2018
DOI: 10.1016/j.ins.2017.09.042
|View full text |Cite
|
Sign up to set email alerts
|

Improved adaptive resilient control against sensor and actuator attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
84
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 153 publications
(93 citation statements)
references
References 25 publications
0
84
0
1
Order By: Relevance
“…In this paper, owing to the existence of the attacks through the sensor networks, the sign of λ ( t ) is unknown and may change before and after the occurrence of the attacks, which implies that the proposed control methods in the aforementioned other works are no longer valid. As pointed out in the work of An and Yang, from the view of system theory, faults and attacks are fundamentally same. However, since the malicious attackers optimize the attack strategies coordinately, the attacks may be undetectable, while there is no collusion between the faults.…”
Section: Controller Designmentioning
confidence: 95%
See 3 more Smart Citations
“…In this paper, owing to the existence of the attacks through the sensor networks, the sign of λ ( t ) is unknown and may change before and after the occurrence of the attacks, which implies that the proposed control methods in the aforementioned other works are no longer valid. As pointed out in the work of An and Yang, from the view of system theory, faults and attacks are fundamentally same. However, since the malicious attackers optimize the attack strategies coordinately, the attacks may be undetectable, while there is no collusion between the faults.…”
Section: Controller Designmentioning
confidence: 95%
“…The attack model in (2) means that all states share the same weight (t), which has been considered in other works. [11][12][13] In addition, in the case where the attacks cannot be parameterized, one can use a neural network universal function approximator to parameterize s (x i (t), t) on a compact subset.…”
Section: Problem Formulation and Preliminariesmentioning
confidence: 99%
See 2 more Smart Citations
“…考虑到网络攻击者往往通过破坏系统测量输出或者控制输入信号实现对系统的欺骗攻击 [21] , 为 了提高攻击成功率, 攻击者往往事先能够获取系统的测量输出信息 [22] , 并将该信息改造成具有欺骗性 的恶意攻击信号. 本文假定攻击者事先能够获取系统待传输信号, 并且将攻击信号伪装成与系统测量 输出相关的非线性函数, 即 h(y(t)), 该非线性函数满足假设 1 的约束.…”
Section: 系统模型unclassified