These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

118 related articles for article (PubMed ID: 35764424)

  • 1. Fusion and detection for multi-sensor systems under false data injection attacks.
    Hua J; Hao F
    ISA Trans; 2023 Jan; 132():222-234. PubMed ID: 35764424
    [TBL] [Abstract][Full Text] [Related]  

  • 2. False Data-Injection Attack Detection in Cyber-Physical Systems With Unknown Parameters: A Deep Reinforcement Learning Approach.
    Liu K; Zhang H; Zhang Y; Sun C
    IEEE Trans Cybern; 2023 Nov; 53(11):7115-7125. PubMed ID: 37015355
    [TBL] [Abstract][Full Text] [Related]  

  • 3. False Data Injection Attack for Cyber-Physical Systems With Resource Constraint.
    Li F; Tang Y
    IEEE Trans Cybern; 2020 Feb; 50(2):729-738. PubMed ID: 30307888
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.
    Guo H; Sun J; Pang ZH
    ISA Trans; 2022 Aug; 127():32-40. PubMed ID: 35292173
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Observability Decomposition-Based Decentralized Kalman Filter and Its Application to Resilient State Estimation under Sensor Attacks.
    Lee C
    Sensors (Basel); 2022 Sep; 22(18):. PubMed ID: 36146255
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Security correction control of stochastic cyber-physical systems subject to false data injection attacks with heterogeneous effects.
    Dong L; Xu H; Wei X; Hu X
    ISA Trans; 2022 Apr; 123():1-13. PubMed ID: 34092392
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks.
    Chen B; Ho DWC; Hu G; Yu L; Bo Chen ; Ho DWC; Guoqiang Hu ; Li Yu ; Chen B; Ho DWC; Hu G; Yu L
    IEEE Trans Cybern; 2018 Jun; 48(6):1862-1876. PubMed ID: 28682270
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Security Analysis for Dynamic State Estimation of Power Systems With Measurement Delays.
    Cheng Z; Ren H; Qin J; Lu R
    IEEE Trans Cybern; 2023 Apr; 53(4):2087-2096. PubMed ID: 34543217
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Secure Estimation for Cyber-Physical Systems via Sliding Mode.
    Wu C; Hu Z; Liu J; Wu L
    IEEE Trans Cybern; 2018 Dec; 48(12):3420-3431. PubMed ID: 29994041
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Adaptive neural network control for nonlinear cyber-physical systems subject to false data injection attacks with prescribed performance.
    Liu Z; Tang J; Zhao Z; Zhang S
    Philos Trans A Math Phys Eng Sci; 2021 Oct; 379(2207):20200372. PubMed ID: 34398648
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Kullback-Leibler Divergence-Based Optimal Stealthy Sensor Attack Against Networked Linear Quadratic Gaussian Systems.
    Ren XX; Yang GH
    IEEE Trans Cybern; 2022 Nov; 52(11):11539-11548. PubMed ID: 33872173
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Summation Detector for False Data-Injection Attack in Cyber-Physical Systems.
    Ye D; Zhang TY
    IEEE Trans Cybern; 2020 Jun; 50(6):2338-2345. PubMed ID: 31170086
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Dynamic-Memory Event-Based Asynchronous Attack Detection Filtering for a Class Of Nonlinear Cyber-Physical Systems.
    Xing M; Wang Y; Pang Q; Zhuang G
    IEEE Trans Cybern; 2023 Jan; 53(1):653-667. PubMed ID: 35604986
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Jamming attack against remote state estimation over multiple wireless channels: A reinforcement learning based game theoretical approach.
    Xue L; Ma B; Liu J; Yu Y
    ISA Trans; 2022 Nov; 130():1-9. PubMed ID: 35341584
    [TBL] [Abstract][Full Text] [Related]  

  • 15. An Analysis on Optimal Attack Schedule Based on Channel Hopping Scheme in Cyber-Physical Systems.
    Gan R; Xiao Y; Shao J; Qin J
    IEEE Trans Cybern; 2021 Feb; 51(2):994-1003. PubMed ID: 31107677
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Active Interdiction Defence Scheme Against False Data-Injection Attacks: A Stackelberg Game Perspective.
    Huang Y; Zhao J
    IEEE Trans Cybern; 2024 Jan; 54(1):162-172. PubMed ID: 36446001
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Secure Control Learning Framework for Cyber-Physical Systems Under Sensor and Actuator Attacks.
    Zhou Y; Vamvoudakis KG; Haddad WM; Jiang ZP
    IEEE Trans Cybern; 2021 Sep; 51(9):4648-4660. PubMed ID: 32735543
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Energy scheduling for DoS attack over multi-hop networks: Deep reinforcement learning approach.
    Yang L; Tao J; Liu YH; Xu Y; Su CY
    Neural Netw; 2023 Apr; 161():735-745. PubMed ID: 36848827
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Event-Triggered Distributed State Estimation for Cyber-Physical Systems Under DoS Attacks.
    Liu Y; Yang GH
    IEEE Trans Cybern; 2022 May; 52(5):3620-3631. PubMed ID: 32915758
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach.
    Li YG; Yang GH; Wang X
    ISA Trans; 2023 Jun; 137():1-12. PubMed ID: 36725413
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.