Optimal stealthy deception attack strategy under energy constraints DOI
Xin Chen, Lianghong Peng,

Y. G. Yi

и другие.

Communications in Nonlinear Science and Numerical Simulation, Год журнала: 2024, Номер unknown, С. 108423 - 108423

Опубликована: Ноя. 1, 2024

Язык: Английский

Learning Scalable Task Assignment with Imperative-Priori Conflict Resolution in Multi-UAV Adversarial Swarm Defense Problem DOI

Zhixin Zhao,

Jie Chen, Bin Xin

и другие.

Journal of Systems Science and Complexity, Год журнала: 2024, Номер 37(1), С. 369 - 388

Опубликована: Фев. 1, 2024

Язык: Английский

Процитировано

1

Predefined time fuzzy adaptive tracking control for nonlinear cyber physical systems with unmeasurable states and FDI attacks DOI
Ge Lu, Kewen Li, Yongming Li

и другие.

Nonlinear Dynamics, Год журнала: 2024, Номер unknown

Опубликована: Окт. 3, 2024

Язык: Английский

Процитировано

1

A Comprehensive Survey on Game Theory Applications in Cyber-Physical System Security: Attack Models, Security Analyses, and Machine Learning Classifications DOI Creative Commons
Hana Mejdi, Sami Elmadssia, Mohamed Koubàa

и другие.

IEEE Access, Год журнала: 2024, Номер 12, С. 163638 - 163653

Опубликована: Янв. 1, 2024

Язык: Английский

Процитировано

1

Data-Driven Event-Triggered Sliding Mode Secure Control for Autonomous Vehicles Under Actuator Attacks DOI
Hongtao Sun, Xinran Chen, Zhengqiang Zhang

и другие.

IEEE Transactions on Cybernetics, Год журнала: 2024, Номер 55(1), С. 436 - 446

Опубликована: Ноя. 14, 2024

This article investigates a comprehensive data-driven event-triggered secure lateral control of autonomous vehicles under actuator attacks. We consider stabilization issues subject to modeling difficulties, limited communication resources, and The dynamic model decomposition (DMD) from data is exploited characterize the inherent dynamics vehicles, transmission scheme utilized alleviate burden for bandwidth network, sliding mode designed ensure security stability analysis method as well its algorithm are presented. proposed can actively counteract malicious effects caused by attacks integrates advantages both model-based design. Finally, several comparative case studies show effectiveness scheme.

Язык: Английский

Процитировано

1

A Lateral Control Method of Intelligent Vehicles Based on Shared Control DOI Open Access
Gang Li,

Pengfei Shang,

Changbing Zheng

и другие.

Symmetry, Год журнала: 2022, Номер 14(11), С. 2447 - 2447

Опубликована: Ноя. 18, 2022

This paper studies the lateral control problem for intelligent vehicles based on concept of shared control. Considering participation drivers in loop, a control-based controller is designed, which consists two differed controllers: one an LQR-based autonomous driving and other driver’s intention-based fuzzy controller. For vehicle dynamic model with two-degrees freedom, LQR are designed. Then, constructed, integrates aforementioned controllers. Finally, co-simulation by MATLAB/Simulink Carsim presented. Furthermore, simulation results show that designed can track desired path better performance than

Язык: Английский

Процитировано

5

Resilient Control of Smart Microgrids Based on Reliable Estimation DOI

Shaohang Lu,

Zhengce Liu,

Kezhen Han

и другие.

2021 IEEE International Conference on Unmanned Systems (ICUS), Год журнала: 2023, Номер unknown, С. 624 - 629

Опубликована: Окт. 13, 2023

With the development of times, traditional power system can no longer meet electricity demand modern society, so through deep integration systems and sensing technology communication technology, a new type smart grid has been formed. Although this achieved efficient operation regulation, it also increases complexity openness grid, making face security issues potential Cyber-physical attacks. The attacker achieve significant change in output False Data Injection Attack(FDIA), then deceive chi-square tests based on Kalman Filter. In order to solve above problems, paper adopts framework that uses Filter cloud an Unknown Input Observer (UIO) locally. way when is attacked by stealthy attacks, be used locally control for short period time, eliminating attacker's influence system. Finally channel between local protected encryption using encrypted operators. At same operator strengthen accuracy attack detection. This verifies effectiveness method simulation experiments.

Язык: Английский

Процитировано

2

Adversarial Attacks on Clustering Coefficient in Complex Networks DOI
Bo Zhou, Xiudi Yan, Yuqian Lv

и другие.

IEEE Transactions on Circuits & Systems II Express Briefs, Год журнала: 2023, Номер 71(4), С. 2199 - 2203

Опубликована: Ноя. 30, 2023

The clustering coefficient is a crucial characteristic of networks, providing insights into their local compactness. However, concerns arise regarding the coefficient's robustness when networks are subjected to adversarial attacks. In this paper, we introduce and formalize concept attack propose an efficient strategy it by rewiring small number links. Our approach leverages Simulated Annealing (SA) create method. We conduct extensive experiments on five real-world validate vulnerability under Surprisingly, find that disturbing as little 1% edges can lead increase over 50% in coefficient. These results underscore pressing need explore ways enhance against such attacks future research. Addressing challenge could be intriguing avenue for further investigation.

Язык: Английский

Процитировано

2

Security Defense of Large-Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach DOI
Yuhan Suo, Senchun Chai, Runqi Chai

и другие.

IEEE Transactions on Information Forensics and Security, Год журнала: 2023, Номер 19, С. 1908 - 1921

Опубликована: Дек. 5, 2023

In large-scale networks, communication links between nodes are easily injected with false data by adversaries. This paper proposes a novel security defense strategy from the perspective of attack detection scheduling to ensure network. Based on proposed strategy, each sensor can directly exclude suspicious sensors its neighboring set. First, problem selecting is formulated as combinatorial optimization problem, which non-deterministic polynomial-time hard (NP-hard). To solve this original function transformed into submodular function. Then, we propose an algorithm based sequential theory, incorporates expert better utilize historical information guide selection task at current moment. For different strategies, theoretical results show that average rate has lower bound, and error expectation bounded. addition, under two kinds insecurity conditions, guarantee entire network augmented estimation error. Finally, effectiveness developed method verified numerical simulation practical experiment.

Язык: Английский

Процитировано

2

A Resilient Distributed Kalman Filtering Under Bidirectional Stealthy Attack DOI
Wenjie Ding, Wen Yang, Chao Yang

и другие.

IEEE Signal Processing Letters, Год журнала: 2024, Номер 31, С. 356 - 360

Опубликована: Янв. 1, 2024

False data injection attacks are widely investigated to exploit the cyber-vulnerability of Cyber-Physical System. However, existing attack policies only consider in one-way communication channel. In this letter, a bidirectional stealthy false is proposed bypass hostile detector and degrade estimation performance distributed Kalman filtering system. The stealthiness influence demonstrated by theoretical analysis. Furthermore, alternate transmission protocol prevent policy. To remedy improve detection sensitivity, an with multiple factors proposed. Besides, choosing principle analyzed. Simulation examples presented investigate developed estimator.

Язык: Английский

Процитировано

0

Finite-Time Fuzzy Adaptive Output Feedback Resilient Control of Nonlinear Cyber-Physical Systems with Sensor Attacks and Actuator Faults DOI

Xianrui Fan,

Yongming Li, Shaocheng Tong

и другие.

Journal of Systems Science and Complexity, Год журнала: 2024, Номер 37(4), С. 1545 - 1560

Опубликована: Июнь 11, 2024

Язык: Английский

Процитировано

0