2019
DOI: 10.1109/tcns.2018.2867157
|View full text |Cite
|
Sign up to set email alerts
|

DoS Attacks on Remote State Estimation With Asymmetric Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
17
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 61 publications
(17 citation statements)
references
References 23 publications
0
17
0
Order By: Relevance
“…Now, we are in the position to take the disturbance attenuation performance into consideration and derive a set of feasible sufficient conditions. (14)- (17) as well as the following constraints are satisfied:…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Now, we are in the position to take the disturbance attenuation performance into consideration and derive a set of feasible sufficient conditions. (14)- (17) as well as the following constraints are satisfied:…”
Section: Resultsmentioning
confidence: 99%
“…To obtain the filter gains A f , B f , and E f to be designed in (4) and (5), we need to pay attention on seeking a group of available solutions, which yields the following theorem to implement some auxiliary mathematical tools. , , and , scalars , , > 1, and 0 < < 1, such that (16)- (17) as well as the following constraints are satisfied:…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…. , L}, clearly, Ψ k−1 = −(AX k−1 +Ū k−1 )/η satisfies the condition in(17) for any η ≥ 3. Thus, by choosing the privacy-enhancing signals Γ…”
mentioning
confidence: 98%