2019 34rd Youth Academic Annual Conference of Chinese Association of Automation (YAC) 2019
DOI: 10.1109/yac.2019.8787719
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Offline Privacy Schedule for Remote State Estimation under an Eavesdropper

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…For the security issues of a system's remote state estimation, there are many forms of malicious network attacks, but they are divided into three main and common categories: denial of service (DoS) attacks, integrity (including replay and false data injection) attacks and eavesdropping attacks [8]. DoS attacks are designed to interfere with wireless communication channels.…”
Section: Introductionmentioning
confidence: 99%
“…For the security issues of a system's remote state estimation, there are many forms of malicious network attacks, but they are divided into three main and common categories: denial of service (DoS) attacks, integrity (including replay and false data injection) attacks and eavesdropping attacks [8]. DoS attacks are designed to interfere with wireless communication channels.…”
Section: Introductionmentioning
confidence: 99%