Sign in
Secure Estimation, Attack Isolation, and Reconstruction Based on Zonotopic Unknown Input Observer.
Hao Liu
Yuzhe Li
Qing-Long Han
Tarek Raïssi
Tianyou Chai
Published in:
IEEE Trans. Autom. Control. (2023)
Keyphrases
</>
key exchange protocol
three dimensional
estimation algorithm
countermeasures
security measures
authentication protocol
shape estimation
input data
super resolution
lightweight
neural network
authentication mechanism
discrete tomography
standard model
reconstruction method
security issues
error analysis