The following publications are possibly variants of this publication:
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State EstimationYuzhe Li, Ling Shi, Tongwen Chen. tcns, 5(3):846-856, 2018. [doi]
- A Watermarking Strategy Against Linear Deception Attacks on Remote State Estimation Under K-L DivergenceDi Wang, Jiahao Huang, Yang Tang, Fangfei Li. tii, 17(5):3273-3281, 2021. [doi]
- Optimal deception attacks against remote state estimation in cyber-physical systemsYi-Gang Li, Guang-Hong Yang. jfi, 357(3):1832-1852, 2020. [doi]
- Optimal Deception Attacks Against Remote State Estimation: An Information-Based ApproachJing Zhou, Jun Shang, Tongwen Chen. tac, 68(7):3947-3962, July 2023. [doi]
- Optimal innovation-based deception attacks with side information against remote state estimation in cyber-physical systemsYi-Gang Li, Guang-Hong Yang. ijon, 500:461-470, 2022. [doi]
- Optimal Linear Encryption Against Stealthy Attacks on Remote State EstimationJun Shang, Maoyin Chen, Tongwen Chen. tac, 66(8):3592-3607, 2021. [doi]
- On Information Fusion in Optimal Linear FDI Attacks Against Remote State EstimationJing Zhou, Jun Shang, Tongwen Chen. tcns, 10(4):2085-2096, December 2023. [doi]
- Optimal deception attacks on remote state estimators equipped with interval anomaly detectorsJing Zhou, Jun Shang, Tongwen Chen. automatica, 148:110723, February 2023. [doi]
- Event-based attack against remote state estimationYifei Qi, Peng Cheng, Ling Shi, Jiming Chen. cdc 2015: 6844-6849 [doi]
- Linear Encryption Against Eavesdropping on Remote State EstimationJun Shang, Tongwen Chen. tac, 68(7):4413-4419, July 2023. [doi]
- The Vulnerability Analysis of Remote Estimation With Batch-Data Detectors Against Integrity AttacksYake Yang, Yuzhe Li, Yang Shi 0001, Daniel E. Quevedo. tac, 69(5):3096-3111, May 2024. [doi]