Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security of networked control systems subject to deception attacks: A survey
ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …
utilising communication networks, is a complex intelligent control system with high flexibility …
A Survey on Cyber-Attacks for Cyber-Physical Systems: Modeling, Defense and Design
Cyber-physical system (CPS) security has become a paramount concern as the integration
of digital and physical systems continues to grow. This survey article provides an in-depth …
of digital and physical systems continues to grow. This survey article provides an in-depth …
An output-coding-based detection scheme against replay attacks in cyber-physical systems
H Guo, ZH Pang, J Sun, J Li - IEEE Transactions on Circuits and …, 2021 - ieeexplore.ieee.org
This brief studies the detection problem of replay attacks against measurement data
transmitted over the feedback channel of a cyber-physical system. In order to detect such …
transmitted over the feedback channel of a cyber-physical system. In order to detect such …
Adaptive resilient control for cyber-physical systems under cyberattack and input saturation
This article investigates the resilient control problem for nonlinear cyber-physical systems
with hybrid cyberattacks and physical constraints, including aperiodic denial-of-service …
with hybrid cyberattacks and physical constraints, including aperiodic denial-of-service …
On resilience and distributed fixed-time control of MTDC systems under DoS attacks
This article investigates the resiliently distributed fixed-time control of frequency recovery
and power allocation in a multi-terminal high voltage direct current (MTDC) system against …
and power allocation in a multi-terminal high voltage direct current (MTDC) system against …
Nonlinear stealthy attacks on remote state estimation
This paper investigates stealthy attacks on state estimation within linear time-invariant
systems, focusing on scenarios where transmitted measurements through wireless networks …
systems, focusing on scenarios where transmitted measurements through wireless networks …
Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems
H Guo, J Sun, ZH Pang - ISA transactions, 2022 - Elsevier
This paper mainly investigates how to maximally degrade estimation performance of a cyber–
physical system under limited resource. A stealthy false data injection (FDI) attack scheme is …
physical system under limited resource. A stealthy false data injection (FDI) attack scheme is …
A dynamic feature selection technique to detect DDoS attack
Abstract Distributed Denial of Service (DDoS) attacks are a weapon of choice for hackers
that are accountable for degradation in network performance, website downtime, and …
that are accountable for degradation in network performance, website downtime, and …
Distributed aperiodic control of multibus DC microgrids with DoS-attack resilience
In this article, we present a distributed aperiodic control algorithm for multibus DC microgrids
to realize proper current sharing and voltage regulation under denial-of-service (DoS) …
to realize proper current sharing and voltage regulation under denial-of-service (DoS) …
Improved data-driven control design based on LMI and its applications in lithium-ion batteries
QY Fan, Y Sun, B Xu - … Transactions on Circuits and Systems II …, 2023 - ieeexplore.ieee.org
This brief focuses on the data-driven control for discrete-time systems based on linear matrix
inequality (LMI) and provides its application in Lithium-Ion batteries with disturbances. First …
inequality (LMI) and provides its application in Lithium-Ion batteries with disturbances. First …