Security of networked control systems subject to deception attacks: A survey

ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …

A Survey on Cyber-Attacks for Cyber-Physical Systems: Modeling, Defense and Design

Z Lian, P Shi, M Chen - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Cyber-physical system (CPS) security has become a paramount concern as the integration
of digital and physical systems continues to grow. This survey article provides an in-depth …

An output-coding-based detection scheme against replay attacks in cyber-physical systems

H Guo, ZH Pang, J Sun, J Li - IEEE Transactions on Circuits and …, 2021 - ieeexplore.ieee.org
This brief studies the detection problem of replay attacks against measurement data
transmitted over the feedback channel of a cyber-physical system. In order to detect such …

Adaptive resilient control for cyber-physical systems under cyberattack and input saturation

Z Lian, P Shi, CC Lim - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
This article investigates the resilient control problem for nonlinear cyber-physical systems
with hybrid cyberattacks and physical constraints, including aperiodic denial-of-service …

On resilience and distributed fixed-time control of MTDC systems under DoS attacks

X Zhang, X Liu, T Ding, P Wang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This article investigates the resiliently distributed fixed-time control of frequency recovery
and power allocation in a multi-terminal high voltage direct current (MTDC) system against …

Nonlinear stealthy attacks on remote state estimation

J Shang, J Zhou, T Chen - Automatica, 2024 - Elsevier
This paper investigates stealthy attacks on state estimation within linear time-invariant
systems, focusing on scenarios where transmitted measurements through wireless networks …

Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems

H Guo, J Sun, ZH Pang - ISA transactions, 2022 - Elsevier
This paper mainly investigates how to maximally degrade estimation performance of a cyber–
physical system under limited resource. A stealthy false data injection (FDI) attack scheme is …

A dynamic feature selection technique to detect DDoS attack

US Chanu, KJ Singh, YJ Chanu - Journal of Information Security and …, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks are a weapon of choice for hackers
that are accountable for degradation in network performance, website downtime, and …

Distributed aperiodic control of multibus DC microgrids with DoS-attack resilience

Y Li, W Meng, B Fan, S Zhao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this article, we present a distributed aperiodic control algorithm for multibus DC microgrids
to realize proper current sharing and voltage regulation under denial-of-service (DoS) …

Improved data-driven control design based on LMI and its applications in lithium-ion batteries

QY Fan, Y Sun, B Xu - … Transactions on Circuits and Systems II …, 2023 - ieeexplore.ieee.org
This brief focuses on the data-driven control for discrete-time systems based on linear matrix
inequality (LMI) and provides its application in Lithium-Ion batteries with disturbances. First …