期刊文献+
共找到265篇文章
< 1 2 14 >
每页显示 20 50 100
Optimal Secure Control of Networked Control Systems Under False Data Injection Attacks:A Multi-Stage Attack-Defense Game Approach
1
作者 Dajun Du Yi Zhang +1 位作者 Baoyue Xu Minrui Fei 《IEEE/CAA Journal of Automatica Sinica》 2025年第4期821-823,共3页
Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by de... Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by designing defense strategy on the basis of identifying attack strategy,maintaining stable operation of NCSs.To solve this attack-defense game problem,this letter investigates optimal secure control of NCSs under FDIAs.First,for the alterations of energy caused by false data,a novel attack-defense game model is constructed,which considers the changes of energy caused by the actions of the defender and attacker in the forward and feedback channels. 展开更多
关键词 designing defense strategy networked control systems ncss alterations energy networked control systems false data injection attacks fdias strategywhile false data injection attacks optimal secure control identifying attack strategymaintaining
在线阅读 下载PDF
Localization of False Data Injection Attacks in Power Grid Based on Adaptive Neighborhood Selection and Spatio-Temporal Feature Fusion
2
作者 Zehui Qi Sixing Wu Jianbin Li 《Computers, Materials & Continua》 2025年第11期3739-3766,共28页
False Data Injection Attacks(FDIAs)pose a critical security threat to modern power grids,corrupting state estimation and enabling malicious control actions that can lead to severe consequences,including cascading fail... False Data Injection Attacks(FDIAs)pose a critical security threat to modern power grids,corrupting state estimation and enabling malicious control actions that can lead to severe consequences,including cascading failures,large-scale blackouts,and significant economic losses.While detecting attacks is important,accurately localizing compromised nodes or measurements is even more critical,as it enables timely mitigation,targeted response,and enhanced system resilience beyond what detection alone can offer.Existing research typically models topological features using fixed structures,which can introduce irrelevant information and affect the effectiveness of feature extraction.To address this limitation,this paper proposes an FDIA localization model with adaptive neighborhood selection,which dynamically captures spatial dependencies of the power grid by adjusting node relationships based on data-driven similarities.The improved Transformer is employed to pre-fuse global spatial features of the graph,enriching the feature representation.To improve spatio-temporal correlation extraction for FDIA localization,the proposed model employs dilated causal convolution with a gating mechanism combined with graph convolution to capture and fuse long-range temporal features and adaptive topological features.This fully exploits the temporal dynamics and spatial dependencies inherent in the power grid.Finally,multi-source information is integrated to generate highly robust node embeddings,enhancing FDIA detection and localization.Experiments are conducted on IEEE 14,57,and 118-bus systems,and the results demonstrate that the proposed model substantially improves the accuracy of FDIA localization.Additional experiments are conducted to verify the effectiveness and robustness of the proposed model. 展开更多
关键词 Power grid security adaptive neighborhood selection spatio-temporal correlation false data injection attacks localization
在线阅读 下载PDF
Optimal two-channel switching false data injection attacks against remote state estimation of the unmanned aerial vehicle cyber-physical system
3
作者 Juhong Zheng Dawei Liu +1 位作者 Jinxing Hua Xin Ning 《Defence Technology(防务技术)》 2025年第5期319-332,共14页
