咨询与建议

限定检索结果

文献类型

  • 273 篇 期刊文献
  • 141 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 416 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 402 篇 工学
    • 266 篇 电气工程
    • 135 篇 计算机科学与技术...
    • 73 篇 控制科学与工程
    • 62 篇 石油与天然气工程
    • 56 篇 信息与通信工程
    • 18 篇 动力工程及工程热...
    • 18 篇 软件工程
    • 16 篇 网络空间安全
    • 15 篇 仪器科学与技术
    • 10 篇 机械工程
    • 8 篇 电子科学与技术(可...
    • 8 篇 交通运输工程
    • 7 篇 土木工程
    • 5 篇 化学工程与技术
    • 4 篇 材料科学与工程(可...
    • 4 篇 航空宇航科学与技...
    • 3 篇 环境科学与工程(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 建筑学
  • 39 篇 管理学
    • 38 篇 管理科学与工程(可...
  • 32 篇 理学
    • 24 篇 数学
    • 12 篇 系统科学
    • 5 篇 化学
    • 2 篇 生物学
    • 1 篇 物理学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 416 篇 false data injec...
  • 86 篇 state estimation
  • 68 篇 smart grid
  • 26 篇 cyber-physical s...
  • 25 篇 cyber-physical s...
  • 22 篇 deep learning
  • 21 篇 cyber security
  • 20 篇 attack detection
  • 19 篇 power system sta...
  • 19 篇 smart grids
  • 19 篇 cybersecurity
  • 18 篇 machine learning
  • 16 篇 cyberattack
  • 14 篇 data models
  • 12 篇 power systems
  • 12 篇 microgrids
  • 12 篇 security
  • 12 篇 power system sec...
  • 12 篇 microgrid
  • 11 篇 observers

机构

  • 7 篇 nanyang technol ...
  • 7 篇 zhejiang univ st...
  • 6 篇 zhejiang univ co...
  • 6 篇 yanshan univ sch...
  • 5 篇 beijing inst tec...
  • 5 篇 hunan univ coll ...
  • 5 篇 univ wisconsin d...
  • 5 篇 north china elec...
  • 5 篇 southeast univ s...
  • 5 篇 univ sydney sch ...
  • 4 篇 southeast univ s...
  • 3 篇 shenzhen inst ar...
  • 3 篇 northeast elect ...
  • 3 篇 indian inst tech...
  • 3 篇 nanyang technol ...
  • 3 篇 east china univ ...
  • 3 篇 iit dept elect &...
  • 3 篇 zhejiang univ te...
  • 3 篇 univ hong kong d...
  • 3 篇 kansas state uni...

作者

  • 10 篇 mukherjee debott...
  • 8 篇 deng ruilong
  • 7 篇 dong zhao yang
  • 7 篇 zhang zhenyong
  • 7 篇 wang lingfeng
  • 7 篇 yang wen
  • 6 篇 li li
  • 6 篇 luo fengji
  • 6 篇 liang gaoqi
  • 6 篇 xiang yingmeng
  • 5 篇 yang chao
  • 5 篇 liu mengxiang
  • 4 篇 chakraborty samr...
  • 4 篇 liu bo
  • 4 篇 wang xinyu
  • 4 篇 zhao junhua
  • 4 篇 ameli amir
  • 4 篇 zhao junbo
  • 4 篇 luo xiaoyuan
  • 4 篇 xia yuanqing

