21 | 2022 |
Sparse undetectable sensor attacks against cyber-physical systems: A subspace approach Z Zhao, Y Li, Y Yang, L Li, Y Xu, J Zhou IEEE Transactions on Circuits and Systems II: Express Briefs 67 (11), 2517-2521, 2019 | 20 | 2019 |
A fault detection scheme for ship propulsion systems using randomized algorithm techniques J Zhou, Y Yang, Z Zhao, SX Ding Control Engineering Practice 81, 65-72, 2018 | 20 | 2018 |
Optimal deception attacks on remote state estimators equipped with interval anomaly detectors J Zhou, J Shang, T Chen Automatica 148, 110723, 2023 | 18 | 2023 |
Optimal linear FDI attacks with side information: A comparative study J Zhou, J Shang, T Chen 2021 4th IEEE International Conference on Industrial Cyber-Physical Systems …, 2021 | 12 | 2021 |
Optimal deception attacks against remote state estimation: An information-based approach J Zhou, J Shang, T Chen IEEE Transactions on Automatic Control 68 (7), 3947-3962, 2022 | 10 | 2022 |
Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review J Zhou, J Shang, T Chen IEEE/CAA Journal of Automatica Sinica 11 (4), 851-865, 2024 | 7 | 2024 |
On information fusion in optimal linear FDI attacks against remote state estimation J Zhou, J Shang, T Chen IEEE Transactions on Control of Network Systems 10 (4), 2085-2096, 2023 | 7 | 2023 |
Asymmetric vulnerability of measurement and control channels in closed-loop systems J Shang, D Cheng, J Zhou, T Chen IEEE Transactions on Control of Network Systems 9 (4), 1804-1815, 2022 | 6 | 2022 |
Nonlinear stealthy attacks on remote state estimation J Shang, J Zhou, T Chen Automatica 167, 111747, 2024 | 4 | 2024 |
Deception attacks on Kalman filtering with interval estimation performance loss J Zhou, J Shang, T Chen IFAC-PapersOnLine 55 (35), 7-12, 2022 | 2 | 2022 |
Worst-case stealthy false-data injection attacks on remote state estimation J Zhou, J Shang, T Chen IECON 2021–47th Annual Conference of the IEEE Industrial Electronics Society …, 2021 | 2 | 2021 |
On vulnerability of Kalman filtering with holistic estimation performance loss J Zhou, J Shang, T Chen Automatica 171, 111895, 2025 | 1 | 2025 |
Stealthy Linear Deception Attacks against Kalman Filtering with Partially Secured Measurements J Zhou, T Chen 2023 62nd IEEE Conference on Decision and Control (CDC), 827-832, 2023 | 1 | 2023 |
Integrity attacks on state estimation with varying data access: From visibility to full restriction J Wei, J Zhou, T Chen Automatica 174, 112162, 2025 | | 2025 |
Worst-Case Integrity Attacks and Resilient State Estimation With Partially Secured Measurements J Zhou, J Shang, T Chen IEEE Transactions on Control of Network Systems, 2025 | | 2025 |
Performance analysis for stochastic anomaly detectors with on/off-delay timers J Zhou, J Shang, T Chen Automatica, 2025 | | 2025 |
Stealthy Attacks and Robust Detectors for Cyber-Physical Systems with Bounded Disturbances: A Zonotope Approach Z Guo, J Zhou, T Chen IEEE Transactions on Control of Network Systems, 2024 | | 2024 |