Login / Signup
Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation.
Yingwen Zhang
Zhaoxia Peng
Guoguang Wen
Jinhuan Wang
Tingwen Huang
Published in:
IEEE Trans. Syst. Man Cybern. Syst. (2024)
Keyphrases
</>
resource constraints
state estimation
resource constrained
kalman filter
resource availability
particle filter
temporal constraints
routing problem
kalman filtering
closed form
dynamic systems
countermeasures
visual tracking
resource allocation
relational databases
video sequences
dynamic programming
lower bound