These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

121 related articles for article (PubMed ID: 38339566)

  • 1. Allocation of Eavesdropping Attacks for Multi-System Remote State Estimation.
    Chang X; Peng L; Zhang S
    Sensors (Basel); 2024 Jan; 24(3):. PubMed ID: 38339566
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Learning-Based DoS Attack Power Allocation in Multiprocess Systems.
    Huang M; Ding K; Dey S; Li Y; Shi L
    IEEE Trans Neural Netw Learn Syst; 2023 Oct; 34(10):8017-8030. PubMed ID: 35167483
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Optimal Transmit Power Allocation for an Energy-Harvesting Sensor in Wireless Cyber-Physical Systems.
    Peng L; Cao X; Sun C
    IEEE Trans Cybern; 2021 Feb; 51(2):779-788. PubMed ID: 31545762
    [TBL] [Abstract][Full Text] [Related]  

  • 4. An Analysis on Optimal Attack Schedule Based on Channel Hopping Scheme in Cyber-Physical Systems.
    Gan R; Xiao Y; Shao J; Qin J
    IEEE Trans Cybern; 2021 Feb; 51(2):994-1003. PubMed ID: 31107677
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Energy scheduling for DoS attack over multi-hop networks: Deep reinforcement learning approach.
    Yang L; Tao J; Liu YH; Xu Y; Su CY
    Neural Netw; 2023 Apr; 161():735-745. PubMed ID: 36848827
    [TBL] [Abstract][Full Text] [Related]  

  • 6. On Two Sensors Scheduling for Remote State Estimation With a Shared Memory Channel in a Cyber-Physical System Environment.
    Wei J; Ye D
    IEEE Trans Cybern; 2023 Apr; 53(4):2225-2235. PubMed ID: 34587110
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Double Threshold Structure of Sensor Scheduling Policy Over a Finite-State Markov Channel.
    Wei J; Ye D
    IEEE Trans Cybern; 2023 Nov; 53(11):7323-7332. PubMed ID: 36037452
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Fusion and detection for multi-sensor systems under false data injection attacks.
    Hua J; Hao F
    ISA Trans; 2023 Jan; 132():222-234. PubMed ID: 35764424
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach.
    Li YG; Yang GH; Wang X
    ISA Trans; 2023 Jun; 137():1-12. PubMed ID: 36725413
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.
    Guo H; Sun J; Pang ZH
    ISA Trans; 2022 Aug; 127():32-40. PubMed ID: 35292173
    [TBL] [Abstract][Full Text] [Related]  

  • 11. False Data Injection Attack for Cyber-Physical Systems With Resource Constraint.
    Li F; Tang Y
    IEEE Trans Cybern; 2020 Feb; 50(2):729-738. PubMed ID: 30307888
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Secure dimensionality reduction fusion estimation against eavesdroppers in cyber-physical systems.
    Xu D; Chen B; Yu L; Zhang WA
    ISA Trans; 2020 Sep; 104():154-161. PubMed ID: 31757361
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Jamming attack against remote state estimation over multiple wireless channels: A reinforcement learning based game theoretical approach.
    Xue L; Ma B; Liu J; Yu Y
    ISA Trans; 2022 Nov; 130():1-9. PubMed ID: 35341584
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security and eavesdropping in terahertz wireless links.
    Ma J; Shrestha R; Adelberg J; Yeh CY; Hossain Z; Knightly E; Jornet JM; Mittleman DM
    Nature; 2018 Nov; 563(7729):89-93. PubMed ID: 30323288
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Scheduling Strategy Design Framework for Cyber-Physical System with Non-Negligible Propagation Delay.
    An Z; Wu S; Liu T; Jiao J; Zhang Q
    Entropy (Basel); 2021 Jun; 23(6):. PubMed ID: 34199779
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Observer-based H
    Wang M; Liu Y; Xu B
    ISA Trans; 2020 Sep; 104():1-14. PubMed ID: 31955945
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks.
    Chen B; Ho DWC; Hu G; Yu L; Bo Chen ; Ho DWC; Guoqiang Hu ; Li Yu ; Chen B; Ho DWC; Hu G; Yu L
    IEEE Trans Cybern; 2018 Jun; 48(6):1862-1876. PubMed ID: 28682270
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Secure Estimation for Cyber-Physical Systems via Sliding Mode.
    Wu C; Hu Z; Liu J; Wu L
    IEEE Trans Cybern; 2018 Dec; 48(12):3420-3431. PubMed ID: 29994041
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Remote State Estimation of Nonlinear Systems Over Fading Channels via Recurrent Neural Networks.
    Cai S; Lau VKN
    IEEE Trans Neural Netw Learn Syst; 2022 Aug; 33(8):3908-3922. PubMed ID: 33566773
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.
    Li Z; Jing T; Ma L; Huo Y; Qian J
    Sensors (Basel); 2016 Mar; 16(3):. PubMed ID: 26959032
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.