咨询与建议

限定检索结果

文献类型

  • 285 篇 期刊文献
  • 118 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 404 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 393 篇 工学
    • 238 篇 电气工程
    • 115 篇 控制科学与工程
    • 115 篇 计算机科学与技术...
    • 57 篇 石油与天然气工程
    • 37 篇 信息与通信工程
    • 25 篇 仪器科学与技术
    • 20 篇 软件工程
    • 19 篇 机械工程
    • 17 篇 动力工程及工程热...
    • 16 篇 网络空间安全
    • 9 篇 电子科学与技术(可...
    • 7 篇 力学(可授工学、理...
    • 3 篇 交通运输工程
    • 2 篇 土木工程
    • 2 篇 环境科学与工程(可...
    • 1 篇 材料科学与工程(可...
    • 1 篇 化学工程与技术
    • 1 篇 船舶与海洋工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 核科学与技术
  • 55 篇 理学
    • 47 篇 数学
    • 24 篇 系统科学
    • 5 篇 化学
    • 4 篇 生物学
    • 3 篇 物理学
    • 3 篇 统计学(可授理学、...
  • 42 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 1 篇 医学

主题

  • 404 篇 false data injec...
  • 66 篇 state estimation
  • 41 篇 cyber-physical s...
  • 40 篇 smart grid
  • 28 篇 cyber security
  • 21 篇 power systems
  • 16 篇 cybersecurity
  • 15 篇 attack detection
  • 15 篇 smart grids
  • 14 篇 anomaly detectio...
  • 14 篇 security
  • 12 篇 wireless sensor ...
  • 12 篇 multi-agent syst...
  • 11 篇 cyber-attacks
  • 11 篇 power system sec...
  • 11 篇 phasor measureme...
  • 10 篇 deep learning
  • 10 篇 power measuremen...
  • 10 篇 machine learning
  • 9 篇 networked contro...

机构

  • 14 篇 northeastern uni...
  • 11 篇 northeastern uni...
  • 7 篇 iit dept elect &...
  • 7 篇 univ alberta dep...
  • 6 篇 hunan univ coll ...
  • 6 篇 north china elec...
  • 6 篇 anhui polytech u...
  • 6 篇 nanjing univ sci...
  • 5 篇 shanghai univ sc...
  • 5 篇 chinese minist e...
  • 5 篇 texas a&m univ d...
  • 5 篇 qingdao univ sch...
  • 5 篇 zhejiang univ te...
  • 5 篇 liaoning univ te...
  • 4 篇 indian inst tech...
  • 4 篇 ludong univ sch ...
  • 4 篇 shandong normal ...
  • 4 篇 nanyang technol ...
  • 4 篇 nanjing univ pos...
  • 4 篇 southeast univ s...

作者

  • 12 篇 li zuyi
  • 11 篇 liu xuan
  • 8 篇 dong zhao yang
  • 8 篇 gao wengen
  • 7 篇 rudolph carsten
  • 7 篇 konstantinou cha...
  • 7 篇 zhang guoqing
  • 7 篇 yang guang-hong
  • 7 篇 xu huiling
  • 6 篇 liang hao
  • 6 篇 li yunfei
  • 6 篇 peng chen
  • 6 篇 teng fei
  • 5 篇 liu bo
  • 5 篇 li yuancheng
  • 5 篇 zhao junhua
  • 5 篇 lee hae young
  • 5 篇 dong lewei
  • 5 篇 yu wei
  • 5 篇 luo fengji

