共 27 条
- [21] Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of historical data Automatica, 2021, 128
- [22] Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (01): : 445 - 456
- [24] Optimal Privacy-Preserving Transmission Schedule Against Eavesdropping Attacks on Remote State Estimation IEEE CONTROL SYSTEMS LETTERS, 2024, 8 : 538 - 543