A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on ... A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on feedback and feed-forward channels simultaneously with limited resource.The attacker aims at degrading the UAV CPS's estimation performance to the max while keeping stealthiness characterized by the Kullback-Leibler(K-L)divergence.The attacker is resource limited which can only attack part of sensors,and the attacked sensor as well as specific forms of attack signals at each instant should be considered by the attacker.Also,the sensor selection principle is investigated with respect to time invariant attack covariances.Additionally,the optimal switching attack strategies in regard to time variant attack covariances are modeled as a multi-agent Markov decision process(MDP)with hybrid discrete-continuous action space.Then,the multi-agent MDP is solved by utilizing the deep Multi-agent parameterized Q-networks(MAPQN)method.Ultimately,a quadrotor near hover system is used to validate the effectiveness of the results in the simulation section. 展开更多
关键词 Unmanned aerial vehicle(UAV) Cyber physical systems(CPS) K-L divergence Multi-sensor fusion kalman filter Stealthy switching false data injection(FDI) attacks
在线阅读 下载PDF
Robust False Data Injection Identification Framework for Power Systems Using Explainable Deep Learning
4
作者 Ghadah Aldehim Shakila Basheer +1 位作者 Ala Saleh Alluhaidan Sapiah Sakri 《Computers, Materials & Continua》 2025年第11期3599-3619,共21页
Although digital changes in power systems have added more ways to monitor and control them,these changes have also led to new cyber-attack risks,mainly from False Data Injection(FDI)attacks.If this happens,the sensors... Although digital changes in power systems have added more ways to monitor and control them,these changes have also led to new cyber-attack risks,mainly from False Data Injection(FDI)attacks.If this happens,the sensors and operations are compromised,which can lead to big problems,disruptions,failures and blackouts.In response to this challenge,this paper presents a reliable and innovative detection framework that leverages Bidirectional Long Short-Term Memory(Bi-LSTM)networks and employs explanatory methods from Artificial Intelligence(AI).Not only does the suggested architecture detect potential fraud with high accuracy,but it also makes its decisions transparent,enabling operators to take appropriate action.Themethod developed here utilizesmodel-free,interpretable tools to identify essential input elements,thereby making predictions more understandable and usable.Enhancing detection performance is made possible by correcting class imbalance using Synthetic Minority Over-sampling Technique(SMOTE)-based data balancing.Benchmark power system data confirms that the model functions correctly through detailed experiments.Experimental results showed that Bi-LSTM+Explainable AI(XAI)achieved an average accuracy of 94%,surpassing XGBoost(89%)and Bagging(84%),while ensuring explainability and a high level of robustness across various operating scenarios.By conducting an ablation study,we find that bidirectional recursive modeling and ReLU activation help improve generalization and model predictability.Additionally,examining model decisions through LIME enables us to identify which features are crucial for making smart grid operational decisions in real time.The research offers a practical and flexible approach for detecting FDI attacks,improving the security of cyber-physical systems,and facilitating the deployment of AI in energy infrastructure. 展开更多
关键词 false data injection attacks bidirectional long short-term memory(Bi-LSTM) explainable AI(XAI) power systems
