Results 271 to 280 of about 66,369 (329)

Operator-Aware Encrypted Bilateral Teleoperation with Detection and Cancellation of False Data Injection Attacks

open access: gold
Katsumasa Kosha   +4 more
openalex   +1 more source

Detection, estimation, and compensation of false data injection attack for UAVs

Information Sciences, 2021
Abstract The safety issues of unmanned aerial vehicles (UAVs) are ever increasing in focus due to the vulnerability to attack. This paper investigates the safety problem for UAVs under the false data injection attack (FDIA) through wireless data link. First, the attack characteristics and influencing factors of FDIA are explicitly analyzed. Thus, the
Xiang Yu, Jianzhong Qiao
exaly   +2 more sources

Secure distributed estimation against false data injection attack

Information Sciences, 2020
Abstract With the development of wireless sensor networks, many distributed algorithms have been studied by researchers. This paper considers the situation of distributed estimation with false data injection (FDI) attack. Owing to the fact that Kullback-Leibler (KL) divergence is very effective to detect outliers caused by FDI attack, a distributed ...
Yi Hua, Feng Chen, Shukai Duan
exaly   +2 more sources

Data-Driven False Data Injection Attack: A Low-Rank Approach

IEEE Transactions on Smart Grid, 2022
Debottam Mukherjee
exaly   +2 more sources

Design of False Data Injection Attacks in Cyber-Physical Systems

Information Sciences, 2022
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sushree Padhan, Ashok Kumar Turuk
openaire   +2 more sources

False Data Injection Attacks in Bilateral Teleoperation Systems

IEEE Transactions on Control Systems Technology, 2020
In this brief, false data injection attacks in bilateral teleoperation systems (BTOSs) are studied, where the attacker can inject false data into the states being exchanged between the master and slave robots. To demonstrate the vulnerability of BTOS, a destabilizing false data injection attack (DFDIA) is designed and experimentally implemented.
Yimeng Dong   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy