Sledovat
Ling Shi
Název
Citace
Citace
Rok
Optimal DoS attack scheduling in wireless networked control system
H Zhang, P Cheng, L Shi, J Chen
IEEE Transactions on Control Systems Technology 24 (3), 843-852, 2016
5722016
Optimal denial-of-service attack scheduling with energy constraint
H Zhang, P Cheng, L Shi, J Chen
IEEE Transactions on Automatic Control 60 (11), 3023-3028, 2015
5642015
Event-based sensor data scheduling: Trade-off between communication rate and estimation quality
J Wu, QS Jia, KH Johansson, L Shi
IEEE Transactions on automatic control 58 (4), 1041-1046, 2013
5142013
Jamming attacks on remote state estimation in cyber-physical systems: A game-theoretic approach
Y Li, L Shi, P Cheng, J Chen, DE Quevedo
IEEE Transactions on Automatic Control 60 (10), 2831-2836, 2015
4472015
Optimal linear cyber-attack on remote state estimation
Z Guo, D Shi, KH Johansson, L Shi
IEEE Transactions on Control of Network Systems 4 (1), 4-13, 2017
4312017
Time Synchronization in WSNs: A Maximum Value Based Consensus Approach
J He, P Cheng, L Shi, J Chen
IEEE Conference on Decision and Control and European Control Conference, Dec …, 2012
3742012
Stochastic event-triggered sensor schedule for remote state estimation
D Han, Y Mo, J Wu, S Weerakkody, B Sinopoli, L Shi
IEEE Transactions on Automatic Control 60 (10), 2661-2675, 2015
3522015
SINR-based DoS attack on remote state estimation: A game-theoretic approach
Y Li, DE Quevedo, S Dey, L Shi
IEEE Transactions on Control of Network Systems 4 (3), 632-642, 2017
3192017
Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks
J Qin, M Li, L Shi, X Yu
IEEE Transactions on Automatic Control 63 (6), 1648-1663, 2018
3022018
Kalman filtering over a packet-dropping network: A probabilistic perspective
L Shi, M Epstein, RM Murray
IEEE Transactions on Automatic Control 55 (3), 594-604, 2010
2442010
Worst-case stealthy innovation-based linear attack on remote state estimation
Z Guo, D Shi, KH Johansson, L Shi
Automatica 89, 117-124, 2018
2392018
Detection against linear deception attacks on multi-sensor remote state estimation
Y Li, L Shi, T Chen
IEEE Transactions on Control of Network Systems 5 (3), 846-856, 2017
2172017
A multi-channel transmission schedule for remote state estimation under DoS attacks
K Ding, Y Li, DE Quevedo, S Dey, L Shi
Automatica 78, 194-201, 2017
2142017
Sensor data scheduling for optimal state estimation with communication energy constraint
L Shi, P Cheng, J Chen
Automatica 47 (8), 1693-1698, 2011
1962011
Event-triggered maximum likelihood state estimation
D Shi, T Chen, L Shi
Automatica 50 (1), 247-254, 2014
1892014
Decentralised minimum-time consensus
Y Yuan, GB Stan, L Shi, M Barahona, J Goncalves
Automatica 49 (5), 1227-1235, 2013
1742013
An event-triggered approach to state estimation with multiple point-and set-valued measurements
D Shi, T Chen, L Shi
Automatica 50 (6), 1641-1648, 2014
1722014
Distributed filtering under false data injection attacks
W Yang, Y Zhang, G Chen, C Yang, L Shi
Automatica 102, 34-44, 2019
1652019
Deep reinforcement learning for wireless sensor scheduling in cyber–physical systems
AS Leong, A Ramaswamy, DE Quevedo, H Karl, L Shi
Automatica 113, 108759, 2020
1452020
Stochastic sensor activation for distributed state estimation over a sensor network
W Yang, G Chen, X Wang, L Shi
Automatica 50 (8), 2070-2076, 2014
1282014
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20