In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
It has been clearly demonstrated over the past years that control theory can provide an efficient framework for the solution of several complex tasks in epidemiology. In this paper, we present a computational approach...
详细信息
This paper studies the state observer design of a spatial two-dimensional (2-D) linear diffusion process described by a linear parabolic partial differential equation (PDE) under mobile sensors. Firstly, we analyze th...
详细信息
In text mining and Natural Language Processing (NLP), extracting emotions from textual data is gaining rapid attraction. The proliferation of online content and the freedom of expression on social media platforms has ...
详细信息
College of computerscience Beijing University of Technology, Beijing 100124, China, 1374622525@*** This paper proposes a trust collaboration technology for edge computing, addressing trust isolation and security issu...
详细信息
Effective configuration of Time-Sensitive Networks is crucial for providing timeliness and reliability guarantees for real-time industrial applications, where many inter-dependent streams may co-exist. However, existi...
详细信息
As edge computing becomes an increasingly important computing model, trust management and security issues are becoming more severe. Problems such as malicious node attacks and trust isolation pose threats to the secur...
详细信息
Person re-identification (Re-ID) is a classical computer vision task and has significant applications for public security and information forensics. Recently, long-term Re-ID with clothes-changing has attracted increa...
详细信息
In this paper, the problem of cubature Kalman fusion filtering(CKFF) is addressed for multi-sensor systems under amplify-and-forward(AaF) relays. For the purpose of facilitating data transmission, AaF relays are utili...
详细信息
In this paper, the problem of cubature Kalman fusion filtering(CKFF) is addressed for multi-sensor systems under amplify-and-forward(AaF) relays. For the purpose of facilitating data transmission, AaF relays are utilized to regulate signal communication between sensors and filters. Here, the randomly varying channel parameters are represented by a set of stochastic variables whose occurring probabilities are permitted to exhibit bounded uncertainty. Employing the spherical-radial cubature principle, a local filter under AaF relays is initially constructed. This construction ensures and minimizes an upper bound of the filtering error covariance by designing an appropriate filter gain. Subsequently, the local filters are fused through the application of the covariance intersection fusion rule. Furthermore, the uniform boundedness of the filtering error covariance's upper bound is investigated through establishing certain sufficient conditions. The effectiveness of the proposed CKFF scheme is ultimately validated via a simulation experiment concentrating on a three-phase induction machine.
The study of nonlinear problems associated with the process of heat transfer in material is very important for practice. Previously, the authors proposed an effective algorithm for determining the volumetric heat capa...
详细信息
暂无评论