BOOK-CHAPTER

Secure State Estimation against Stealthy Attack

Keywords:
Computer security State (computer science) Computer science Estimation Engineering Algorithm Systems engineering

Metrics

1
Cited By
0.60
FWCI (Field Weighted Citation Impact)
3
Refs
0.74
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

BOOK-CHAPTER

Secure State Estimation against Stealthy Attack

Yilin Mo

Year: 2016 Pages: 41-66
JOURNAL ARTICLE

Distributed Secure State Estimation Against Stealthy Attacks

Yan YuWen YangHuaiyu YuanLongyu LiChao Yang

Journal:   IEEE Signal Processing Letters Year: 2025 Vol: 32 Pages: 1930-1934
JOURNAL ARTICLE

Side Information Incorporated ϵ -Stealthy Attack Against Remote State Estimation

Li-Wei MaoGuang‐Hong Yang

Journal:   IEEE Transactions on Cybernetics Year: 2025 Vol: 55 (7)Pages: 3537-3542
JOURNAL ARTICLE

Stealthy Attack Against Distributed State Estimation for Cyber‐Physical Systems

Jie WangYun LiuHuaiyu YuanWen Yang

Journal:   International Journal of Robust and Nonlinear Control Year: 2024 Vol: 35 (3)Pages: 1091-1099
JOURNAL ARTICLE

Optimal Stealthy Attack Against Remote State Estimation With Parameterized $\epsilon$-Stealthiness

Li-Wei MaoGuang‐Hong Yang

Journal:   IEEE Transactions on Industrial Informatics Year: 2025 Pages: 1-9
© 2026 ScienceGate Book Chapters — All rights reserved.