Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/33115Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Zhang, L | - |
| dc.contributor.author | Shang, J | - |
| dc.contributor.author | Wang, Z | - |
| dc.contributor.author | Liu, Q | - |
| dc.date.accessioned | 2026-04-08T15:38:38Z | - |
| dc.date.available | 2026-04-08T15:38:38Z | - |
| dc.date.issued | 2026-03-09 | - |
| dc.identifier | ORCiD: Zidong Wang https://orcid.org/0000-0002-9576-7401 | - |
| dc.identifier.citation | Zhang, L. et al. (2026) 'Remote State Estimation under Stochastic Stealthy Attacks: Short-Term Optimization and Long-Term Convergence Analysis', IEEE Transactions on Automatic Control, 0 (early access), pp. 1–15. doi: 10.1109/tac.2026.3672354. | en-US |
| dc.identifier.issn | 0018-9286 | - |
| dc.identifier.uri | https://bura.brunel.ac.uk/handle/2438/33115 | - |
| dc.description.abstract | This paper investigates the problem of remote state estimation in cyber-physical systems subject to stochastic stealthy attacks. Unlike existing studies that assume persistent intrusion, the attack success is modeled as a stochastic process, thereby providing a more realistic characterization of adversarial capabilities. A comprehensive analysis is conducted from both short-term and long-term perspectives. In the short-term analysis, the evolution of the estimation error covariance is examined, and optimal attack strategies are derived under explicit stealthiness constraints, which limit the detection probability of the attacker. In the long-term analysis, the conditions under which the expected estimation error covariance diverges or converges are explored as a function of the attack success rate and strategy. Rigorous necessary, sufficient, and equivalent conditions for error covariance divergence are established. Moreover, the convergence behavior of the estimation process is characterized under various attack designs, revealing critical thresholds and trade-offs between attack frequency and intensity. Simulation results are provided to validate the theoretical findings and to illustrate the quantitative impact of attack parameters on estimation performance degradation. | en-US |
| dc.description.sponsorship | This work was supported in part by the National Natural Science Foundation of China under Grants 62222312, 62473285, and 62303353, in part by the Fundamental Research Funds for the Central Universities of China, in part by the Royal Society of the UK, and the Alexander von Humboldt Foundation of Germany. | en-US |
| dc.format.extent | 1–15 | - |
| dc.format.medium | Print-Electronic | - |
| dc.language | en-US | en-US |
| dc.language.iso | en | en-US |
| dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en-US |
| dc.rights | Creative Commons Attribution 4.0 International | - |
| dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | - |
| dc.subject | remote state estimation | en-US |
| dc.subject | stochastic stealthy attacks | en-US |
| dc.subject | Kalman filter | en-US |
| dc.subject | short-term optimization | en-US |
| dc.subject | long-term convergence | en-US |
| dc.title | Remote State Estimation under Stochastic Stealthy Attacks: Short-Term Optimization and Long-Term Convergence Analysis | en-US |
| dc.type | Article | en-US |
| dc.identifier.doi | https://doi.org/10.1109/tac.2026.3672354 | - |
| dc.relation.isPartOf | IEEE Transactions on Automatic Control | - |
| pubs.issue | 0 | - |
| pubs.publication-status | Published | - |
| pubs.volume | 00 | - |
| dc.identifier.eissn | 1558-2523 | - |
| dc.rights.license | https://creativecommons.org/licenses/by/4.0/legalcode.en | - |
| dc.rights.holder | The Author(s) | - |
| dc.contributor.orcid | Wang, Zidong [0000-0002-9576-7401] | - |
| Appears in Collections: | Department of Computer Science Research Papers | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| FullText.pdf | For the purpose of open access, the author has applied a Creative Commons Attribution (CC BY) licence to any Author Accepted Manuscript version arising. | 1.23 MB | Adobe PDF | View/Open |
This item is licensed under a Creative Commons License