在线阅读 下载PDF
Multi-Spacecraft Formation Control Under False Data Injection Attack:A Cross Layer Fuzzy Game Approach
5
作者 Yifan Zhong Yuan Yuan +2 位作者 Huanhuan Yuan Mengbi Wang Huaping Liu 《IEEE/CAA Journal of Automatica Sinica》 2025年第4期776-788,共13页
In this paper,we address a cross-layer resilient control issue for a kind of multi-spacecraft system(MSS)under attack.Attackers with bad intentions use the false data injection(FDI)attack to prevent the MSS from reach... In this paper,we address a cross-layer resilient control issue for a kind of multi-spacecraft system(MSS)under attack.Attackers with bad intentions use the false data injection(FDI)attack to prevent the MSS from reaching the goal of consensus.In order to ensure the effectiveness of the control,the embedded defender in MSS preliminarily allocates the defense resources among spacecrafts.Then,the attacker selects its target spacecrafts to mount FDI attack to achieve the maximum damage.In physical layer,a Nash equilibrium(NE)control strategy is proposed for MSS to quantify system performance under the effect of attacks by solving a game problem.In cyber layer,a fuzzy Stackelberg game framework is used to examine the rivalry process between the attacker and defender.The strategies of both attacker and defender are given based on the analysis of physical layer and cyber layer.Finally,a simulation example is used to test the viability of the proposed cross layer fuzzy game algorithm. 展开更多
关键词 false data injection(FDI)attack fuzzy Stackelberg game multi-spacecraft system(MSS)
在线阅读 下载PDF
Residual-Based False Data Injection Attacks Against Multi-Sensor Estimation Systems 被引量:6
6
作者 Haibin Guo Jian Sun Zhong-Hua Pang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第5期1181-1191,共11页
This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the meas... This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the measurement residuals of partial sensors due to limited attack resources,is proposed to maximally degrade system estimation performance.The attack stealthiness condition is given,and then the estimation error covariance in compromised state is derived to quantify the system performance under attack.The optimal attack strategy is obtained by solving several convex optimization problems which maximize the trace of the compromised estimation error covariance subject to the stealthiness condition.Moreover,due to the constraint of attack resources,the selection principle of the attacked sensor is provided to determine which sensor is attacked so as to hold the most impact on system performance.Finally,simulation results are presented to verify the theoretical analysis. 展开更多
关键词 Cyber-physical systems(CPSs) false data injection(FDI)attacks remote state estimation stealthy attacks
在线阅读 下载PDF
Passivity-Based Robust Control Against Quantified False Data Injection Attacks in Cyber-Physical Systems 被引量:4
7
作者 Yue Zhao Ze Chen +2 位作者 Chunjie Zhou Yu-Chu Tian Yuanqing Qin 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第8期1440-1450,共11页
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false d... Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control signals.For quantified false data injection attacks,this paper establishes an effective defense framework from the energy conversion perspective.Then,we design an energy controller to dynamically adjust the system energy changes caused by unknown attacks.The designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping injection.Moreover,with the disturbance attenuation technique,the burden of control system design is simplified because there is no need to design an attack observer.In addition,this secure control method is simple to implement because it avoids complicated mathematical operations.The effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor. 展开更多