语言

  • 409 篇 英文
  • 5 篇 其他
  • 2 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"主题词=False data injection attack"
416 条 记 录,以下是1-10 订阅
排序:
Sliding mode control strategy based on intermediate variable observer for cyber-physical systems under false data injection attack
收藏 引用
PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART I-JOURNAL OF SYSTEMS AND CONTROL ENGINEERING 2025年
作者: Chen, Yunjun Liang, Zhanchuo Zhang, Lu Tiangong Univ Sch Control Sci & Engn 399 Binshuixidao Tianjin 300387 Peoples R China Tiangong Univ Tianjin Key Lab Intelligent Control Elect Equipmen Tianjin Peoples R China
A sliding mode control problem based on intermediate variable observer for non-linear cyber-physical systems in the existence of false data injection attack on actuator is investigated in this article. By constructing... 详细信息
来源: 评论
Submodularity-Based false data injection attack Strategy in DC Microgrids
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2025年 20卷 2342-2356页
作者: Liu, Qi Zhao, Chengcheng Liu, Mengxiang Deng, Ruilong Cheng, Peng Zhejiang Univ State Key Lab Ind Control Technol Hangzhou 310027 Peoples R China Zhejiang Univ Coll Control Sci & Engn Hangzhou 310027 Peoples R China Univ Sheffield Dept Automat Control & Syst Engn Sheffield S10 2TN England
Despite significantly enhancing system flexibility and reliability, the adoption of distributed secondary control in DC microgrids (DCmGs) introduces new vulnerabilities to false data injection (FDI) attacks. As a typ... 详细信息
来源: 评论
Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition
收藏 引用
SCIENTIFIC REPORTS 2025年 第1期15卷 1-31页
作者: Alrslani, Faheed A. F. Alohali, Manal Abdullah Aljebreen, Mohammed Alqahtani, Hamed Alshuhail, Asma Alshammeri, Menwa Almukadi, Wafa Sulaiman Northern Border Univ Fac Comp & Informat Technol Dept Informat Technol Rafha Saudi Arabia Princess Nourah Bint Abdulrahman Univ Coll Comp & Informat Sci Dept Informat Syst POB 84428 Riyadh 11671 Saudi Arabia King Saud Univ Community Coll Dept Comp Sci POB 28095 Riyadh 11437 Saudi Arabia King Khalid Univ Coll Comp Sci Ctr Artificial Intelligence Dept Informat SystUnit Cybersecur Abha Saudi Arabia King Faisal Univ Coll Comp Sci & Informat Technol Dept Informat Syst Al Hufuf Saudi Arabia Jouf Univ Coll Comp & Informat Sci Dept Comp Sci Sakaka Saudi Arabia Univ Jeddah Coll Engn & Comp Sci Dept Software Engn Jeddah Saudi Arabia
Cyberattacks have given rise to several phenomena and have raised concerns among users and power system operators. When they are built to bypass state estimation bad data recognition methods executed in the convention... 详细信息
来源: 评论
false data injection attack detection for nuclear reactor based on chaotic time/frequency-hopping spread spectrum
收藏 引用
PROCESS SAFETY AND ENVIRONMENTAL PROTECTION 2023年 176卷 841-851页
作者: Huang, Yu Wang, Jiajun Gu, He Zhou, Xinpeng Xie, Jiale Wang, Dongfeng North China Elect Power Univ Dept Automat Baoding 071003 Hebei Peoples R China North China Elect Power Univ Dept Automat Yonghua Bei Rd 619 Baoding 071003 Hebei Peoples R China
false data injection (FDI) attacks represent a serious threat to securing nuclear reactor operation. Efficient FDI attack detection is essential to prevent related unforeseen nuclear accidents. However, owing to their... 详细信息
来源: 评论
false data injection attack on consensus-based distributed estimation
收藏 引用
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL 2017年 第9期27卷 1419-1432页
作者: Lei, L. Yang, W. Yang, C. Shi, H. B. East China Univ Sci & Technol Key Lab Adv Control & Optimizat Chem Proc Minist Educ Shanghai 200237 Peoples R China
We consider security issues for consensus-based distributed estimation problem. In a sensor network, an attacker with limited power injects random false data into the communication links so as to degrade the network p... 详细信息
来源: 评论
false data injection attack in a Platoon of CACC: Real-Time Detection and Isolation With a PDE Approach
收藏 引用
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 2022年 第7期23卷 8692-8703页
作者: Biroon, Roghieh A. Biron, Zoleikha Abdollahi Pisu, Pierluigi Clemson Univ Dept Elect & Comp Engn Clemson SC 29607 USA Univ Florida Dept Elect & Comp Engn Gainesville FL 32611 USA Clemson Univ Dept Automot Engn Clemson SC 29607 USA
Connected vehicles are potential solutions to address some of the existing challenges in transportation systems, such as emission, traffic congestion, and fuel consumption. However, vehicular communication networks en... 详细信息
来源: 评论
false data injection attack for Cyber-Physical Systems With Resource Constraint
收藏 引用
IEEE TRANSACTIONS ON CYBERNETICS 2020年 第2期50卷 729-738页
作者: Li, Fangfei Tang, Yang East China Univ Sci & Technol Dept Math Shanghai 200237 Peoples R China East China Univ Sci & Technol Minist Educ Key Lab Adv Control & Optimizat Chem Proc Shanghai 200237 Peoples R China
Cyber-security is of the fundamental importance for cyber-physical systems (CPSs), since CPSs are vulnerable to cyber attack. In order to make the defensive measures better, one needs to understand the behavior from t... 详细信息
来源: 评论
false data injection attack Detection Method Based on Deep Learning With Multi-Scale Feature Fusion
收藏 引用
IEEE ACCESS 2024年 12卷 89262-89274页
作者: Ji, Jinpeng Liu, Yang Chen, Jian Yao, Zhiwei Zhang, Mengdi Gong, Yanyong Shandong Univ Technol Sch Elect & Elect Engn Zibo 255000 Peoples R China Zibo Metrol Technol Res Inst Zibo 255025 Peoples R China
Cyber-attacks, especially the false data injection attack (FDIA), are gradually becoming a common way to threaten the regular operation of power grid. However, the FDIA is challenging to detect because it prevents the... 详细信息
来源: 评论
false data injection attack for Switched Systems
收藏 引用
IEEE CONTROL SYSTEMS LETTERS 2023年 7卷 1754-1759页
作者: Zhao, Rui Zuo, Zhiqiang Wang, Yijing Zhang, Wentao Tianjin Univ Sch Elect & Informat Engn Tianjin Key Lab Intelligent Unmanned Swarm Technol Tianjin Peoples R China Tianjin Univ Sch Elect & Informat Engn Tianjin 300072 Peoples R China Nanyang Technol Univ Sch Elect & Elect Engn Singapore 639798 Singapore
The letter studies the secure state estimation problem for switched systems. The single/joint false data injection attacks are designed with the aim at altering the sensor signal and/or switching signal. Firstly, it i... 详细信息
来源: 评论
false data injection attack on Distributed State Estimation over a Wireless Sensor Network  35
False Data Injection Attack on Distributed State Estimation ...
收藏 引用
第35届中国控制会议
作者: LEI Li YANG Wen YANG Chao SHI Hongbo YAN Huaicheng School of information Science and Engineering East China University of Science and Technology
Security risks of wireless sensor networks have attracted increasing concerns in recent *** this paper,we consider an attacker with limited power who injects random false data into the transmitted data on the communic... 详细信息
来源: 评论