The following publications are possibly variants of this publication:
- Worst-case stealthy innovation-based linear attack on remote state estimationZiyang Guo, Dawei Shi, Karl Henrik Johansson, Ling Shi. automatica, 89:117-124, 2018. [doi]
- Optimal Stealthy Linear Attack on Remote State Estimation With Side InformationDan Ye, Bing Yang, Tian-Yu Zhang. sj, 16(1):1499-1507, 2022. [doi]
- Optimal Stealthy Attacks With Energy Constraint Against Remote State EstimationXuan Liu, Guang-Hong Yang. tcyb, 54(6):3577-3587, June 2024. [doi]
- Event-based attack against remote state estimationYifei Qi, Peng Cheng, Ling Shi, Jiming Chen. cdc 2015: 6844-6849 [doi]