| [1]李小杭, 张志虎, 宋春林, 等.虚假数据注入攻击下的自适应补偿控制[J].兵工学报, 2020, 41(11):2260-2265[2]LI X H, ZHANG Z H, SONG C L, et al.Adaptive compensation control under false data injection attack[J].Acta Armamentarii, 2020, 41(11):2260-2265[3]黄鑫, 畅晨旭, 李小杭, 苏庆宇.基于协同交互型观测器的虚假数据注入攻击信号重构方法[J].兵工学报, 2023, 44(11):3359-3368[4]HUANG X, CHANG C X, LI X H, SU Q Y.An Approach for Reconstructing False Data Injection Attack Signal Based on Cooperative Interaction Observer[J].Acta Armamentarii, 2023, 44(11):3359-3368[5]REN X X, YANG G H.Adaptive control for nonlinear cyber-physical systems under false data injection at-tacks through sensor networks[J].International Journal of Robust and Nonlinear Control, 2020, 30(1):65-79[6]李笑宇,冯肖雪,潘峰,等.网络攻击下无人机信息物理系统的自适应状态估计[J].航空学报, 2022, 43(3):437-450[7]LI X Y, FENG X X, PAN F, et al.Adaptive state estimate for unmanned aircraft cyber-physical system with cyber attack[J].Acta Aeronautica et Astronautica Sini-ca, 2022, 43(3):437-450[8]高煜欣,张绍杰,刘春生.网络攻击下导弹自适应事件触发制导律[J].航空学报, 2024, 45(S1):464-473[9]GAO Y X, ZHANG S J, LIU C, S.Adaptive event-triggered guidance law of missile under cyber at-tacks[J].Acta Aeronautica et Astronautica Sinica, 2024, 45(S1):464-473[10]HUANG X, DONG J.Reliable cooperative control and plug-and-play operation for networked heterogeneous systems under cyber-physical attacks[J].ISA Transactions, 2020, 104(0):62-72[11]LU A Y, YANG G H.Secure Luenberger-like observers for cyber-physical systems under sparse actuator and sensor attacks[J].Automatica, 2018, 98(0):124-129[12]LIANG L, LIU S.Event-triggered distributed attack detection and fault diagnosis[J].IEEE Transactions on Instrumentation and Measurement, 2022, 72(0):1-11[13]DUO W, ZHOU C M, ABUSORRAH A.A Survey of cyber attacks on cyber physical systems: Recent Ad-vances and Challenges[J].IEEECAA Journal of Au-tomatica Sinica, 2022, 9(05):784-800[14]SU Q, FAN Z, LONG Y, et al.Attack detection and secure state estimation for cyber-physical systems with finite-frequency observers[J].Journal of the Franklin Institute, 2020, 357(17):12724-12741[15]SUI T, MO Y, MARELLI D, et al.The vulnerability of cyber-physical system under stealthy attacks[J].IEEE Transactions on Automatic Control, 2020, 66(2):637-650[16]李进, 姜顺, 潘丰.隐蔽式攻击下网络化控制系统状态与故障的联合区间估计[J].控制与决策, 2023, 38(12):3418-3426[17]LI J, JIANG S, PAN F.Joint interval estimation of state and fault for networked control systems under stealthy attacks[J].Control and Decision, 2023, 38(12):3418-3426[18]张淇瑞, 孟思琪, 王兰豪, 等.隐蔽攻击下信息物理系统的安全输出反馈控制[J].自动化学报, 2024, 50(7):1363-1372[19]ZHANG Q R, MENG S Q, WANG L H, et al.Secure output feedback control of cyber-physical systems un-der stealthy attacks[J].Acta Automatica Sinica, 2024, 50(7):1363-1372[20]SUI T, SUN X M.The vulnerability of distributed state estimator under stealthy attacks[J].Automatica, 2021, 133(0):109869-109869[21]CHENG P, YANG Z, CHEN J, et al.An event-based stealthy attack on remote state estimation[J].IEEE Transactions on Automatic Control, 2019, 65(10):4348-4355[22]ZHANG Q, LIU K, XIA Y, et al.Optimal stealthy de-ception attack against cyber-physical systems[J].IEEE transactions on cybernetics, 2019, 50(9):3963-3972[23]JIN X, HADDAD W M, YUCELEN T.An adaptive con-trol architecture for mitigating sensor and actuator at-tacks in cyber-physical systems[J].IEEE Transactions on Automatic Control, 2017, 62(11):6058-6064[24]LI J, YANG D, SU Q, et al.Reliable control of cyber-physical systems under state attack: An adaptive inte-gral sliding-mode control approach[J].IET Control Theory & Applications, 2024, 18(1):27-39[25]LU S Y, JIN X Z, WANG H, et al.Robust adaptive estimation and tracking control for perturbed cyber-physical systems against denial of service[J].Applied Mathematics and Computation, 2021, 404(0):126255-126255[26]LIAN Y, YANG Q, XIE W, et al.Cyber-physical system-based heuristic planning and scheduling method for multiple automatic guided vehicles in logistics sys-tems[J].IEEE Transactions on Industrial Informatics, 2020, 17(11):7882-789[27]ZHANG J, SHI P, XIA Y.Robust adaptive sliding-mode control for fuzzy systems with mismatched uncertain-ties[J].IEEE Transactions on Fuzzy Systems, 2010, 18(4):700-711[28]EUGENE L, KEVIN W, HOWE D.Robust and adaptive control with aerospace applications.[J].England: Springer-Verlag London, 2013, 0(0):299-299[29]CHEN Y, SOUMMYA K.Dynamic attack detection in cyber-physical systems with side initial state infor-mation[J].IEEE Transactions on Automatic Control, 2017, 62(9):4618-4624 |