Professor, Jiangsu Ocean University, China
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Optimal DoS attack scheduling in wireless networked control system
H Zhang, P Cheng, L Shi, J Chen
IEEE Transactions on Control Systems Technology 24 (3), 843 - 852, 2016
Optimal Denial-of-Service Attack Scheduling with Energy Constraint
Heng Zhang,Peng Cheng, Ling Shi,Jiming Chen
IEEE Transactions on Automatic Control 60 (11), 3023-3028, 2015
Detecting faulty nodes with data errors for wireless sensor networks
S Guo, H Zhang, Z Zhong, J Chen, Q Cao, T He
ACM Transactions on Sensor Networks (TOSN) 10 (3), 1-27, 2014
DoS Attack Energy Management Against Remote State Estimation
Heng Zhang, Yifei Qi, Junfeng Wu, Lingkun Fu, Lidong He
IEEE Transactions on Control of Network Systems 5 (1), 383-394, 2018
Distributed load sharing under false data injection attack in inverter-based microgrid
H Zhang, W Meng, J Qi, X Wang, WX Zheng
IEEE Transactions on Industrial Electronics, 2018
Denial-of-Service Power Dispatch against Linear Quadratic Control via a Fading Channel
H Zhang, WX Zheng
IEEE Transactions on Automatic Control 63 (9), 3032–3039, 2018
Privacy and Performance Trade-off in Cyber-Physical Systems
Heng Zhang, Yuanchao Shu, Peng Cheng, Jiming Chen
IEEE Network 30 (2), 62-66, 2016
Testing and Defending Methods Against DOS Attack in State Estimation
H Zhang, Y Qi, H Zhou, J Zhang, J Sun
Asian Journal of Control 19 (4), 1295–1305, 2017
A novel data fusion algorithm to combat false data injection attacks in networked radar systems
C Yang, L Feng, H Zhang, S He, Z Shi
IEEE Transactions on Signal and Information Processing over Networks 4 (1 …, 2018
Analysis of event-driven warning message propagation in Vehicular Ad Hoc Networks
H Zhou, S Xu, D Ren, C Huang, H Zhang
Ad Hoc Networks 55, 87-96, 2017
Optimal DoS attack policy against remote state estimation
H Zhang, P Cheng, L Shi, J Chen
Decision and Control (CDC), 2013 IEEE 52nd Annual Conference on, 5444-5449, 2013
Optimal Denial-of-Service attack scheduling against linear quadratic gaussian control
H Zhang, P Cheng, L Shi, J Chen
American Control Conference (ACC), 2014, 3996-4001, 2014
Multiple attacks detection in cyber-physical systems using random finite set theory
C Yang, Z Shi, H Zhang, J Wu, X Shi
IEEE transactions on cybernetics 50 (9), 4066-4075, 2019
Achieving bilateral utility maximization and location privacy preservation in database-driven cognitive radio networks
Z Zhang, H Zhang, S He, P Cheng
2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems …, 2015
Online deception attack against remote state estimation
H Zhang, P Cheng, J Wu, L Shi, J Chen
IFAC Proceedings Volumes 47 (3), 128-133, 2014
An encoding mechanism for secrecy of remote state estimation
W Yang, D Li, H Zhang, Y Tang, WX Zheng
Automatica 120, 109116, 2020
Security analysis and defense strategy of distributed filtering under false data injection attacks
J Zhou, W Yang, H Zhang, WX Zheng, Y Xu, Y Tang
Automatica 138, 110151, 2022
Optimal Schedule of Secure Transmissions for Remote State Estimation Against Eavesdropping
L Wang, X Cao, B Sun, H Zhang, C Sun
IEEE Transactions on Industrial Informatics 17 (3), 1987-1997, 2020
Bilateral privacy-preserving utility maximization protocol in database-driven cognitive radio networks
Z Zhang, H Zhang, S He, P Cheng
IEEE transactions on dependable and secure computing 17 (2), 236-247, 2017
Securing wireless relaying communication for dual unmanned aerial vehicles with unknown eavesdropper
W Xu, H Zhang, X Cao, R Deng, H Li, J Zhang
Information Sciences 546, 871-882, 2021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20