Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review

J Zhou, J Shang, T Chen - IEEE/CAA Journal of Automatica …, 2024 - ieeexplore.ieee.org
Cyber-physical systems (CPSs) have emerged as an essential area of research in the last
decade, providing a new paradigm for the integration of computational and physical units in …

Optimal strictly stealthy attack design on cyber–physical systems: A data-driven approach

Z Li, Z Zhao, SX Ding, Y Yang - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In this article, an issue of data-driven optimal strictly stealthy attack design for the stochastic
linear invariant systems is investigated, with the aim of maximizing the system performance …

An optimal attack strategy based on adversary-modified historical innovations

H Wang, Y Ren, Y Fang - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
This paper primarily explores the challenge of stealthy innovation-based attacks within cyber–
physical systems. An optimal covert false data injection attack strategy is proposed, which …

Nonlinear stealthy attacks on remote state estimation

J Shang, J Zhou, T Chen - Automatica, 2024 - Elsevier
This paper investigates stealthy attacks on state estimation within linear time-invariant
systems, focusing on scenarios where transmitted measurements through wireless networks …

Stealthy false data injection attack scheduling design for multi-sensor systems with resource constraints

TT Wang, GH Yang, GM Dimirovski - Journal of the Franklin Institute, 2025 - Elsevier
This paper studies the optimal false data injection (FDI) attack scheduling problem for multi-
sensor cyber–physical systems (CPSs), where the communication bandwidth and energy …

On vulnerability of Kalman filtering with holistic estimation performance loss

J Zhou, J Shang, T Chen - Automatica, 2025 - Elsevier
This article addresses the problem of optimal deception attacks against remote state
estimation, where the measurement data is transmitted through an unreliable wireless …

Vulnerability analysis for a class of nonlinear cyber–physical systems under stealthy attacks

Q Zhang, W Dai, C Yang, X Chen - Automatica, 2024 - Elsevier
This article studies the vulnerability for a class of nonlinear cyber–physical systems under
stealthy attacks, ie, whether the attack is able to destabilize the system and not be detected …

Stealthy attacks against distributed state estimation of stochastic multi-agent systems under composite attack detection mechanisms

DY Zhang, XJ Li - Information Sciences, 2024 - Elsevier
This paper is concerned with the security problem of distributed state estimation for
stochastic multi-agent systems (MASs) under directed topology. First, in the absence of …

Generalized Optimal Attacks With Unparameterized Patterns on Remote Estimation: Myopic and Non-Myopic Analysis

H Xu, Y Yang, N Yang, C Tan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper studies the security issue of malicious attackers degrading remote estimation by
injecting false data into sensors in cyber-physical systems. The typical attacks involve …

Stealthy Attacks and Robust Detectors for Cyber-Physical Systems with Bounded Disturbances: A Zonotope Approach

Z Guo, J Zhou, T Chen - IEEE Transactions on Control of …, 2024 - ieeexplore.ieee.org
This paper investigates stealthy attacks on cyber-physical systems that are monitored by a
parity-space based detector and corrupted by bounded disturbances. Specifically, this work …