Seguir
Heng ZHANG
Heng ZHANG
Professor, Jiangsu Ocean University, China
Dirección de correo verificada de jou.edu.cn
Título
Citado por
Citado por
Año
Optimal DoS attack scheduling in wireless networked control system
H Zhang, P Cheng, L Shi, J Chen
IEEE Transactions on Control Systems Technology 24 (3), 843 - 852, 2016
5432016
Optimal Denial-of-Service Attack Scheduling with Energy Constraint
Heng Zhang,Peng Cheng, Ling Shi,Jiming Chen
IEEE Transactions on Automatic Control 60 (11), 3023-3028, 2015
5302015
Detecting faulty nodes with data errors for wireless sensor networks
S Guo, H Zhang, Z Zhong, J Chen, Q Cao, T He
ACM Transactions on Sensor Networks (TOSN) 10 (3), 1-27, 2014
2022014
DoS Attack Energy Management Against Remote State Estimation
Heng Zhang, Yifei Qi, Junfeng Wu, Lingkun Fu, Lidong He
IEEE Transactions on Control of Network Systems 5 (1), 383-394, 2018
194*2018
Distributed load sharing under false data injection attack in inverter-based microgrid
H Zhang, W Meng, J Qi, X Wang, WX Zheng
IEEE Transactions on Industrial Electronics, 2018
1762018
Denial-of-Service Power Dispatch against Linear Quadratic Control via a Fading Channel
H Zhang, WX Zheng
IEEE Transactions on Automatic Control 63 (9), 3032–3039, 2018
1272018
Privacy and Performance Trade-off in Cyber-Physical Systems
Heng Zhang, Yuanchao Shu, Peng Cheng, Jiming Chen
IEEE Network 30 (2), 62-66, 2016
1182016
Testing and Defending Methods Against DOS Attack in State Estimation
H Zhang, Y Qi, H Zhou, J Zhang, J Sun
Asian Journal of Control 19 (4), 1295–1305, 2017
942017
A novel data fusion algorithm to combat false data injection attacks in networked radar systems
C Yang, L Feng, H Zhang, S He, Z Shi
IEEE Transactions on Signal and Information Processing over Networks 4 (1 …, 2018
772018
Analysis of event-driven warning message propagation in Vehicular Ad Hoc Networks
H Zhou, S Xu, D Ren, C Huang, H Zhang
Ad Hoc Networks 55, 87-96, 2017
772017
Optimal DoS attack policy against remote state estimation
H Zhang, P Cheng, L Shi, J Chen
Decision and Control (CDC), 2013 IEEE 52nd Annual Conference on, 5444-5449, 2013
722013
Multiple attacks detection in cyber-physical systems using random finite set theory
C Yang, Z Shi, H Zhang, J Wu, X Shi
IEEE transactions on cybernetics 50 (9), 4066-4075, 2019
392019
Optimal Denial-of-Service attack scheduling against linear quadratic gaussian control
H Zhang, P Cheng, L Shi, J Chen
American Control Conference (ACC), 2014, 3996-4001, 2014
392014
Achieving bilateral utility maximization and location privacy preservation in database-driven cognitive radio networks
Z Zhang, H Zhang, S He, P Cheng
2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems …, 2015
352015
Online deception attack against remote state estimation
H Zhang, P Cheng, J Wu, L Shi, J Chen
IFAC Proceedings Volumes 47 (3), 128-133, 2014
352014
An encoding mechanism for secrecy of remote state estimation
W Yang, D Li, H Zhang, Y Tang, WX Zheng
Automatica 120, 109116, 2020
292020
Security analysis and defense strategy of distributed filtering under false data injection attacks
J Zhou, W Yang, H Zhang, WX Zheng, Y Xu, Y Tang
Automatica 138, 110151, 2022
252022
Bilateral privacy-preserving utility maximization protocol in database-driven cognitive radio networks
Z Zhang, H Zhang, S He, P Cheng
IEEE transactions on dependable and secure computing 17 (2), 236-247, 2017
222017
Securing wireless relaying communication for dual unmanned aerial vehicles with unknown eavesdropper
W Xu, H Zhang, X Cao, R Deng, H Li, J Zhang
Information Sciences 546, 871-882, 2021
212021
Optimal Schedule of Secure Transmissions for Remote State Estimation Against Eavesdropping
L Wang, X Cao, B Sun, H Zhang, C Sun
IEEE Transactions on Industrial Informatics 17 (3), 1987-1997, 2020
212020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20