关键词 Cyber-physical systems energy controller energy conversion false data injection attacks L2 disturbance attenuation technology
在线阅读 下载PDF
Active resilient defense control against false data injection attacks in smart grids
8
作者 Xiaoyuan Luo Lingjie Hou +3 位作者 Xinyu Wang Ruiyang Gao Shuzheng Wang Xinping Guan 《Control Theory and Technology》 EI CSCD 2023年第4期515-529,共15页
The emerging of false data injection attacks(FDIAs)can fool the traditional detection methods by injecting false data,which has brought huge risks to the security of smart grids.For this reason,a resilient active defe... The emerging of false data injection attacks(FDIAs)can fool the traditional detection methods by injecting false data,which has brought huge risks to the security of smart grids.For this reason,a resilient active defense control scheme based on interval observer detection is proposed in this paper to protect smart grids.The proposed active defense highlights the integration of detection and defense against FDIAs in smart girds.First,a dynamic physical grid model under FDIAs is modeled,in which model uncertainty and parameter uncertainty are taken into account.Then,an interval observer-based detection method against FDIAs is proposed,where a detection criteria using interval residual is put forward.Corresponding to the detection results,the resilient defense controller is triggered to defense the FDIAs if the system states are affected by FDIAs.Linear matrix inequality(LMI)approach is applied to design the resilient controller with H_(∞)performance.The system with the resilient defense controller can be robust to FDIAs and the gain of the resilient controller has a certain gain margin.Our active resilient defense approach can be built in real time and show accurate and quick respond to the injected FDIAs.The effectiveness of the proposed defense scheme is verified by the simulation results on an IEEE 30-bus grid system. 展开更多
关键词 Active resilient defense Attack detection Cyber attacks Cyber-attack detection Cyber grid elements Cyber threat false data injection attack Smart grids security Interval observer
原文传递
Security control of Markovian jump neural networks with stochastic sampling subject to false data injection attacks
9
作者 Lan Yao Xia Huang +1 位作者 Zhen Wang Min Xiao 《Communications in Theoretical Physics》 SCIE CAS CSCD 2023年第10期146-154,共9页
The security control of Markovian jumping neural networks(MJNNs)is investigated under false data injection attacks that take place in the shared communication network.Stochastic sampleddata control is employed to rese... The security control of Markovian jumping neural networks(MJNNs)is investigated under false data injection attacks that take place in the shared communication network.Stochastic sampleddata control is employed to research the exponential synchronization of MJNNs under false data injection attacks(FDIAs)since it can alleviate the impact of the FDIAs on the performance of the system by adjusting the sampling periods.A multi-delay error system model is established through the input-delay approach.To reduce the conservatism of the results,a sampling-periodprobability-dependent looped Lyapunov functional is constructed.In light of some less conservative integral inequalities,a synchronization criterion is derived,and an algorithm is provided that can be solved for determining the controller gain.Finally,a numerical simulation is presented to confirm the efficiency of the proposed method. 展开更多
关键词 Markovian jumping neural networks stochastic sampling looped-functional false data injection attack
