2020
DOI: 10.1109/tcsii.2019.2939276
|View full text |Cite
|
Sign up to set email alerts
|

Fusion-Based FDI Attack Detection in Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 38 publications
(8 citation statements)
references
References 25 publications
0
8
0
Order By: Relevance
“…For a ∆-M, it has been shown that the system is stable if |v k+1 | ≤ |v k | [32]. Let us investigate using (29), the behaviour of the trajectory for two possible cases:…”
Section: Remarkmentioning
confidence: 99%
See 1 more Smart Citation
“…For a ∆-M, it has been shown that the system is stable if |v k+1 | ≤ |v k | [32]. Let us investigate using (29), the behaviour of the trajectory for two possible cases:…”
Section: Remarkmentioning
confidence: 99%
“…This is a process of mapping a large set of input values to a small set of output values where the continuous-time signals are represented by quantised signals. In the past, different types of quantisers have been proposed by researchers which include nearest neighbour quantisers [26], [27], logarithmic quantisers [28], [29], neural network quantisers [30] and so on. Note that as the number of quantisation levels decreases, the effectiveness of the quantisers in bandwidth utilisation increases.…”
Section: Introductionmentioning
confidence: 99%
“…As a new generation of industrial systems, cyber‐physical systems (CPSs) have efficiently integrated physical processes and cyber equipment with ubiquitous computation resources and communication capabilities. The increasingly open cyber environment promotes the rapid development of CPSs in terms of theoretical research and engineering applications, while also causes an increase in fault‐inducing factors and the possibility of malicious cyber attacks, for example, denial‐of‐service (DoS) attacks, 1 false data injection (FDI) attacks, 2 replay attacks, 3 and so on. Different from system faults 4 or unknown inputs, 5,6 the statistical characteristics or structure information of cyber attacks may be unknown, which may lead to catastrophic system failure and unbearable damage.…”
Section: Introductionmentioning
confidence: 99%
“…The mechanism and method of FDIA under DC and AC models were studied, and an attack detection method based on the CNN-GRU hybrid model was proposed . The optimal fusion estimation method was designed by adding a compensation factor to study the detection of FDIA attack signal under CPPS (Gao et al, 2019). However, there is no explanation on how to choose the appropriate compensation factor.…”
Section: Introductionmentioning
confidence: 99%