These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

144 related articles for article (PubMed ID: 35341584)

  • 1. Jamming attack against remote state estimation over multiple wireless channels: A reinforcement learning based game theoretical approach.
    Xue L; Ma B; Liu J; Yu Y
    ISA Trans; 2022 Nov; 130():1-9. PubMed ID: 35341584
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Resilient Control for Wireless Cyber-Physical Systems Subject to Jamming Attacks: A Cross-Layer Dynamic Game Approach.
    Zhao L; Xu H; Zhang J; Yang H
    IEEE Trans Cybern; 2022 Apr; 52(4):2599-2608. PubMed ID: 32697737
    [TBL] [Abstract][Full Text] [Related]  

  • 3. An Analysis on Optimal Attack Schedule Based on Channel Hopping Scheme in Cyber-Physical Systems.
    Gan R; Xiao Y; Shao J; Qin J
    IEEE Trans Cybern; 2021 Feb; 51(2):994-1003. PubMed ID: 31107677
    [TBL] [Abstract][Full Text] [Related]  

  • 4. An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks.
    Adil M; Almaiah MA; Omar Alsayed A; Almomani O
    Sensors (Basel); 2020 Apr; 20(8):. PubMed ID: 32325646
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Observer-based H
    Wang M; Liu Y; Xu B
    ISA Trans; 2020 Sep; 104():1-14. PubMed ID: 31955945
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Learning-Based DoS Attack Power Allocation in Multiprocess Systems.
    Huang M; Ding K; Dey S; Li Y; Shi L
    IEEE Trans Neural Netw Learn Syst; 2023 Oct; 34(10):8017-8030. PubMed ID: 35167483
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Security Research on Wireless Networked Control Systems Subject to Jamming Attacks.
    Yang H; Shi M; Xia Y; Zhang P
    IEEE Trans Cybern; 2019 Jun; 49(6):2022-2031. PubMed ID: 29993677
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution.
    Ni Z; Paul S
    IEEE Trans Neural Netw Learn Syst; 2019 Sep; 30(9):2684-2695. PubMed ID: 30624227
    [TBL] [Abstract][Full Text] [Related]  

  • 9. False Data Injection Attack for Cyber-Physical Systems With Resource Constraint.
    Li F; Tang Y
    IEEE Trans Cybern; 2020 Feb; 50(2):729-738. PubMed ID: 30307888
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Allocation of Eavesdropping Attacks for Multi-System Remote State Estimation.
    Chang X; Peng L; Zhang S
    Sensors (Basel); 2024 Jan; 24(3):. PubMed ID: 38339566
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Computation Offloading Game for Multi-Channel Wireless Sensor Networks.
    Hu HC; Wang PC
    Sensors (Basel); 2022 Nov; 22(22):. PubMed ID: 36433314
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Deep Reinforcement Learning for Attacking Wireless Sensor Networks.
    Parras J; Hüttenrauch M; Zazo S; Neumann G
    Sensors (Basel); 2021 Jun; 21(12):. PubMed ID: 34204726
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Secure Control Learning Framework for Cyber-Physical Systems Under Sensor and Actuator Attacks.
    Zhou Y; Vamvoudakis KG; Haddad WM; Jiang ZP
    IEEE Trans Cybern; 2021 Sep; 51(9):4648-4660. PubMed ID: 32735543
    [TBL] [Abstract][Full Text] [Related]  

  • 14. On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks.
    Li X; Dai HN; Wang H; Xiao H
    Sensors (Basel); 2016 Nov; 16(12):. PubMed ID: 27886154
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Clustering-Based Energy-Efficient Self-Healing Strategy for WSNs Under Jamming Attacks.
    López-Vilos N; Valencia-Cordero C; Souza RD; Montejo-Sánchez S
    Sensors (Basel); 2023 Aug; 23(15):. PubMed ID: 37571681
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Smart Home Privacy Protection Methods against a Passive Wireless Snooping Side-Channel Attack.
    Nassiri Abrishamchi MA; Zainal A; Ghaleb FA; Qasem SN; Albarrak AM
    Sensors (Basel); 2022 Nov; 22(21):. PubMed ID: 36366261
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Energy scheduling for DoS attack over multi-hop networks: Deep reinforcement learning approach.
    Yang L; Tao J; Liu YH; Xu Y; Su CY
    Neural Netw; 2023 Apr; 161():735-745. PubMed ID: 36848827
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Secure State Estimation of Nonlinear Cyber-Physical Systems Against DoS Attacks: A Multiobserver Approach.
    Yan JJ; Yang GH
    IEEE Trans Cybern; 2023 Mar; 53(3):1447-1459. PubMed ID: 34473637
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Simulation of Attacks for Security in Wireless Sensor Network.
    Diaz A; Sanchez P
    Sensors (Basel); 2016 Nov; 16(11):. PubMed ID: 27869710
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Secure control design for nonlinear cyber-physical systems under DoS, replay, and deception cyber-attacks with multiple transmission channels.
    Tahoun AH; Arafa M
    ISA Trans; 2022 Sep; 128(Pt B):294-308. PubMed ID: 34953583
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.