原文传递
Kinematic Control of Serial Manipulators Under False Data Injection Attack 被引量:5
10
作者 Yinyan Zhang Shuai Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第4期1009-1019,共11页
With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits ... With advanced communication technologies,cyberphysical systems such as networked industrial control systems can be monitored and controlled by a remote control center via communication networks.While lots of benefits can be achieved with such a configuration,it also brings the concern of cyber attacks to the industrial control systems,such as networked manipulators that are widely adopted in industrial automation.For such systems,a false data injection attack on a control-center-to-manipulator(CC-M)communication channel is undesirable,and has negative effects on the manufacture quality.In this paper,we propose a resilient remote kinematic control method for serial manipulators undergoing a false data injection attack by leveraging the kinematic model.Theoretical analysis shows that the proposed method can guarantee asymptotic convergence of the regulation error to zero in the presence of a type of false data injection attack.The efficacy of the proposed method is validated via simulations. 展开更多
关键词 Cyber-physical systems false data injection attack MANIPULATORS remote kinematic control
在线阅读 下载PDF
Coot Optimization with Deep Learning-Based False Data Injection Attack Recognition
11
作者 T.Satyanarayana Murthy P.Udayakumar +2 位作者 Fayadh Alenezi E.Laxmi Lydia Mohamad Khairi Ishak 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期255-271,共17页
The recent developments in smart cities pose major security issues for the Internet of Things(IoT)devices.These security issues directly result from inappropriate security management protocols and their implementation... The recent developments in smart cities pose major security issues for the Internet of Things(IoT)devices.These security issues directly result from inappropriate security management protocols and their implementation by IoT gadget developers.Cyber-attackers take advantage of such gadgets’vulnerabilities through various attacks such as injection and Distributed Denial of Service(DDoS)attacks.In this background,Intrusion Detection(ID)is the only way to identify the attacks and mitigate their damage.The recent advancements in Machine Learning(ML)and Deep Learning(DL)models are useful in effectively classifying cyber-attacks.The current research paper introduces a new Coot Optimization Algorithm with a Deep Learning-based False Data Injection Attack Recognition(COADL-FDIAR)model for the IoT environment.The presented COADL-FDIAR technique aims to identify false data injection attacks in the IoT environment.To accomplish this,the COADL-FDIAR model initially preprocesses the input data and selects the features with the help of the Chi-square test.To detect and classify false data injection attacks,the Stacked Long Short-Term Memory(SLSTM)model is exploited in this study.Finally,the COA algorithm effectively adjusts the SLTSM model’s hyperparameters effectively and accomplishes a superior recognition efficiency.The proposed COADL-FDIAR model was experimentally validated using a standard dataset,and the outcomes were scrutinized under distinct aspects.The comparative analysis results assured the superior performance of the proposed COADL-FDIAR model over other recent approaches with a maximum accuracy of 98.84%. 展开更多
关键词 false data injection attack security internet of things deep learning coot optimization algorithm
在线阅读 下载PDF
基于DACDiff的分布式电源调度控制系统FDIAs防御方法
12
作者 李元诚 孙鹤洋 +2 位作者 张桐 张贺方 杨立群 《信息网络安全》 北大核心 2025年第4期578-586,共9页
