Dear Editor,This letter investigates a novel stealthy false data injection(FDI)attack scheme based on side information to deteriorate the multi-sensor estimation performance of cyber-physical systems(CPSs).Compared wi...
详细信息
Dear Editor,This letter investigates a novel stealthy false data injection(FDI)attack scheme based on side information to deteriorate the multi-sensor estimation performance of cyber-physical systems(CPSs).Compared with most existing works depending on the full system knowledge,this attack scheme is only related to attackers'sensor and physical process *** design principle of the attack signal is derived to diverge the system estimation ***,it is proven that the proposed attack scheme can successfully bypass the residual-based ***,all theoretical results are verified by numerical simulation.
Dear Editor,This letter investigates the output tracking control issue of networked control systems(NCSs)with communication constraints and denial-of-service(DoS)attacks in the sensor-to-controller channel,both of whi...
详细信息
Dear Editor,This letter investigates the output tracking control issue of networked control systems(NCSs)with communication constraints and denial-of-service(DoS)attacks in the sensor-to-controller channel,both of which would induce random network delays.
This paper investigates the security issue of multisensor remote estimation *** optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the measurement...
详细信息
This paper investigates the security issue of multisensor remote estimation *** optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the measurement residuals of partial sensors due to limited attack resources,is proposed to maximally degrade system estimation *** attack stealthiness condition is given,and then the estimation error covariance in compromised state is derived to quantify the system performance under *** optimal attack strategy is obtained by solving several convex optimization problems which maximize the trace of the compromised estimation error covariance subject to the stealthiness ***,due to the constraint of attack resources,the selection principle of the attacked sensor is provided to determine which sensor is attacked so as to hold the most impact on system ***,simulation results are presented to verify the theoretical analysis.
This paper mainly investigates the security problem of a networked control system based on a Kalman filter.A false data injection attack scheme is proposed to only tamper the measurement output,and its stealthiness an...
详细信息
This paper mainly investigates the security problem of a networked control system based on a Kalman filter.A false data injection attack scheme is proposed to only tamper the measurement output,and its stealthiness and effects on system performance are analyzed under three cases of system knowledge held by an attacker and a ***,it is derived that the proposed attack scheme is stealthy for a residual-based detector when the attacker and the defender hold the same accurate system ***,it is proven that the proposed attack scheme is still stealthy even if the defender actively modifies the Kalman filter gain so as to make it different from that of the ***,the stealthiness condition of the proposed attack scheme based on an inaccurate model is ***,for each case,the instability conditions of the closed-loop system under attack are ***,simulation results are provided to test the proposed attack scheme.
In this paper, an autonomous intelligent transportation robot equipped with intelligent perception and autonomous planning modules is proposed to meet the requirements of roll-on/roll-off(RO/RO) logistics terminals fo...
详细信息
In this paper, an autonomous intelligent transportation robot equipped with intelligent perception and autonomous planning modules is proposed to meet the requirements of roll-on/roll-off(RO/RO) logistics terminals for the autonomous transportation of various types of finished vehicles. Based on the robot operating system(ROS) framework and a modular design approach, the robot integrates several key components, including a visual perception module, an autonomous planning module, a motion control module, an execution module, and an energy module. First, an improved convex hull algorithm efficiently extracts point cloud data, enhancing the efficiency of point cloud processing and addressing the issue of excessive target data. Three different evaluation methods were employed to determine the optimal bounding box of the target vehicle and to obtain its pose state. Second, improved proximal policy optimization(PPO) and generalized advantage estimation(GAE) algorithms, which are utilized in this paper, were implemented to autonomously plan collisionfree trajectories for robots, facilitating their movement from an initial position to the target transportation location, and subsequently to the final placement position. Finally, physical experiments confirmed that the robot effectively mimics the three fundamental components of humanoid functionality: perception, cognition, and action, thus enabling autonomous and intelligent handling of complex vehicle transportation tasks. These demonstrations validate the feasibility and effectiveness of the proposed robot.
We consider an optimal denial-of-service(DoS) attack scheduling problem of N independent linear time-invariant processes, where sensors have limited computational capability. Sensors transmit measurements to the remot...
详细信息
We consider an optimal denial-of-service(DoS) attack scheduling problem of N independent linear time-invariant processes, where sensors have limited computational capability. Sensors transmit measurements to the remote estimator via a communication channel that is exposed to DoS attackers. However,due to limited energy, an attacker can only attack a subset of sensors at each time step. To maximally degrade the estimation performance, a DoS attacker needs to determine which sensors to attack at each time step. In this context, a deep reinforcement learning(DRL) algorithm, which combines Q-learning with a deep neural network, is introduced to solve the Markov decision process(MDP). The DoS attack scheduling optimization problem is formulated as an MDP that is solved by the DRL algorithm. A numerical example is provided to illustrate the efficiency of the optimal DoS attack scheduling scheme using the DRL algorithm.
Dear Editor,In this letter,a novel data-driven adaptive predictive control method is proposed using the triangular dynamic linearization *** proposed method only contains one time-varying parameter with explicit physi...
详细信息
Dear Editor,In this letter,a novel data-driven adaptive predictive control method is proposed using the triangular dynamic linearization *** proposed method only contains one time-varying parameter with explicit physical meaning,which can prevent severe deviation in parameter ***,a triangular dynamic linearization(TDL)data model is employed to predict future system outputs,and then to correct inaccurate predictive outputs,a feedback regulator is *** autotuned weighing factor is introduced to alleviate the computational burden in practical applications and further improve output tracking ***-loop stability conditions are derived by rigorous *** results are provided to demonstrate the efficacy of the proposed method.
This paper addresses the problem of output tracking control for networked control systems (NCSs) with model mismatch and random communication constraints. In order to actively compensate random communication constrain...
详细信息
Neural Radiance Fields (NeRF) use multi-view images for 3D scene representation, demonstrating remarkable performance. As one of the primary sources of multi-view images, multi-camera systems encounter challenges such...
详细信息
Proximal gradient algorithms are popularly implemented to achieve convex optimization with nonsmooth regularization. Obtaining the exact solution of the proximal operator for nonsmooth regularization is challenging be...
详细信息
Proximal gradient algorithms are popularly implemented to achieve convex optimization with nonsmooth regularization. Obtaining the exact solution of the proximal operator for nonsmooth regularization is challenging because errors exist in the computation of the gradient; consequently, the design and application of inexact proximal gradient algorithms have attracted considerable attention from researchers. This paper proposes computationally efficient basic and inexact proximal gradient descent algorithms with random reshuffling. The proposed stochastic algorithms take randomly reshuffled data to perform successive gradient descents and implement only one proximal operator after all data pass through. We prove the convergence results of the proposed proximal gradient algorithms under the sampling-without-replacement reshuffling *** computational errors exist in gradients and proximal operations, the proposed inexact proximal gradient algorithms can converge to an optimal solution neighborhood. Finally, we apply the proposed algorithms to compressed sensing and compare their efficiency with some popular algorithms.
暂无评论