Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation Academic Article uri icon

published proceedings

  • IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS

author list (cited authors)

  • Zhang, Y., Peng, Z., Wen, G., Wang, J., & Huang, T.

complete list of authors

  • Zhang, Yingwen||Peng, Zhaoxia||Wen, Guoguang||Wang, Jinhuan||Huang, Tingwen

publication date

  • 2023