Analysis of Replay Attacks With Countermeasure for State Estimation of Cyber-Physical Systems DOI
Haibin Guo, Jian Sun, Zhong‐Hua Pang

и другие.

IEEE Transactions on Circuits & Systems II Express Briefs, Год журнала: 2023, Номер 71(1), С. 206 - 210

Опубликована: Авг. 4, 2023

This paper studies the security issue of remote state estimation cyber-physical systems under replay attacks, where measurement residual is computed in smart sensors and then transmitted to a estimator. Firstly, compromised error covariance derived analyze effect attacks on system performance. Next, estimate based coding detection scheme proposed, which utilizes information encode decode residual. Compared with existing works, developed only uses information, not introduces extra information. Furthermore, design principle matrix deduced for sake being able assist residual-based detector successfully expose such attacks. Finally, simulation results are provided verify performance effectiveness scheme.

Язык: Английский

A survey on privacy-preserving control and filtering of networked control systems DOI
Wei Wang, Lifeng Ma,

Qiangqiang Rui

и другие.

International Journal of Systems Science, Год журнала: 2024, Номер 55(11), С. 2269 - 2288

Опубликована: Апрель 30, 2024

Язык: Английский

Процитировано

17

Analysis of Stealthy False Data Injection Attacks Against Networked Control Systems: Three Case Studies DOI
Zhong‐Hua Pang, Yuan Fu, Haibin Guo

и другие.

Journal of Systems Science and Complexity, Год журнала: 2023, Номер 36(4), С. 1407 - 1422

Опубликована: Апрель 2, 2023

Язык: Английский

Процитировано

30

Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems DOI
Haibin Guo, Jian Sun, Zhong‐Hua Pang

и другие.

IEEE Transactions on Cybernetics, Год журнала: 2023, Номер 53(10), С. 6714 - 6724

Опубликована: Март 27, 2023

Security is a crucial issue for cyber-physical systems, and has become hot topic up to date. From the perspective of malicious attackers, this article aims devise an efficient scheme on false data-injection (FDI) attacks such that performance remote state estimation degraded as much possible. First, event-based stealthy FDI attack mechanism introduced selectively inject data while evading residual-based anomaly detector. Compared with some existing methods, main advantage it decides when launch dynamically according real-time residuals. Second, error covariance compromised system used evaluate degradation under attacks, larger covariance, more degradation. Moreover, stealthiness constraints, optimal strategy presented maximize trace covariance. Finally, simulation experiments are carried out illustrate superiority proposed method compared ones.

Язык: Английский

Процитировано

27

Private bipartite consensus control for multi-agent systems: A hierarchical differential privacy scheme DOI
Chen Gao, Di Zhao, Jiahui Li

и другие.

Information Fusion, Год журнала: 2024, Номер 105, С. 102259 - 102259

Опубликована: Янв. 17, 2024

Язык: Английский

Процитировано

11

Observer-Based Fuzzy PID Tracking Control Under Try-Once-Discard Communication Protocol: An Affine Fuzzy Model Approach DOI
Yezheng Wang, Zidong Wang, Lei Zou

и другие.

IEEE Transactions on Fuzzy Systems, Год журнала: 2024, Номер 32(4), С. 2352 - 2365

Опубликована: Янв. 5, 2024

In this article, the problem of observer-based fuzzy proportional–integral–derivative (PID) tracking control is studied for networked nonlinear systems subject to protocol constraints and norm-bounded noises. The plant under consideration represented by an affine model with immeasurable premise variables. utilization try-once-discard proposed information exchange between sensors controller, in order mitigate data transmission burden. An PID controller put forward achieve desired task handle variables, sufficient given both available measurements reference trajectory. By analyzing dynamics controlled error system through construction a piecewise Lyapunov-like functional, exponential ultimate boundedness ensured. parameters are designed using convex optimization technique matrix theory, such that exponentially ultimately bounded. Finally, validity merits developed design method verified simulation example.

Язык: Английский

Процитировано

9

Quantized Distributed Economic Dispatch for Microgrids: Paillier Encryption–Decryption Scheme DOI
Wei Chen, Zidong Wang, Quanbo Ge

и другие.