语言

  • 397 篇 英文
  • 6 篇 其他
  • 3 篇 德文
  • 2 篇 法文
  • 2 篇 俄文
  • 1 篇 葡萄牙文
检索条件"主题词=false data injection attacks"
404 条 记 录,以下是91-100 订阅
排序:
Fuzzy adaptive observer-based resilient formation control for heterogeneous multiple unmanned aerial vehicles with false data injection attacks and prescribed performance
收藏 引用
TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL 2023年 第6期45卷 1021-1036页
作者: Han, Bing Jiang, Ju Yu, Chaojun Nanjing Univ Aeronaut & Astronaut Coll Automat Engn Nanjing 211106 Jiangsu Peoples R China
This paper addresses the resilient formation control problem for heterogeneous multiple unmanned aerial vehicles (multi-UAV) under false data injection (FDI) attacks and prescribed performance constraints. The case of... 详细信息
来源: 评论
A Blended Active Detection Strategy for false data injection attacks in Cyber-Physical Systems
收藏 引用
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS 2021年 第1期8卷 168-176页
作者: Ghaderi, Mohsen Gheitasi, Kian Lucia, Walter Concordia Univ Dept Elect & Comp Engn Montreal PQ H3G 1M8 Canada Concordia Univ Concordia Inst Informat Syst Engn Montreal PQ H3G 1M8 Canada
In recent years, different solutions have been proposed to detect advanced stealthy cyber-attacks against networked control systems. In this article, we propose a blended detection scheme that properly leverages and c... 详细信息
来源: 评论
Event-triggered consensus control for DC microgrids based on MKELM and state observer against false data injection attacks
收藏 引用
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS 2024年 第3期15卷 775-793页
作者: Xie, Zongkui Wu, Zhongqiang Yanshan Univ Key Lab Ind Comp Control Engn Hebei Prov Qinhuangdao 066004 Peoples R China
This paper proposes an event-triggered distributed control method based on state observer and multi-kernel extreme learning machine (MKELM) for direct current microgrid, which can suppress the false data injection att... 详细信息
来源: 评论
Observer-Based Asynchronous Event-Triggered Bipartite Consensus of Multiagent Systems Under false data injection attacks
收藏 引用
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS 2023年 第3期10卷 1603-1615页
作者: Wang, Zhengxin Shi, Sangli He, Wangli Xiao, Min Cao, Jinde Gorbachev, Sergey Nanjing Univ Posts & Telecommun Sch Sci Nanjing 210023 Peoples R China Nanjing Univ Posts & Telecommun Jiangsu Engn Lab IOT Intelligent Robots IOTRobot Nanjing 210023 Peoples R China East China Univ Sci & Technol Key Lab Smart Mfg Energy Chem Proc Minist Educ Shanghai 200237 Peoples R China Nanjing Univ Posts & Telecommun Sch Automat Nanjing 210023 Peoples R China Southeast Univ Sch Math Nanjing 210096 Peoples R China Southeast Univ Frontiers Sci Ctr Mobile Informat Commun & Secur Nanjing Peoples R China Purple Mt Labs Nanjing 211111 Peoples R China Yonsei Univ Yonsei Frontier Lab Seoul 03722 South Korea Natl Res Tomsk State Univ Dept Innovat Technol Tomsk 634050 Russia
This article investigates bipartite consensus of multiagent systems under unknown false data injection attacks. attacks are launched in the channels from the controller to the actuator. To compensate for the impact of... 详细信息
来源: 评论
Adaptive predefined-time secure consensus tracking control for nonlinear multiagent systems against unknown false data injection attacks
收藏 引用
JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS 2024年 第18期361卷
作者: Wen, Luyao Niu, Ben Ji, Yulong Zhang, Baoyi Shandong Normal Univ Sch Informat Sci & Engn Jinan 250014 Peoples R China
This paper primarily investigates the adaptive predefined-time secure consensus tracking control problem for a class of nonlinear multiagent systems (MASs) against unknown false data injection (FDI) attacks and Bouc-W... 详细信息
来源: 评论
Security control of multi -agent systems under false data injection attacks
收藏 引用
NEUROCOMPUTING 2020年 404卷 240-246页
作者: Zuo, Zhiqiang Cao, Xiong Wang, Yijing Tianjin Univ Sch Elect & Informat Engn Tianjin Key Lab Proc Measurement & Control Tianjin 300072 Peoples R China
This paper studies the consensus problem of multi-agent systems (MASs) with false data injection (FDI) attacks and noises. Based on the graphical method and Kalman filter framework, distributed state estimators are de... 详细信息
来源: 评论
Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2020年 第11期11卷 5217-5231页
作者: Amuthan, A. Sendhil, R. Pondicherry Engn Coll Dept Comp Sci & Engn Pondicherry India
In recent years, the area of fog computing is receiving maximum focus due to the potential improvements in the cloud computing field. Fog computing is capable of resolving issues that includes location awareness, inad... 详细信息
来源: 评论
Partial grid false data injection attacks against state estimation
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS 2019年 110卷 623-629页
作者: Margossian, Harag Sayed, Mohammad Ali Fawaz, Wissam Nakad, Zahi Lebanese Amer Univ Dept Elect & Comp Engn Byblos Lebanon
The addition of an external communication layer to the power system has left it vulnerable to cyberattacks. false data injection (FDI) can be used to manipulate measurements that are used to estimate the state of the ... 详细信息
来源: 评论
A Framework for Detecting false data injection attacks in Large-Scale Wireless Sensor Networks
收藏 引用
SENSORS 2024年 第5期24卷 1643页
作者: Hu, Jiamin Yang, Xiaofan Yang, Lu-Xing Chongqing Univ Sch Big Data & Software Engn Chongqing 400044 Peoples R China Deakin Univ Coll Informat Technol Melbourne Vic 3125 Australia
false data injection attacks (FDIAs) on sensor networks involve injecting deceptive or malicious data into the sensor readings that cause decision-makers to make incorrect decisions, leading to serious consequences. W... 详细信息
来源: 评论
Unscented Kalman filtering for nonlinear systems with sensor saturation and randomly occurring false data injection attacks
收藏 引用
ASIAN JOURNAL OF CONTROL 2021年 第2期23卷 871-881页
作者: Lu, Jiyong Wang, Weizhen Li, Li Guo, Yanping Hebei Univ Sci & Technol Sch Elect Engn Shijiazhuang Hebei Peoples R China Yanshan Univ Sch Elect Engn Qinhuangdao 066004 Hebei Peoples R China Hebei Univ Sci & Technol Sch Sci Shijiazhuang Hebei Peoples R China
In this paper, an unscented Kalman filtering problem is studied for a nonlinear system with sensor saturation and randomly occurring false data injection attacks. A random variable obeying the Bernoulli distribution i... 详细信息
来源: 评论