2018
DOI: 10.1080/03081079.2018.1462353
|View full text |Cite
|
Sign up to set email alerts
|

Event-triggered distributed filtering over sensor networks with deception attacks and partial measurements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 40 publications
(13 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…The main purpose of feature extraction is to map complex signals from high dimensional space to low dimensional space by using signal characteristics, and make classification simple and intuitive in data background [47][48][49]. Therefore, after a long period of exploration and research, many related researchers have divided the feature extraction into three main directions: time domain analysis, frequency domain analysis, time frequency analysis [50][51].…”
Section: Feature Extraction Of Surface Emg Signalmentioning
confidence: 99%
“…The main purpose of feature extraction is to map complex signals from high dimensional space to low dimensional space by using signal characteristics, and make classification simple and intuitive in data background [47][48][49]. Therefore, after a long period of exploration and research, many related researchers have divided the feature extraction into three main directions: time domain analysis, frequency domain analysis, time frequency analysis [50][51].…”
Section: Feature Extraction Of Surface Emg Signalmentioning
confidence: 99%
“…More recently, surveys on deception attacks began to appear, see [34][35][36][37][38][39]. For instance, in [34], the most general model of sensor attack resilient has been proposed, which can allow any signal to be injected through the compromised sensor.…”
Section: Related Workmentioning
confidence: 99%
“…The effect of stealthy integrity attacks on Networked physical systems has been analyzed in [36], where the target system was a Stochastic Linear Time-Invariant (LTI) system with a linear estimator, a linear feedback controller and a χ 2 fault detector. In [35,37,38], the distributed state estimator, which was used to defend against false data injection attacks over sensor networks, has been embedded with event-triggering transmission scheme. Based on clustering technology, which can remove bad data and/or inaccurate estimates, a distributed Kalman filtering approach with trust-based dynamic combination strategy has been proposed in [39] to enhance the robustness against cyber attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In networked control systems (NCS) it is a viable solution either to avoid delays (Cuenca et al 2011) or to save network load by sending less information across the shared medium. Due to the current importance of the NCS applications, other non-conventional sampling schemes (like DRS) for dealing with communication bandwidth restrictions, such as event-triggered sampling, have been lately proposed (Hou et al 2018;Bu et al 2018;Zhao et al 2018; CONTACT Author Julián Salt. ORCID: 0000-0002-9640-2658.…”
Section: Motivationmentioning
confidence: 99%