IEEE Transactions on Industrial Informatics, Год журнала: 2024, Номер 20(4), С. 6552 - 6562

Опубликована: Янв. 15, 2024

This article is concerned with the secure distributed economic dispatch (DED) problem of microgrids. A quantized optimization algorithm using Paillier encryption–decryption scheme developed. designed to optimally coordinate power outputs a collection generators (DGs) in order meet total load demand at lowest generation cost under DG capacity limits while ensuring communication efficiency and security. First, facilitate data encryption reduce release, novel dynamic quantization integrated into DED algorithm, through which effects errors can be eliminated. Next, utilizing matrix norm analysis mathematical induction, sufficient condition provided demonstrate that developed converges precisely optimal solution finite levels (and even three-level sign transmissions). Moreover, an based on outputs, ensures confidential by leveraging homomorphic property cryptosystem. Finally, effectiveness superiority implemented are confirmed simulated example.

Язык: Английский

Процитировано

9

A novel contrastive adversarial network for minor-class data augmentation: Applications to pipeline fault diagnosis DOI
Chuang Wang, Zidong Wang, Lifeng Ma

и другие.

Knowledge-Based Systems, Год журнала: 2023, Номер 271, С. 110516 - 110516

Опубликована: Март 29, 2023

Язык: Английский

Процитировано

22

Residual-Based False Data Injection Attacks Against Multi-Sensor Estimation Systems DOI
Haibin Guo, Jian Sun, Zhong‐Hua Pang

и другие.

IEEE/CAA Journal of Automatica Sinica, Год журнала: 2023, Номер 10(5), С. 1181 - 1191

Опубликована: Май 1, 2023

This paper investigates the security issue of multi-sensor remote estimation systems. An optimal stealthy false data injection (FDI) attack scheme based on historical and current residuals, which only tampers with measurement residuals partial sensors due to limited resources, is proposed maximally degrade system performance. The stealthiness condition given, then error covariance in compromised state derived quantify performance under attack. strategy obtained by solving several convex optimization problems maximize trace subject condition. Moreover, constraint selection principle attacked sensor provided determine so as hold most impact Finally, simulation results are presented verify theoretical analysis.

Язык: Английский

Процитировано

22

Support-Sample-Assisted Domain Generalization via Attacks and Defenses: Concepts, Algorithms, and Applications to Pipeline Fault Diagnosis DOI
Chuang Wang, Zidong Wang, Qinyuan Liu

и другие.

IEEE Transactions on Industrial Informatics, Год журнала: 2024, Номер 20(4), С. 6413 - 6423

Опубликована: Янв. 9, 2024

This article is concerned with domain generalization (DG), a practical yet challenging scenario in transfer learning where the target data are not available advance. The key insight of DG focused on robust model that can generalize to unseen by leveraging knowledge from source domain. To this end, we propose novel algorithm known as support-sample-assisted Adversarial Attacks (SSAA) for DG. In SSAA algorithm, an attack–defense strategy deployed enhance model's generalizability and transferability. includes nontargeted attack stage, during which samples generated form pseudotarget domains near-realistic covariate shifts. Subsequently, defense biclassifier structure used distinguish support samples. These new decision boundary encompassing all samples, prompting extension existing meet these Experimental results cross-domain fault diagnosis tasks suggest outperforms current state-of-the-art methods, indicating promising avenue further development.

Язык: Английский

Процитировано

8

Adaptive fuzzy consensus secure control of stochastic nonlinear multi-agent systems with false data injection attacks DOI
Hui Li, Shaocheng Tong

International Journal of Systems Science, Год журнала: 2024, Номер 55(6), С. 1191 - 1205

Опубликована: Янв. 23, 2024

This paper discusses the fuzzy adaptive consensus secure control problem for a class of stochastic nonlinear multi-agent systems (MASs) with unknown false data injection attacks. Fuzzy logic (FLSs) are used to model functions. A distributed filter is proposed obtain information leader since leaders only available partial agents. To deal virtual time-varying gains caused by attacks, an compensation method developed via re-codesigning controllers. Based on backstepping methodology and bounded estimation algorithms, controller proposed. It proved that all signals in closed-loop probability, output followers can track under Finally, simulation results comparative show effectiveness method.

Язык: Английский

Процитировано

8