the financial support received from NATO under the Emerging Security Challenges Division program;the support received from NPRP (10-0105-17017) from the Qatar National Research Fund (a member of Qatar Foundation);the support received from the Natural Sciences and Engineering Research Council of Canada (NSERC) and the Department of National Defence (DND) under the Discovery Grant and DND Supplemental Programs;supported in part by funding from the Innovation for Defence Excellence and Security (IDEaS) program from the Department of National Defence (DND)。
In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose condition...
supported in part by the National Natural Science Foundation of China(62073189,62173207);the Taishan Scholar Project of Shandong Province(tsqn202211129)。
This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimati...
the Natural Sciences and Engineering Research Council(NSERC)of Canada。
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control systems.Remote state esti...
supported in part by the National Natural Science Foundation of China(62203064,62203065,62303069);the Open Fund of Institute of Ocean Research of Bohai University(BDHYYJY2023017)。
Dear Editor,This letter contributes to designing a resilient event-triggered controller for connected automated vehicles under cyber attacks,including denial-of-service(DoS)and deception attacks.To characterize the ef...
supported by the Beijing Natural Science Foundation(4212008);the National Natural Science Foundation of China(62272031);the Open Foundation of Information Security Evaluation Center of Civil Aviation,Civil Aviation University of China(ISECCA-202101);Guangxi Key Laboratory of Cryptography and Information Security(GCIS201915);supported in part by the National Natural Science Foundation of China(U21A20463,U22B2027)。
The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different blockchain networks.Cross-chain overcomes the“information island”problem of the closed blockc...
supported in part by National Natural Science Foundation of China(62173218,61833011);the International Corporation Project of Shanghai Science and Technology Commission(21190780300)。
Dear Editor,In this letter,a novel memory-based scheduling protocol(MBSP)is investigated for networked control systems(NCSs)under bandwidth constraint and stochastic denial-of-service(DoS)attacks.First,considering the...
supported by the National Natural Science Foundation of China(61925303,62173034,62088101,U20B2073,62173002);the National Key Research and Development Program of China(2021YFB1714800);Beijing Natural Science Foundation(4222045)。
This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the meas...
supported in part by Australian Research Council Discovery Early Career Researcher Award(DE210100273)。
Connected automated vehicles(CAVs)serve as a promising enabler for future intelligent transportation systems because of their capabilities in improving traffic efficiency and driving safety,and reducing fuel consumpti...
This work was supported by the European Union’s Horizon 2020 Research and Innovation Programme under the Marie Skodowska-Curie(101027980(CSPCPS-A-ICA),739551(KIOS CoE-TEAMING));the Italian Ministry for Research in the Framework of the 2017 Program for Research Projects of National Interest(PRIN)(2017YKXYXJ);the National Natural Science Foundation of China(61903188,62073165,62020106003);the Natural Science Foundation of Jiangsu Province(BK20190403);the 111 Project(B20007);the Priority Academic Program Development of Jiangsu Higher Education Institutions.
This paper proposes a passive methodology for detecting a class of stealthy intermittent integrity attacks in cyberphysical systems subject to process disturbances and measurement noise.A stealthy intermittent integri...
This work was supported in part by the National Natural Science Foundation of China(61903258);Guangdong Basic and Applied Basic Research Foundation(2022A1515010234);the Project of Department of Education of Guangdong Province(2022KTSCX105);Qatar National Research Fund(NPRP12C-0814-190012).
This paper studies the countermeasure design problems of distributed resilient time-varying formation-tracking control for multi-UAV systems with single-way communications against composite attacks,including denial-of...