Issue
Security and Safety
Volume 4, 2025
Security and Safety in Artificial Intelligence
Article Number 2025002
Number of page(s) 16
Section Industrial Control
DOI https://doi.org/10.1051/sands/2025002
Published online 24 July 2025
  1. Pan CW, Chen Y and Chen QC et al. Distributed fuzzy resilient control for vehicular platooning system with multiple nodes attacks in prescribed performance. IEEE Trans Veh Technol 2024; 73: 6129–42 [Google Scholar]
  2. Liu J, Yang X and Zhang H et al. Predictive control for unknown dynamics with observation loss: a temporal game-theoretic approach. IEEE Trans Indust Electron 2024; 3: 2965–77 [Google Scholar]
  3. Tian B, Zhang H and Wang Z et al. Fixed-time formation-containment of nonlinear systems using intermittent output and connectivity. IEEE Trans Indust Electron 2025; 1: 845–56 [Google Scholar]
  4. Gao S, Zhang H and Wang ZP et al. Optimal injection attack strategy for cyber-physical systems: a dynamic feedback approach. Secur Saf 2022; 1: 2022005 [Google Scholar]
  5. Feng XM and Hu SY. Cyber-physical zero trust architecture for industrial cyber-physical systems. IEEE Trans Indust Cyber-Phys Syst 2023; 1: 394–405 [Google Scholar]
  6. Wei K, Kwak JW and Ma DB. An encrypted on-chip power supply with random parallel power injection and charge recycling against power/EM side-channel attacks. IEEE Trans Power Electron 2023; 38: 500–9 [Google Scholar]
  7. Zhu PP, JST and Bu XH et al. Model-free adaptive control for a class of MIMO nonlinear cyberphysical systems under false data injection attacks. IEEE Trans Control Network Syst 2023; 10: 467–78 [Google Scholar]
  8. Yang TC, Murguia C and Lv C. Risk assessment for connected vehicles under stealthy attacks on vehicle-to-vehicle networks. IEEE Trans Intell Transp Syst 2023; 24: 13627–38 [Google Scholar]
  9. Zhang H, Liu J and Wang ZP et al. Adaptive switched control for connected vehicle platoon with unknown input delays. IEEE Trans Cybern 2023; 53: 1511–21 [Google Scholar]
  10. Liu Y, Xu LW and Cai GS et al. Distributed robust platooning control for heterogeneous vehicle group under parametric uncertainty and hybrid attacks. IEEE Trans Veh Technol 2023; 72: 5677–89 [Google Scholar]
  11. Ahmadi A, Nabipour M and Taheri S, Mohammadi-ivatloo B and vahidinasab V. A new false data injection attack detection model for cyberattack resilient energy forecasting. IEEE Trans Indust Inf 2023; 19: 371–81 [Google Scholar]
  12. Luo X, He J and Wang X et al. Resilient defense of false data injection attacks in smart grids via virtual hidden networks. IEEE Internet Things J 2023; 10: 6474–90 [Google Scholar]
  13. Brumback B and Srinath M. A Chi-square test for fault-detection in Kalman filters. IEEE Trans Autom Control 1987; 32: 552–4 [Google Scholar]
  14. Guo L, Rivero D and Pazos A. Epileptic seizure detection using multi-wavelet transform based approximate entropy and artificial neural networks. J Neuroence Methods 2010; 193: 156–63 [Google Scholar]
  15. Biroon RA, Biron ZA and Pisu P. False data injection attack in a platoon of CACC: real-time detection and isolation with a PDE approach. IEEE Trans Intell Transp Syst 2022; 23: 8692–703 [Google Scholar]
  16. Guibene K, Messai N and Ayaida M et al. A pattern mining-based false data injection attack detector for industrial cyber-physical systems. IEEE Trans Indust Inf 2024; 20: 2969–78 [Google Scholar]
  17. Giraldo J, Hariri ME and Parvania M. Decentralized moving target defense for microgrid protection against false-data injection attacks. IEEE Trans Smart Grid 2022; 13: 3700–10 [Google Scholar]
  18. Xu W, Jaimoukha IM and Teng F. Robust moving target defence against false data injection attacks in power grids. IEEE Trans Inf Forensics Secur 2023; 18: 29–40 [Google Scholar]
  19. Lv M, Yu W and Lv Y et al. An integral sliding mode observer for CPS cyber security attack detection. Chaos: Interdiscip J Nonlinear Sci 2019; 29: 043120 [Google Scholar]
  20. Biron ZA, Dey S and Pisu P. Real-time detection and estimation of denial of service attack in connected vehicle systems. IEEE Trans Intell Transp Syst 2018; 19: 3893–902 [Google Scholar]
  21. Qi X, Zhu L and Li X et al. Observer-based event-triggered sliding mode security control for nonlinear cyber-physical systems under DoS attacks. IEEE Trans Autom Sci Eng 2024; 21: 7480–93 [Google Scholar]
  22. Chawla A, Singh A and Agrawal P et al. Denial-of-service attacks pre-emptive and detection framework for synchrophasor based wide area protection applications. IEEE Syst J 2022; 16: 1570–81 [Google Scholar]
  23. Zheng Y, Li SE and Wang J et al. Stability and scalability of homogeneous vehicular platoon: Study on the influence of information flow topologies. IEEE Trans Intell Transp Syst 2015; 17: 14–26 [Google Scholar]
  24. Wu G, Sun J and Chen J. Optimal data injection attacks in cyber-physical systems. IEEE Trans Cybern 2018; 48: 3302–12 [CrossRef] [PubMed] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.