Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/33115
Full metadata record
DC FieldValueLanguage
dc.contributor.authorZhang, L-
dc.contributor.authorShang, J-
dc.contributor.authorWang, Z-
dc.contributor.authorLiu, Q-
dc.date.accessioned2026-04-08T15:38:38Z-
dc.date.available2026-04-08T15:38:38Z-
dc.date.issued2026-03-09-
dc.identifierORCiD: Zidong Wang https://orcid.org/0000-0002-9576-7401-
dc.identifier.citationZhang, L. et al. (2026) 'Remote State Estimation under Stochastic Stealthy Attacks: Short-Term Optimization and Long-Term Convergence Analysis', IEEE Transactions on Automatic Control, 0 (early access), pp. 1–15. doi: 10.1109/tac.2026.3672354.en-US
dc.identifier.issn0018-9286-
dc.identifier.urihttps://bura.brunel.ac.uk/handle/2438/33115-
dc.description.abstractThis paper investigates the problem of remote state estimation in cyber-physical systems subject to stochastic stealthy attacks. Unlike existing studies that assume persistent intrusion, the attack success is modeled as a stochastic process, thereby providing a more realistic characterization of adversarial capabilities. A comprehensive analysis is conducted from both short-term and long-term perspectives. In the short-term analysis, the evolution of the estimation error covariance is examined, and optimal attack strategies are derived under explicit stealthiness constraints, which limit the detection probability of the attacker. In the long-term analysis, the conditions under which the expected estimation error covariance diverges or converges are explored as a function of the attack success rate and strategy. Rigorous necessary, sufficient, and equivalent conditions for error covariance divergence are established. Moreover, the convergence behavior of the estimation process is characterized under various attack designs, revealing critical thresholds and trade-offs between attack frequency and intensity. Simulation results are provided to validate the theoretical findings and to illustrate the quantitative impact of attack parameters on estimation performance degradation.en-US
dc.description.sponsorshipThis work was supported in part by the National Natural Science Foundation of China under Grants 62222312, 62473285, and 62303353, in part by the Fundamental Research Funds for the Central Universities of China, in part by the Royal Society of the UK, and the Alexander von Humboldt Foundation of Germany.en-US
dc.format.extent1–15-
dc.format.mediumPrint-Electronic-
dc.languageen-USen-US
dc.language.isoenen-US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en-US
dc.rightsCreative Commons Attribution 4.0 International-
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/-
dc.subjectremote state estimationen-US
dc.subjectstochastic stealthy attacksen-US
dc.subjectKalman filteren-US
dc.subjectshort-term optimizationen-US
dc.subjectlong-term convergenceen-US
dc.titleRemote State Estimation under Stochastic Stealthy Attacks: Short-Term Optimization and Long-Term Convergence Analysisen-US
dc.typeArticleen-US
dc.identifier.doihttps://doi.org/10.1109/tac.2026.3672354-
dc.relation.isPartOfIEEE Transactions on Automatic Control-
pubs.issue0-
pubs.publication-statusPublished-
pubs.volume00-
dc.identifier.eissn1558-2523-
dc.rights.licensehttps://creativecommons.org/licenses/by/4.0/legalcode.en-
dc.rights.holderThe Author(s)-
dc.contributor.orcidWang, Zidong [0000-0002-9576-7401]-
Appears in Collections:Department of Computer Science Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdfFor the purpose of open access, the author has applied a Creative Commons Attribution (CC BY) licence to any Author Accepted Manuscript version arising.1.23 MBAdobe PDFView/Open


This item is licensed under a Creative Commons License Creative Commons