Follow
Yuzhe Li
Title
Cited by
Cited by
Year
Jamming attacks on remote state estimation in cyber-physical systems: A game-theoretic approach
Y Li, L Shi, P Cheng, J Chen, DE Quevedo
IEEE Transactions on Automatic Control 60 (10), 2831-2836, 2015
4412015
SINR-based DoS attack on remote state estimation: A game-theoretic approach
Y Li, DE Quevedo, S Dey, L Shi
IEEE Transactions on Control of Network Systems 4 (3), 632-642, 2016
3142016
Detection against linear deception attacks on multi-sensor remote state estimation
Y Li, L Shi, T Chen
IEEE Transactions on Control of Network Systems 5 (3), 846-856, 2017
2142017
A multi-channel transmission schedule for remote state estimation under DoS attacks
K Ding, Y Li, DE Quevedo, S Dey, L Shi
Automatica 78, 194-201, 2017
2102017
False data injection attacks on networked control systems: A Stackelberg game analysis
Y Li, D Shi, T Chen
IEEE Transactions on Automatic Control 63 (10), 3503-3509, 2018
1742018
Data-driven false data-injection attack design and detection in cyber-physical systems
Z Zhao, Y Huang, Z Zhen, Y Li
IEEE Transactions on Cybernetics 51 (12), 6179-6187, 2020
892020
Power control of an energy harvesting sensor for remote state estimation
Y Li, F Zhang, DE Quevedo, V Lau, S Dey, L Shi
IEEE Transactions on Automatic Control 62 (1), 277-290, 2016
732016
Optimal periodic transmission power schedules for remote estimation of ARMA processes
Y Li, DE Quevedo, V Lau, L Shi
IEEE Transactions on Signal Processing 61 (24), 6164-6174, 2013
672013
An intrusion detection system for cyber attacks in wireless networked control systems
AW Al-Dabbagh, Y Li, T Chen
IEEE Transactions on Circuits and Systems II: Express Briefs 65 (8), 1049-1053, 2017
622017
A game-theoretic approach to fake-acknowledgment attack on cyber-physical systems
Y Li, DE Quevedo, S Dey, L Shi
IEEE Transactions on Signal and Information Processing over Networks 3 (1), 1-11, 2016
572016
Jamming attack on cyber-physical systems: A game-theoretic approach
Y Li, L Shi, P Cheng, J Chen, DE Quevedo
2013 IEEE International Conference on Cyber Technology in Automation …, 2013
462013
A new switching law for event-triggered switched systems under DoS attacks
J Fu, Y Qi, N Xing, Y Li
Automatica 142, 110373, 2022
422022
Data-driven power control for state estimation: A Bayesian inference approach
J Wu, Y Li, DE Quevedo, V Lau, L Shi
Automatica 54, 332-339, 2015
392015
Stochastic detection against deception attacks in CPS: Performance evaluation and game-theoretic analysis
Y Li, Y Yang, T Chai, T Chen
Automatica 144, 110461, 2022
322022
Optimal DoS attack against LQR control channels
J Zhou, J Shang, Y Li, T Chen
IEEE Transactions on Circuits and Systems II: Express Briefs 68 (4), 1348-1352, 2020
322020
Multi-sensor transmission power control for remote estimation through a SINR-based communication channel
Y Li, AS Mehr, T Chen
Automatica 101, 78-86, 2019
322019
False-data-injection attacks on remote distributed consensus estimation
H Liu, B Niu, Y Li
IEEE Transactions on Cybernetics 52 (1), 433-443, 2020
302020
Online sensor transmission power schedule for remote state estimation
Y Li, DE Quevedo, V Lau, L Shi
52nd IEEE conference on decision and control, 4000-4005, 2013
272013
Security analysis for cyber‐physical systems under undetectable attacks: a geometric approach
Z Zhao, Y Yang, Y Li, R Liu
International Journal of Robust and Nonlinear Control 30 (11), 4359-4370, 2020
252020
Transmit power control and remote state estimation with sensor networks: A bayesian inference approach
Y Li, J Wu, T Chen
Automatica 97, 292-300, 2018
252018
The system can't perform the operation now. Try again later.
Articles 1–20