Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation
Academic Article
-
- Overview
-
- Research
-
- Identity
-
- Additional Document Info
-
- Other
-
- View All
-
Overview
published proceedings
-
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS
author list (cited authors)
-
Zhang, Y., Peng, Z., Wen, G., Wang, J., & Huang, T.
complete list of authors
-
Zhang, Yingwen||Peng, Zhaoxia||Wen, Guoguang||Wang, Jinhuan||Huang, Tingwen
publication date
publisher
published in
Research
keywords
-
Kullback-leibler (kl) Divergence
-
Man-in-the-middle (mitm) Attack
-
Optimal Stealthy Attack
-
Remote State Estimator (rse)
-
Resource Constraint
Identity
Digital Object Identifier (DOI)
Additional Document Info
start page
end page
volume
issue
Other
URL
-
http://dx.doi.org/10.1109/tsmc.2023.3311853