2022 American Control Conference (ACC) 2022
DOI: 10.23919/acc53348.2022.9867774
|View full text |Cite
|
Sign up to set email alerts
|

Robust State Estimation in the Presence of Stealthy Cyberattacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…where the last equality follows from the construction of G 0 . Using Equation (20), we arrive at the desired inequality (19). ■ Clearly, φ max ðX ; rÞ bounds the minimal bandwidth φ min ðGÞ of a geometric graph as well.…”
Section: ¼ Maxmentioning
confidence: 99%
See 2 more Smart Citations
“…where the last equality follows from the construction of G 0 . Using Equation (20), we arrive at the desired inequality (19). ■ Clearly, φ max ðX ; rÞ bounds the minimal bandwidth φ min ðGÞ of a geometric graph as well.…”
Section: ¼ Maxmentioning
confidence: 99%
“…■ Clearly, φ max ðX ; rÞ bounds the minimal bandwidth φ min ðGÞ of a geometric graph as well. The following corollary shows that this bound can be further improved by minimising (19) over the set of realisations that induce the same edge set E.…”
Section: ¼ Maxmentioning
confidence: 99%
See 1 more Smart Citation