随着可再生能源的发展,分布式电源的应用规模持续扩大,其在高效能源利用和绿色环保方面的优势得到了广泛认可。然而,由于系统的分散性、复杂性和不确定性,使分布式电源调控更易受到虚假数据注入攻击(FDIAs)的安全威胁。FDIAs篡改实时量... 随着可再生能源的发展,分布式电源的应用规模持续扩大,其在高效能源利用和绿色环保方面的优势得到了广泛认可。然而,由于系统的分散性、复杂性和不确定性,使分布式电源调控更易受到虚假数据注入攻击(FDIAs)的安全威胁。FDIAs篡改实时量测数据干扰状态估计和调度决策,可能导致电力系统的不稳定、运行失误,甚至引发严重的电力事故。为确保新型电力系统的安全可靠运行,文章提出一种针对分布式电源调控FDIAs的DACDiff防御方法,该模型基于改进的条件扩散模型,采用DACformer作为去噪网络,采用双重注意力机制捕捉时间序列中的依赖性,通过上采样和多尺度设计更好保留数据特征,用高度逼真的生成数据替换受攻击影响的数据,以保证状态估计的连续性和调控指令的正确性。在电力数据集上的仿真实验结果表明,DACDiff模型在数据生成质量和防御能力方面表现优异,能够有效恢复受到FDIAs影响的分布式电源调控系统,提供了更优的安全性与稳定性。 展开更多
关键词 分布式电源调控 虚假数据注入攻击 主动防御 扩散模型 双重注意力机制
在线阅读 下载PDF
False data injection attacks data recovery in smart grids:A graph characteristics-based model
13
作者 Xinyu Wang Man Hu +1 位作者 Xiaoyuan Luo Xinping Guan 《Smart Power & Energy Security》 2025年第2期86-96,共11页
False data injection(FDI)attacks pose a critical threat to power system security by crafting sophisticated attack vectors that evade conventional bad data detection methods.These malicious manipulations corrupt state ... False data injection(FDI)attacks pose a critical threat to power system security by crafting sophisticated attack vectors that evade conventional bad data detection methods.These malicious manipulations corrupt state estimation results,potentially leading to severe operational failures in control centers.To combat this challenge,we present an innovative Generative Adversarial Network framework with Spatial Feature-based Temporal Convolutional Network as the discriminator and Random Forest-Graph Convolutional Generator hybrid model as the generator.The proposed approach leverages a Random Forest-enhanced Graph Convolutional Generator to reconstruct attack-free measurements while employing a Spatial-Temporal Feature-based Discriminator to improve detection accuracy.Through adversarial training,these components synergistically improve both attack detection sensitivity and data reconstruction accuracy.Comprehensive numerical simulations on IEEE 14-bus and 118-bus test systems validate the model's superior performance,demonstrating significant improvements in both detection robustness and operational resilience against FDI attacks. 展开更多
关键词 false data injection attacks Attack detection data recovery Neural networks
在线阅读 下载PDF
Smart Inverter Enabled Meter Encoding for Detecting False Data Injection Attacks in Distribution System State Estimation
14
作者 Hang Zhang Bo Liu Hongyu Wu 《Journal of Modern Power Systems and Clean Energy》 2025年第5期1776-1786,共11页
Meter encoding,as a side-effect-free scheme,has been proposed to detect false data injection(FDI)attacks without significantly affecting the operation of power systems.However,existing meter encoding schemes either re... Meter encoding,as a side-effect-free scheme,has been proposed to detect false data injection(FDI)attacks without significantly affecting the operation of power systems.However,existing meter encoding schemes either require encoding lots of measurements from different buses to protect a substantial proportion of a power system or are unhidden from alert attackers.To address these issues,this paper proposes a smart inverter enabled meter encoding scheme for detecting FDI attacks in distribution system state estimation.The proposed scheme only encodes the measurements from the existing programmable smart inverters.Meanwhile,this scheme can protect all the downstream buses from the encoded inverter bus.Compared with existing schemes,the proposed scheme encodes fewer meters when protecting the same number of buses,which decreases the encoding cost.In addition,by following the physical power flow laws,the proposed scheme is hidden from alert attackers who can implement the state estimation-based bad data detection(BDD).Simulation results from the IEEE 69-bus distribution system demonstrate that the proposed scheme can mislead the attacker's state estimation on all the downstream buses from the encoded bus without arousing the attacker's suspicion.FDI attacks that are constructed based on the misled estimated state are very likely to trigger the defender's BDD alarm. 展开更多
