Follow
Chao Yang
Title
Cited by
Cited by
Year
Distributed filtering under false data injection attacks
W Yang, Y Zhang, G Chen, C Yang, L Shi
Automatica 102, 34-44, 2019
1162019
Stochastic link activation for distributed filtering under sensor power constraint
W Yang, C Yang, H Shi, L Shi, G Chen
Automatica 75, 109-118, 2017
862017
Deterministic Sensor Data Scheduling Under Limited Communication Resource
C Yang, L Shi
IEEE Transactions on Signal Processing 59 (10), 5050-5056, 2011
652011
Multi-Sensor Kalman Filtering with Intermittent Measurements
C Yang, J Zheng, X Ren, W Yang, H Shi, L Shi
IEEE Transactions on Automatic Control 63 (3), 797-804, 2018
642018
DoS attack in centralised sensor network against state estimation
C Yang, W Yang, H Shi
IET Control Theory & Applications 12 (9), 1244-1253, 2018
562018
Event-based distributed state estimation under deception attack
W Yang, L Lei, C Yang
Neurocomputing 270, 145-151, 2017
492017
Deterministic Sensor Selection for Centralized State Estimation under Limited Communication Resource
C Yang, J Wu, X Ren, W Yang, H Shi, L Shi
IEEE Transactions on Signal Processing 63 (9), 2336 - 2348, 2015
392015
Schedule Communication for Decentralized State Estimation
C Yang, J Wu, W Zhang, L Shi
IEEE Transactions on Signal Processing 61 (10), 2525-2535, 2013
382013
False data injection attack on consensus‐based distributed estimation
L Lei, W Yang, C Yang, HB Shi
International Journal of Robust and Nonlinear Control 27 (9), 1419-1432, 2017
342017
Nodes selection strategy in cooperative tracking problem
W Yang, Z Wang, Z Zuo, C Yang, H Shi
Automatica 74, 118-125, 2016
292016
Online power scheduling for distributed filtering over an energy-limited sensor network
W Yang, Y Zhang, C Yang, Z Zuo, X Wang
IEEE Transactions on Industrial Electronics 65 (5), 4216-4226, 2017
272017
Jamming attack in centralized state estimation
C Yang, X Ren, W Yang, H Shi, L Shi
2015 34th Chinese Control Conference (CCC), 6530-6535, 2015
162015
Event-based distributed state estimation over a WSN with false data injection attack
L Lei, W Yang, C Yang
IFAC-PapersOnLine 49 (22), 286-290, 2016
62016
Optimal linear attack on cyber physical systems with multiplicative noise
F Li, C Yang, Y Tang
IEEE Access 6, 33318-33328, 2018
52018
False data injection attack on distributed state estimation over a wireless sensor network
L Lei, W Yang, C Yang, H Shi, H Yan
2016 35th Chinese Control Conference (CCC), 8108-8113, 2016
52016
Sensor scheduling for lifetime maximization in centralized state estimation
C Yang, J Lu, W Yang, H Shi
Neurocomputing 270, 43-53, 2017
42017
Privacy preserving consensus under interception attacks
H Zhou, W Yang, C Yang
2017 36th Chinese Control Conference (CCC), 8485-8490, 2017
32017
A study of estimation and communication tradeoff using an event-based approach
C Yang, L Shi, WJ Ma
2013 Asilomar Conference on Signals, Systems and Computers, 32-36, 2013
32013
Communication-saving design by stochastic event triggers
C Yang, W Yang, H Shi
Journal of the Franklin Institute 356 (17), 10532-10546, 2019
22019
Majorization theory in sensor scheduling
C Yang, W Yang, H Shi
2015 54th IEEE Conference on Decision and Control (CDC), 3063-3068, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20