关注
Heng ZHANG
Heng ZHANG
Professor, Jiangsu Ocean University, China
在 jou.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Optimal DoS attack scheduling in wireless networked control system
H Zhang, P Cheng, L Shi, J Chen
IEEE Transactions on Control Systems Technology 24 (3), 843 - 852, 2016
5752016
Optimal Denial-of-Service Attack Scheduling with Energy Constraint
Heng Zhang,Peng Cheng, Ling Shi,Jiming Chen
IEEE Transactions on Automatic Control 60 (11), 3023-3028, 2015
5712015
DoS Attack Energy Management Against Remote State Estimation
Heng Zhang, Yifei Qi, Junfeng Wu, Lingkun Fu, Lidong He
IEEE Transactions on Control of Network Systems 5 (1), 383-394, 2018
207*2018
Detecting faulty nodes with data errors for wireless sensor networks
S Guo, H Zhang, Z Zhong, J Chen, Q Cao, T He
ACM Transactions on Sensor Networks (TOSN) 10 (3), 1-27, 2014
2032014
Distributed load sharing under false data injection attack in inverter-based microgrid
H Zhang, W Meng, J Qi, X Wang, WX Zheng
IEEE Transactions on Industrial Electronics, 2018
1942018
Denial-of-Service Power Dispatch against Linear Quadratic Control via a Fading Channel
H Zhang, WX Zheng
IEEE Transactions on Automatic Control 63 (9), 3032–3039, 2018
1412018
Privacy and Performance Trade-off in Cyber-Physical Systems
Heng Zhang, Yuanchao Shu, Peng Cheng, Jiming Chen
IEEE Network 30 (2), 62-66, 2016
1212016
Testing and Defending Methods Against DOS Attack in State Estimation
H Zhang, Y Qi, H Zhou, J Zhang, J Sun
Asian Journal of Control 19 (4), 1295–1305, 2017
992017
A novel data fusion algorithm to combat false data injection attacks in networked radar systems
C Yang, L Feng, H Zhang, S He, Z Shi
IEEE Transactions on Signal and Information Processing over Networks 4 (1 …, 2018
882018
Analysis of event-driven warning message propagation in Vehicular Ad Hoc Networks
H Zhou, S Xu, D Ren, C Huang, H Zhang
Ad Hoc Networks 55, 87-96, 2017
802017
Optimal DoS attack policy against remote state estimation
H Zhang, P Cheng, L Shi, J Chen
Decision and Control (CDC), 2013 IEEE 52nd Annual Conference on, 5444-5449, 2013
762013
Multiple attacks detection in cyber-physical systems using random finite set theory
C Yang, Z Shi, H Zhang, J Wu, X Shi
IEEE transactions on cybernetics 50 (9), 4066-4075, 2019
472019
Optimal Denial-of-Service attack scheduling against linear quadratic gaussian control
H Zhang, P Cheng, L Shi, J Chen
American Control Conference (ACC), 2014, 3996-4001, 2014
422014
Security analysis and defense strategy of distributed filtering under false data injection attacks
J Zhou, W Yang, H Zhang, WX Zheng, Y Xu, Y Tang
Automatica 138, 110151, 2022
392022
An encoding mechanism for secrecy of remote state estimation
W Yang, D Li, H Zhang, Y Tang, WX Zheng
Automatica 120, 109116, 2020
392020
Online deception attack against remote state estimation
H Zhang, P Cheng, J Wu, L Shi, J Chen
IFAC Proceedings Volumes 47 (3), 128-133, 2014
372014
Achieving bilateral utility maximization and location privacy preservation in database-driven cognitive radio networks
Z Zhang, H Zhang, S He, P Cheng
2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems …, 2015
342015
Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation
L Wang, X Cao, H Zhang, C Sun, WX Zheng
Automatica 137, 110145, 2022
292022
Optimal Schedule of Secure Transmissions for Remote State Estimation Against Eavesdropping
L Wang, X Cao, B Sun, H Zhang, C Sun
IEEE Transactions on Industrial Informatics 17 (3), 1987-1997, 2020
292020
Deep retinex decomposition network for underwater image enhancement
S Xu, J Zhang, X Qin, Y Xiao, J Qian, L Bo, H Zhang, H Li, Z Zhong
Computers and Electrical Engineering 100, 107822, 2022
272022
系统目前无法执行此操作,请稍后再试。
文章 1–20