Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review
Cyber-physical systems (CPSs) have emerged as an essential area of research in the last
decade, providing a new paradigm for the integration of computational and physical units in …
decade, providing a new paradigm for the integration of computational and physical units in …
Optimal strictly stealthy attack design on cyber–physical systems: A data-driven approach
In this article, an issue of data-driven optimal strictly stealthy attack design for the stochastic
linear invariant systems is investigated, with the aim of maximizing the system performance …
linear invariant systems is investigated, with the aim of maximizing the system performance …
An optimal attack strategy based on adversary-modified historical innovations
H Wang, Y Ren, Y Fang - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
This paper primarily explores the challenge of stealthy innovation-based attacks within cyber–
physical systems. An optimal covert false data injection attack strategy is proposed, which …
physical systems. An optimal covert false data injection attack strategy is proposed, which …
Stealthy false data injection attack scheduling design for multi-sensor systems with resource constraints
TT Wang, GH Yang, GM Dimirovski - Journal of the Franklin Institute, 2025 - Elsevier
This paper studies the optimal false data injection (FDI) attack scheduling problem for multi-
sensor cyber–physical systems (CPSs), where the communication bandwidth and energy …
sensor cyber–physical systems (CPSs), where the communication bandwidth and energy …
On vulnerability of Kalman filtering with holistic estimation performance loss
This article addresses the problem of optimal deception attacks against remote state
estimation, where the measurement data is transmitted through an unreliable wireless …
estimation, where the measurement data is transmitted through an unreliable wireless …
Vulnerability analysis for a class of nonlinear cyber–physical systems under stealthy attacks
This article studies the vulnerability for a class of nonlinear cyber–physical systems under
stealthy attacks, ie, whether the attack is able to destabilize the system and not be detected …
stealthy attacks, ie, whether the attack is able to destabilize the system and not be detected …
Stealthy attacks against distributed state estimation of stochastic multi-agent systems under composite attack detection mechanisms
DY Zhang, XJ Li - Information Sciences, 2024 - Elsevier
This paper is concerned with the security problem of distributed state estimation for
stochastic multi-agent systems (MASs) under directed topology. First, in the absence of …
stochastic multi-agent systems (MASs) under directed topology. First, in the absence of …
Generalized Optimal Attacks With Unparameterized Patterns on Remote Estimation: Myopic and Non-Myopic Analysis
H Xu, Y Yang, N Yang, C Tan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper studies the security issue of malicious attackers degrading remote estimation by
injecting false data into sensors in cyber-physical systems. The typical attacks involve …
injecting false data into sensors in cyber-physical systems. The typical attacks involve …
Stealthy Attacks and Robust Detectors for Cyber-Physical Systems with Bounded Disturbances: A Zonotope Approach
This paper investigates stealthy attacks on cyber-physical systems that are monitored by a
parity-space based detector and corrupted by bounded disturbances. Specifically, this work …
parity-space based detector and corrupted by bounded disturbances. Specifically, this work …