These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

119 related articles for article (PubMed ID: 32086230)

  • 1. Data-Driven False Data-Injection Attack Design and Detection in Cyber-Physical Systems.
    Zhao Z; Huang Y; Zhen Z; Li Y
    IEEE Trans Cybern; 2021 Dec; 51(12):6179-6187. PubMed ID: 32086230
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Sparse Actuator Attack Detection and Identification: A Data-Driven Approach.
    Zhao Z; Xu Y; Li Y; Zhao Y; Wang B; Wen G
    IEEE Trans Cybern; 2023 Jun; 53(6):4054-4064. PubMed ID: 37028391
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Adaptive neural network control for nonlinear cyber-physical systems subject to false data injection attacks with prescribed performance.
    Liu Z; Tang J; Zhao Z; Zhang S
    Philos Trans A Math Phys Eng Sci; 2021 Oct; 379(2207):20200372. PubMed ID: 34398648
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Security correction control of stochastic cyber-physical systems subject to false data injection attacks with heterogeneous effects.
    Dong L; Xu H; Wei X; Hu X
    ISA Trans; 2022 Apr; 123():1-13. PubMed ID: 34092392
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Cooperative control for cyber-physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks.
    Tahoun AH; Arafa M
    ISA Trans; 2021 Apr; 110():1-14. PubMed ID: 33039167
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Rule-Based Detection of False Data Injections Attacks against Optimal Power Flow in Power Systems.
    Umar S; Felemban M
    Sensors (Basel); 2021 Apr; 21(7):. PubMed ID: 33918446
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Summation Detector for False Data-Injection Attack in Cyber-Physical Systems.
    Ye D; Zhang TY
    IEEE Trans Cybern; 2020 Jun; 50(6):2338-2345. PubMed ID: 31170086
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.
    Guo H; Sun J; Pang ZH
    ISA Trans; 2022 Aug; 127():32-40. PubMed ID: 35292173
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach.
    Li YG; Yang GH; Wang X
    ISA Trans; 2023 Jun; 137():1-12. PubMed ID: 36725413
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber-Physical Networks.
    Wan Y; Cao J
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112353
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems.
    Chen J; Liu B; Li T; Hu Y
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850552
    [TBL] [Abstract][Full Text] [Related]  

  • 12. False Data Injection Attack for Cyber-Physical Systems With Resource Constraint.
    Li F; Tang Y
    IEEE Trans Cybern; 2020 Feb; 50(2):729-738. PubMed ID: 30307888
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Fusion and detection for multi-sensor systems under false data injection attacks.
    Hua J; Hao F
    ISA Trans; 2023 Jan; 132():222-234. PubMed ID: 35764424
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Influence of cyber-attacks on longitudinal safety of connected and automated vehicles.
    Li Y; Tu Y; Fan Q; Dong C; Wang W
    Accid Anal Prev; 2018 Dec; 121():148-156. PubMed ID: 30248530
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Active Interdiction Defence Scheme Against False Data-Injection Attacks: A Stackelberg Game Perspective.
    Huang Y; Zhao J
    IEEE Trans Cybern; 2024 Jan; 54(1):162-172. PubMed ID: 36446001
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Dynamic-Memory Event-Based Asynchronous Attack Detection Filtering for a Class Of Nonlinear Cyber-Physical Systems.
    Xing M; Wang Y; Pang Q; Zhuang G
    IEEE Trans Cybern; 2023 Jan; 53(1):653-667. PubMed ID: 35604986
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Secure Finite-Horizon Consensus Control of Multiagent Systems Against Cyber Attacks.
    Li XM; Yao D; Li P; Meng W; Li H; Lu R
    IEEE Trans Cybern; 2022 Sep; 52(9):9230-9239. PubMed ID: 33729965
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems.
    Guo H; Sun J; Pang ZH; Liu GP
    IEEE Trans Cybern; 2023 Oct; 53(10):6714-6724. PubMed ID: 37030790
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Detecting and Localizing Cyber-Physical Attacks in Water Distribution Systems without Records of Labeled Attacks.
    Housh M; Kadosh N; Haddad J
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36015800
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems.
    Johnson AP; Al-Aqrabi H; Hill R
    Sensors (Basel); 2020 Feb; 20(3):. PubMed ID: 32033269
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.