The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2018
DOI: 10.1016/j.ins.2018.03.056
|View full text |Cite
|
Sign up to set email alerts
|

Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 30 publications
(15 citation statements)
references
References 20 publications
0
14
0
Order By: Relevance
“…Remark 5. Similar to reference [16], the states of x 1 and x 4 and their estimates are related to the initial state of the system and the initial state of the observer. Because the designed observer in this paper is nite time, the estimates are irregular before 0.5 s. In addition, the initial state of the system and the initial state of the observer have no e ect on the nal results, and we can change the initial state to adjust the estimates.…”
Section: Simulationmentioning
confidence: 99%
See 4 more Smart Citations
“…Remark 5. Similar to reference [16], the states of x 1 and x 4 and their estimates are related to the initial state of the system and the initial state of the observer. Because the designed observer in this paper is nite time, the estimates are irregular before 0.5 s. In addition, the initial state of the system and the initial state of the observer have no e ect on the nal results, and we can change the initial state to adjust the estimates.…”
Section: Simulationmentioning
confidence: 99%
“…However, based on this, the attack η(t) added to the model in this manuscript and the complexity is not increased. So the system is more conservative than the system in references [16] and [28].…”
Section: Simulationmentioning
confidence: 99%
See 3 more Smart Citations