关键词 Meter encoding false data injection(FDI) attack detection distribution system state estimation
原文传递
基于CCTGAN-OLGBM的电力CPS FDIAs检测方法
15
作者 薄小永 曲朝阳 +1 位作者 董运昌 王达 《计算机仿真》 2025年第6期124-128,202,共6页
电力信息物理系统(CPS)实现了新能源电源与多元负荷的广域互联以及信息流与能量流的动态交互,但亦面临愈加严峻的虚假数据注入攻击(FDIAs)安全威胁。在以上背景下,提出一种基于改进生成对抗网络(CCTGAN)与优化轻量级梯度提升机(OLGBM)... 电力信息物理系统(CPS)实现了新能源电源与多元负荷的广域互联以及信息流与能量流的动态交互,但亦面临愈加严峻的虚假数据注入攻击(FDIAs)安全威胁。在以上背景下,提出一种基于改进生成对抗网络(CCTGAN)与优化轻量级梯度提升机(OLGBM)相结合的FDIAs检测方法。首先改进提出了能够学习表格类样本数据的CCTGAN,然后通过引入焦点损失函数优化设计了OLGBM算法,并在此基础上提出了具备数据增强和攻击检测功能的FDIAs检测方法,最后通过算例分析验证了本文所提方法的有效性。 展开更多
关键词 生成对抗网络 电力信息物理系统 虚假数据注入攻击 攻击检测 数据驱动
在线阅读 下载PDF
基于BO-GRU-ELM的电网虚假数据注入攻击定位检测方法
16
作者 翁颖 陈郁林 +3 位作者 黄杏 齐冬莲 李丽 黄缙华 《全球能源互联网》 北大核心 2026年第1期72-84,共13页
随着电力系统信息-物理耦合程度的不断加深,网络攻击威胁愈发严重。其中,虚假数据注入攻击(FDIA)能够隐蔽篡改量测数据,影响电力系统状态估计,进而对电力系统的安全、稳定、经济运行产生严重影响。为此,构建了一种考虑成本-效益平衡的混... 随着电力系统信息-物理耦合程度的不断加深,网络攻击威胁愈发严重。其中,虚假数据注入攻击(FDIA)能够隐蔽篡改量测数据,影响电力系统状态估计,进而对电力系统的安全、稳定、经济运行产生严重影响。为此,构建了一种考虑成本-效益平衡的混合FDIA模型,并提出了一种基于贝叶斯优化-门控循环单元-极限学习机(BO-GRUELM)的电网FDIA定位检测方法。该方法结合门控循环单元(GRU)提取时序特征和极限学习机(ELM)的高效多输出分类能力,设计了基于GRU-ELM的FDIA定位检测算法;而后,以检测性能指标值F2分数为目标,采用贝叶斯优化对GRU-ELM超参数进行全局优化,以提高模型检测性能。最后,依次基于实际电网数据改进的14节点和107节点电力系统开展仿真实验,以验证所构建混合FDIA模型的有效性,仿真结果表明了所提攻击定位检测算法在准确性、鲁棒性和泛化能力上的优越性。 展开更多
关键词 攻击检测 虚假数据注入攻击 极限学习机 门控循环单元 贝叶斯优化
在线阅读 下载PDF
FDI攻击下的ICPS状态重构安全控制策略
17
作者 任悦其 孙子文 《控制理论与应用》 北大核心 2026年第1期216-226,共11页
为提高同时遭受执行器通道和传感器通道虚假数据注入(FDI)攻击的工业信息物理系统(ICPS)的安全性,本文研究重构FDI攻击信号和ICPS状态的安全控制策略.首先,构建由系统状态和传感器攻击信号组成的增广状态,并根据该增广状态来建立增广系... 为提高同时遭受执行器通道和传感器通道虚假数据注入(FDI)攻击的工业信息物理系统(ICPS)的安全性,本文研究重构FDI攻击信号和ICPS状态的安全控制策略.首先,构建由系统状态和传感器攻击信号组成的增广状态,并根据该增广状态来建立增广系统;其次,在建立的增广系统基础上,设计可调比例积分观测器,用于重构系统状态、传感器FDI攻击信号和执行器FDI攻击信号;然后,通过重构的系统状态和执行器FDI攻击信号设计反馈控制器,并采用李雅普诺夫函数和有限频域H_(∞)来分析系统满足稳定性和鲁棒性所需的条件;最后,使用垂直起降飞机的线性纵向动力学模型作为仿真对象,模拟结果验证本文所研究的控制策略可以抵御针对ICPS的FDI攻击并且保证系统稳定. 展开更多
关键词 工业信息物理系统 虚假数据注入攻击 观测器 状态重构 安全控制 有限频域 鲁棒性
在线阅读 下载PDF
基于仿生遗传进化优化的四旋翼无人机网络化H_(∞)控制
18
作者 张义军 汪雪建 余涛 《自动化与信息工程》 2026年第1期16-26,共11页
针对网络化控制系统存在的网络带宽受限与网络攻击等问题,提出一种动态事件触发(DET)机制。该机制通过采样误差动态调整事件触发参数,并设计相应的触发阈值条件。基于DET机制建立闭环控制系统模型,利用李雅普诺夫稳定性方法推导出闭环... 针对网络化控制系统存在的网络带宽受限与网络攻击等问题,提出一种动态事件触发(DET)机制。该机制通过采样误差动态调整事件触发参数,并设计相应的触发阈值条件。基于DET机制建立闭环控制系统模型,利用李雅普诺夫稳定性方法推导出闭环控制系统性能的均方渐近稳定充分条件,并融合仿生遗传进化算法与线性矩阵不等式(LMI)设计系统控制器,以提升系统动态性能。以四旋翼无人机系统为例进行仿真实验,验证所提理论在遭受虚假数据注入(FDI)攻击时能够达到预期的系统动态性能,并有效提高了网络通信效率。 展开更多
关键词 仿生遗传进化算法 H_(∞)控制 动态事件触发机制 线性矩阵不等式 虚假数据注入攻击
在线阅读 下载PDF
虚假数据注入攻击下直流微电网分布式弹性控制
19
作者 邰源政 孟范伟 张煜 《东北大学学报(自然科学版)》 北大核心 2026年第1期67-74,81,共9页
针对直流微电网在虚假数据注入攻击下出现电压偏差和电流分配失衡的问题,以多分布式电源的孤岛直流微电网为研究对象,提出一种分布式弹性协同控制方法.该方法能有效消除虚假数据注入攻击的影响,在正常情况下也不会干扰到系统的运行.通过... 针对直流微电网在虚假数据注入攻击下出现电压偏差和电流分配失衡的问题,以多分布式电源的孤岛直流微电网为研究对象,提出一种分布式弹性协同控制方法.该方法能有效消除虚假数据注入攻击的影响,在正常情况下也不会干扰到系统的运行.通过Lyapunov稳定理论证明了直流微电网在受到任意常值虚假数据注入攻击时均能保证正常稳定运行,实现电压调控和电流分配2个控制目标.利用MATLAB/Simulink搭建了仿真模型,验证了该控制方法的有效性. 展开更多
关键词 直流微电网 虚假数据注入攻击 分布式二次控制 弹性控制方法 电压调控 电流分配
在线阅读 下载PDF
基于Attention-SLSTM的虚假数据注入攻击检测
20
作者 王茹 周先军 张炎 《湖北工业大学学报》 2026年第1期43-49,共7页
针对影响智能电网安全运行问题,提出了一种基于注意力机制的堆叠LSTM网络FDIA检测方法。堆叠LSTM能够通过网络深度增加提取更深层次的特征,而加入注意力机制能够更好的表示模型不同特征层级间的结构关系,增加隐藏层的非线性表达能力,使... 针对影响智能电网安全运行问题,提出了一种基于注意力机制的堆叠LSTM网络FDIA检测方法。堆叠LSTM能够通过网络深度增加提取更深层次的特征,而加入注意力机制能够更好的表示模型不同特征层级间的结构关系,增加隐藏层的非线性表达能力,使所提出的模型预测精度更高,从而获得更高的FDIA判断准确率。在IEEE14节点系统环境下进行验证,实验结果表明,合适层数的Attention-SLSTM网络可以获得更高的精确度。与其他几种方法相比,该方法能够取得更好的训练效果,获得更高的FDIA检测准确率。 展开更多
关键词 智能电网 虚假数据注入攻击 不良数据检测 堆叠LSTM网络 注意力机制
在线阅读 下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部