The Vulnerability Analysis of Remote Estimation With Batch-Data Detectors Against Integrity Attacks.
Yake YangYuzhe LiYang ShiDaniel E. QuevedoPublished in: IEEE Trans. Autom. Control. (2024)
Keyphrases
- data sets
- data analysis
- data processing
- computer systems
- data collection
- data mining techniques
- original data
- database
- raw data
- missing data
- synthetic data
- high dimensional data
- data sources
- xml documents
- input data
- data warehouse
- knowledge discovery
- end users
- statistical analysis
- data structure
- spatial data
- high quality
- real time