Professor, Jiangsu Ocean University, China
Verified email at
Cited by
Cited by
Optimal DoS attack scheduling in wireless networked control system
H Zhang, P Cheng, L Shi, J Chen
IEEE Transactions on Control Systems Technology 24 (3), 843 - 852, 2016
Optimal Denial-of-Service Attack Scheduling with Energy Constraint
Heng Zhang,Peng Cheng, Ling Shi,Jiming Chen
IEEE Transactions on Automatic Control 60 (11), 3023-3028, 2015
Detecting faulty nodes with data errors for wireless sensor networks
S Guo, H Zhang, Z Zhong, J Chen, Q Cao, T He
ACM Transactions on Sensor Networks (TOSN) 10 (3), 1-27, 2014
DoS Attack Energy Management Against Remote State Estimation
Heng Zhang, Yifei Qi, Junfeng Wu, Lingkun Fu, Lidong He
IEEE Transactions on Control of Network Systems 5 (1), 383-394, 2018
Distributed load sharing under false data injection attack in inverter-based microgrid
H Zhang, W Meng, J Qi, X Wang, WX Zheng
IEEE Transactions on Industrial Electronics, 2018
Denial-of-Service Power Dispatch against Linear Quadratic Control via a Fading Channel
H Zhang, WX Zheng
IEEE Transactions on Automatic Control 63 (9), 3032–3039, 2018
Privacy and Performance Trade-off in Cyber-Physical Systems
Heng Zhang, Yuanchao Shu, Peng Cheng, Jiming Chen
IEEE Network 30 (2), 62-66, 2016
Testing and Defending Methods Against DOS Attack in State Estimation
H Zhang, Y Qi, H Zhou, J Zhang, J Sun
Asian Journal of Control 19 (4), 1295–1305, 2017
Analysis of event-driven warning message propagation in Vehicular Ad Hoc Networks
H Zhou, S Xu, D Ren, C Huang, H Zhang
Ad Hoc Networks 55, 87-96, 2017
A novel data fusion algorithm to combat false data injection attacks in networked radar systems
C Yang, L Feng, H Zhang, S He, Z Shi
IEEE Transactions on Signal and Information Processing over Networks 4 (1 …, 2018
Optimal DoS attack policy against remote state estimation
H Zhang, P Cheng, L Shi, J Chen
Decision and Control (CDC), 2013 IEEE 52nd Annual Conference on, 5444-5449, 2013
Optimal Denial-of-Service attack scheduling against linear quadratic gaussian control
H Zhang, P Cheng, L Shi, J Chen
American Control Conference (ACC), 2014, 3996-4001, 2014
Multiple attacks detection in cyber-physical systems using random finite set theory
C Yang, Z Shi, H Zhang, J Wu, X Shi
IEEE transactions on cybernetics 50 (9), 4066-4075, 2019
Achieving bilateral utility maximization and location privacy preservation in database-driven cognitive radio networks
Z Zhang, H Zhang, S He, P Cheng
2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems …, 2015
Online deception attack against remote state estimation
H Zhang, P Cheng, J Wu, L Shi, J Chen
IFAC Proceedings Volumes 47 (3), 128-133, 2014
An encoding mechanism for secrecy of remote state estimation
W Yang, D Li, H Zhang, Y Tang, WX Zheng
Automatica 120, 109116, 2020
Bilateral privacy-preserving utility maximization protocol in database-driven cognitive radio networks
Z Zhang, H Zhang, S He, P Cheng
IEEE transactions on dependable and secure computing 17 (2), 236-247, 2017
Optimal Schedule of Secure Transmissions for Remote State Estimation Against Eavesdropping
L Wang, X Cao, B Sun, H Zhang, C Sun
IEEE Transactions on Industrial Informatics 17 (3), 1987-1997, 2020
Secured Measurement Fusion Scheme Against Deceptive ECM Attack in Radar Network
Chaoqun Yang, Heng Zhang, Fengzhong Qu, Zhiguo Shi
Security and Communication Networks, 2016
Securing wireless relaying communication for dual unmanned aerial vehicles with unknown eavesdropper
W Xu, H Zhang, X Cao, R Deng, H Li, J Zhang
Information Sciences 546, 871-882, 2021
The system can't perform the operation now. Try again later.
Articles 1–20