These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

114 related articles for article (PubMed ID: 37028391)

  • 1. Sparse Actuator Attack Detection and Identification: A Data-Driven Approach.
    Zhao Z; Xu Y; Li Y; Zhao Y; Wang B; Wen G
    IEEE Trans Cybern; 2023 Jun; 53(6):4054-4064. PubMed ID: 37028391
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Optimal Strictly Stealthy Attack Design on Cyber-Physical Systems: A Data-Driven Approach.
    Li Z; Zhao Z; Ding SX; Yang Y
    IEEE Trans Cybern; 2024 Oct; 54(10):6180-6192. PubMed ID: 38985550
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems.
    Chen J; Liu B; Li T; Hu Y
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850552
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Data-Driven False Data-Injection Attack Design and Detection in Cyber-Physical Systems.
    Zhao Z; Huang Y; Zhen Z; Li Y
    IEEE Trans Cybern; 2021 Dec; 51(12):6179-6187. PubMed ID: 32086230
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Secure Control Learning Framework for Cyber-Physical Systems Under Sensor and Actuator Attacks.
    Zhou Y; Vamvoudakis KG; Haddad WM; Jiang ZP
    IEEE Trans Cybern; 2021 Sep; 51(9):4648-4660. PubMed ID: 32735543
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Representation-Learning-Based CNN for Intelligent Attack Localization and Recovery of Cyber-Physical Power Systems.
    Lu KD; Zhou L; Wu ZG
    IEEE Trans Neural Netw Learn Syst; 2024 May; 35(5):6145-6155. PubMed ID: 37030822
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Attack estimation and state reconstruction for cyber-physical systems with state delay via reduced-order observer.
    Piao X; Lin C; Zhang M; Chen B
    ISA Trans; 2024 Jan; 144():11-17. PubMed ID: 37891071
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks.
    Huang X; Dong J
    IEEE Trans Cybern; 2018 Dec; 48(12):3432-3439. PubMed ID: 29994296
    [TBL] [Abstract][Full Text] [Related]  

  • 9. ExtHT: A hybrid tracing method for cyber-attacks in power industrial control systems.
    Chen YR; Wang Y; Huang GR; Li JE
    ISA Trans; 2023 May; 136():1-15. PubMed ID: 36357220
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Cyber-attack method and perpetrator prediction using machine learning algorithms.
    Bilen A; Ă–zer AB
    PeerJ Comput Sci; 2021; 7():e475. PubMed ID: 33954249
    [TBL] [Abstract][Full Text] [Related]  

  • 11. CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks.
    Baek Y; Shin S
    Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408251
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Detection and Identification of Cyber and Physical Attacks on Distribution Power Grids with PVs: An Online High-Dimensional Data-driven Approach.
    Li F; Xie R; Yang B; Guo L; Ma P; Shi J; Ye J; Song W
    IEEE J Emerg Sel Top Power Electron; 2022 Feb; 10(1):1282-1291. PubMed ID: 36090809
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Data-Driven Discovery of Block-Oriented Nonlinear Models Using Sparse Null-Subspace Methods.
    Li J; Li X; Zhang HT; Chen G; Yuan Y
    IEEE Trans Cybern; 2022 May; 52(5):3794-3804. PubMed ID: 32946407
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security correction control of stochastic cyber-physical systems subject to false data injection attacks with heterogeneous effects.
    Dong L; Xu H; Wei X; Hu X
    ISA Trans; 2022 Apr; 123():1-13. PubMed ID: 34092392
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Observer-based H
    Wang M; Liu Y; Xu B
    ISA Trans; 2020 Sep; 104():1-14. PubMed ID: 31955945
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Secure control design for nonlinear cyber-physical systems under DoS, replay, and deception cyber-attacks with multiple transmission channels.
    Tahoun AH; Arafa M
    ISA Trans; 2022 Sep; 128(Pt B):294-308. PubMed ID: 34953583
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Summation Detector for False Data-Injection Attack in Cyber-Physical Systems.
    Ye D; Zhang TY
    IEEE Trans Cybern; 2020 Jun; 50(6):2338-2345. PubMed ID: 31170086
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Novel Cyber Attack Detection Method in Networked Control Systems.
    Mousavinejad E; Yang F; Han QL; Vlacic L
    IEEE Trans Cybern; 2018 Nov; 48(11):3254-3264. PubMed ID: 29994687
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Cooperative control for cyber-physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks.
    Tahoun AH; Arafa M
    ISA Trans; 2021 Apr; 110():1-14. PubMed ID: 33039167
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Reliable cooperative control and plug-and-play operation for networked heterogeneous systems under cyber-physical attacks.
    Huang X; Dong J
    ISA Trans; 2020 Sep; 104():62-72. PubMed ID: 31690455
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.