Communications in Nonlinear Science and Numerical Simulation, Год журнала: 2024, Номер unknown, С. 108423 - 108423
Опубликована: Ноя. 1, 2024
Язык: Английский
Communications in Nonlinear Science and Numerical Simulation, Год журнала: 2024, Номер unknown, С. 108423 - 108423
Опубликована: Ноя. 1, 2024
Язык: Английский
Journal of Systems Science and Complexity, Год журнала: 2024, Номер 37(1), С. 369 - 388
Опубликована: Фев. 1, 2024
Язык: Английский
Процитировано
1Nonlinear Dynamics, Год журнала: 2024, Номер unknown
Опубликована: Окт. 3, 2024
Язык: Английский
Процитировано
1IEEE Access, Год журнала: 2024, Номер 12, С. 163638 - 163653
Опубликована: Янв. 1, 2024
Язык: Английский
Процитировано
1IEEE Transactions on Cybernetics, Год журнала: 2024, Номер 55(1), С. 436 - 446
Опубликована: Ноя. 14, 2024
This article investigates a comprehensive data-driven event-triggered secure lateral control of autonomous vehicles under actuator attacks. We consider stabilization issues subject to modeling difficulties, limited communication resources, and The dynamic model decomposition (DMD) from data is exploited characterize the inherent dynamics vehicles, transmission scheme utilized alleviate burden for bandwidth network, sliding mode designed ensure security stability analysis method as well its algorithm are presented. proposed can actively counteract malicious effects caused by attacks integrates advantages both model-based design. Finally, several comparative case studies show effectiveness scheme.
Язык: Английский
Процитировано
1Symmetry, Год журнала: 2022, Номер 14(11), С. 2447 - 2447
Опубликована: Ноя. 18, 2022
This paper studies the lateral control problem for intelligent vehicles based on concept of shared control. Considering participation drivers in loop, a control-based controller is designed, which consists two differed controllers: one an LQR-based autonomous driving and other driver’s intention-based fuzzy controller. For vehicle dynamic model with two-degrees freedom, LQR are designed. Then, constructed, integrates aforementioned controllers. Finally, co-simulation by MATLAB/Simulink Carsim presented. Furthermore, simulation results show that designed can track desired path better performance than
Язык: Английский
Процитировано
52021 IEEE International Conference on Unmanned Systems (ICUS), Год журнала: 2023, Номер unknown, С. 624 - 629
Опубликована: Окт. 13, 2023
With the development of times, traditional power system can no longer meet electricity demand modern society, so through deep integration systems and sensing technology communication technology, a new type smart grid has been formed. Although this achieved efficient operation regulation, it also increases complexity openness grid, making face security issues potential Cyber-physical attacks. The attacker achieve significant change in output False Data Injection Attack(FDIA), then deceive chi-square tests based on Kalman Filter. In order to solve above problems, paper adopts framework that uses Filter cloud an Unknown Input Observer (UIO) locally. way when is attacked by stealthy attacks, be used locally control for short period time, eliminating attacker's influence system. Finally channel between local protected encryption using encrypted operators. At same operator strengthen accuracy attack detection. This verifies effectiveness method simulation experiments.
Язык: Английский
Процитировано
2IEEE Transactions on Circuits & Systems II Express Briefs, Год журнала: 2023, Номер 71(4), С. 2199 - 2203
Опубликована: Ноя. 30, 2023
The clustering coefficient is a crucial characteristic of networks, providing insights into their local compactness. However, concerns arise regarding the coefficient's robustness when networks are subjected to adversarial attacks. In this paper, we introduce and formalize concept attack propose an efficient strategy it by rewiring small number links. Our approach leverages Simulated Annealing (SA) create method. We conduct extensive experiments on five real-world validate vulnerability under Surprisingly, find that disturbing as little 1% edges can lead increase over 50% in coefficient. These results underscore pressing need explore ways enhance against such attacks future research. Addressing challenge could be intriguing avenue for further investigation.
Язык: Английский
Процитировано
2IEEE Transactions on Information Forensics and Security, Год журнала: 2023, Номер 19, С. 1908 - 1921
Опубликована: Дек. 5, 2023
In large-scale networks, communication links between nodes are easily injected with false data by adversaries. This paper proposes a novel security defense strategy from the perspective of attack detection scheduling to ensure network. Based on proposed strategy, each sensor can directly exclude suspicious sensors its neighboring set. First, problem selecting is formulated as combinatorial optimization problem, which non-deterministic polynomial-time hard (NP-hard). To solve this original function transformed into submodular function. Then, we propose an algorithm based sequential theory, incorporates expert better utilize historical information guide selection task at current moment. For different strategies, theoretical results show that average rate has lower bound, and error expectation bounded. addition, under two kinds insecurity conditions, guarantee entire network augmented estimation error. Finally, effectiveness developed method verified numerical simulation practical experiment.
Язык: Английский
Процитировано
2IEEE Signal Processing Letters, Год журнала: 2024, Номер 31, С. 356 - 360
Опубликована: Янв. 1, 2024
False data injection attacks are widely investigated to exploit the cyber-vulnerability of Cyber-Physical System. However, existing attack policies only consider in one-way communication channel. In this letter, a bidirectional stealthy false is proposed bypass hostile detector and degrade estimation performance distributed Kalman filtering system. The stealthiness influence demonstrated by theoretical analysis. Furthermore, alternate transmission protocol prevent policy. To remedy improve detection sensitivity, an with multiple factors proposed. Besides, choosing principle analyzed. Simulation examples presented investigate developed estimator.
Язык: Английский
Процитировано
0Journal of Systems Science and Complexity, Год журнала: 2024, Номер 37(4), С. 1545 - 1560
Опубликована: Июнь 11, 2024
Язык: Английский
Процитировано
0