The following publications are possibly variants of this publication:
- Optimal Schedule of Secure Transmissions for Remote State Estimation Against EavesdroppingLe Wang, Xianghui Cao, Bowen Sun, Heng Zhang 0001, Changyin Sun. tii, 17(3):1987-1997, 2021. [doi]
- A Privacy-Preserving Approach Against Eavesdropping Attacks on Remote State Estimation for Cyber-Physical SystemsHanxiao Liu, Jiaying Zou, Xiaoqiang Ren, Xiaofan Wang 0001. tcasII, 71(3):1221-1225, March 2024. [doi]
- Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systemsJunhui Zhang, Jitao Sun. scl, 144:104771, 2020. [doi]
- Optimal Attack Energy Allocation against Remote State EstimationLianghong Peng, Ling Shi, Xianghui Cao, Changyin Sun. tac, 63(7):2199-2205, 2018. [doi]
- Optimal transmission strategy for sensors to defend against eavesdropping and jamming attacksLi Yuan, Kun Wang, Toshiaki Miyazaki, Song Guo, Meng Wu. icc 2017: 1-6 [doi]