Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation.

Yingwen ZhangZhaoxia PengGuoguang WenJinhuan WangTingwen Huang
Published in: IEEE Trans. Syst. Man Cybern. Syst. (2024)
Keyphrases