These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

107 related articles for article (PubMed ID: 37015631)

  • 1. Optimal Innovation-Based Stealthy Attacks in Networked LQG Systems With Attack Cost.
    Jin K; Ye D
    IEEE Trans Cybern; 2024 Feb; 54(2):787-796. PubMed ID: 37015631
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Kullback-Leibler Divergence-Based Optimal Stealthy Sensor Attack Against Networked Linear Quadratic Gaussian Systems.
    Ren XX; Yang GH
    IEEE Trans Cybern; 2022 Nov; 52(11):11539-11548. PubMed ID: 33872173
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Optimal Stealthy Deception Attack Against Cyber-Physical Systems.
    Zhang Q; Liu K; Xia Y; Ma A
    IEEE Trans Cybern; 2020 Sep; 50(9):3963-3972. PubMed ID: 31071059
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems.
    Chen J; Liu B; Li T; Hu Y
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850552
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach.
    Li YG; Yang GH; Wang X
    ISA Trans; 2023 Jun; 137():1-12. PubMed ID: 36725413
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Data-Driven Methods for Stealthy Attacks on TCP/IP-Based Networked Control Systems Equipped With Attack Detectors.
    Wang JS; Yang GH
    IEEE Trans Cybern; 2019 Aug; 49(8):3020-3031. PubMed ID: 29994347
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.
    Guo H; Sun J; Pang ZH
    ISA Trans; 2022 Aug; 127():32-40. PubMed ID: 35292173
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems.
    Guo H; Sun J; Pang ZH; Liu GP
    IEEE Trans Cybern; 2023 Oct; 53(10):6714-6724. PubMed ID: 37030790
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks.
    Zhang Q; Liu K; Pang Z; Xia Y; Liu T
    IEEE Trans Cybern; 2022 Jun; 52(6):4926-4934. PubMed ID: 33119521
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation.
    Liu X; Yang GH
    IEEE Trans Cybern; 2024 Jun; 54(6):3577-3587. PubMed ID: 37768802
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Security Analysis of Distributed Consensus Filtering Under Replay Attacks.
    Huang J; Yang W; Ho DWC; Li F; Tang Y
    IEEE Trans Cybern; 2024 Jun; 54(6):3526-3539. PubMed ID: 37651475
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Privacy-Preserving Design of Scalar LQG Control.
    Ferrari E; Tian Y; Sun C; Li Z; Wang C
    Entropy (Basel); 2022 Jun; 24(7):. PubMed ID: 35885079
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Estimation and LQG Control Over Unreliable Network With Acknowledgment Randomly Lost.
    Lin H; Su H; Shi P; Lu R; Wu ZG
    IEEE Trans Cybern; 2017 Dec; 47(12):4074-4085. PubMed ID: 28113691
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Distributed interval state estimation with l
    Xie J; Zhu S; Zhang D
    ISA Trans; 2022 Aug; 127():22-31. PubMed ID: 35086672
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Optimal Data Injection Attacks in Cyber-Physical Systems.
    Wu G; Sun J; Chen J
    IEEE Trans Cybern; 2018 Dec; 48(12):3302-3312. PubMed ID: 29994695
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Security tracking control for discrete-time stochastic systems subject to cyber attacks.
    Yu Y; Liu GP; Hu W
    ISA Trans; 2022 Aug; 127():133-145. PubMed ID: 35216807
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Observer-based H
    Wang M; Liu Y; Xu B
    ISA Trans; 2020 Sep; 104():1-14. PubMed ID: 31955945
    [TBL] [Abstract][Full Text] [Related]  

  • 18. False Data Injection Attack for Cyber-Physical Systems With Resource Constraint.
    Li F; Tang Y
    IEEE Trans Cybern; 2020 Feb; 50(2):729-738. PubMed ID: 30307888
    [TBL] [Abstract][Full Text] [Related]  

  • 19. False-Data-Injection Attacks on Remote Distributed Consensus Estimation.
    Liu H; Niu B; Li Y
    IEEE Trans Cybern; 2022 Jan; 52(1):433-443. PubMed ID: 32310810
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Trust-based fault detection and robust fault-tolerant control of uncertain cyber-physical systems against time-delay injection attacks.
    Baromand S; Zaman A; Mihaylova L
    Heliyon; 2021 Jun; 7(6):e07294. PubMed ID: 34189323
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.