35 results on '"Li, Yuzhe"'
Search Results
2. Model-Unknown Spoofing Attack via False Data Injections
3. Integrated Stabilizing Control for NCSs with Intermittent Observation and Multiple Random Transmission Delays
4. Model-Unknown Spoofing Attack via False Data Injections
5. LQR Design for Discrete-Time Positive Systems: A First-Order Method
6. An Efficient Epsilon Selection Method for DP-ERM with Expected Accuracy Constraints
7. Aero-engine Performance Optimization Using MOEA with Selective Ensemble Learning
8. LQR Design for Discrete-Time Positive Systems: A First-Order Method
9. H∞ Control of Linear Uncertain Systems with Positivity Constraints
10. Situation Awareness Model of HVS Based on Fuzzy Analytic Hierarchy Process and LSTM-attention Mechanism
11. Just Keep Your Concerns Private: Guaranteeing Heterogeneous Privacy and Achieving High Availability for ERM Algorithms
12. Event-Triggered Control and Proactive Defense for Cyber–Physical Systems.
13. A Novel Attack Detection for Linear Systems With Unknown-But-Bounded Noises.
14. Adaptive Tube-based Model Predictive Control for Vehicle Active Suspension System
15. Fault-Tolerant Tracking Control for Switched Linear Systems with Structural Uncertainties
16. Joint Power Allocation for Remote State Estimation With SWIPT.
17. False-Data-Injection Attacks on Remote Distributed Consensus Estimation.
18. Data-Driven False Data-Injection Attack Design and Detection in Cyber-Physical Systems.
19. RE-Store: Reliable and Efficient KV-Store with Erasure Coding and Replication
20. Optimal DoS Attack Against LQR Control Channels.
21. Sparse Undetectable Sensor Attacks Against Cyber-Physical Systems: A Subspace Approach.
22. Power Control of an Energy Harvesting Sensor for Remote State Estimation
23. SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach
24. Stochastic Detector against linear deception attacks on remote state estimation
25. Fake-Acknowledgment Attack on ACK-based Sensor Power Schedule for Remote State Estimation
26. Fake-acknowledgment attack on ACK-based sensor power schedule for remote state estimation
27. An Intrusion Detection System for Cyber Attacks in Wireless Networked Control Systems.
28. Multi-sensor transmission power scheduling for remote state estimation under SINR model
29. Building an Efficient Put-Intensive Key-Value Store with Skip-Tree.
30. False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis.
31. Online sensor transmission power schedule for remote state estimation
32. Jamming attack on Cyber-Physical Systems: A game-theoretic approach
33. Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach.
34. SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach
35. Power Control of an Energy Harvesting Sensor for Remote State Estimation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.