Distributed filtering under false data injection attacks W Yang, Y Zhang, G Chen, C Yang, L Shi Automatica 102, 34-44, 2019 | 167 | 2019 |
Stochastic link activation for distributed filtering under sensor power constraint W Yang, C Yang, H Shi, L Shi, G Chen Automatica 75, 109-118, 2017 | 108 | 2017 |
Multi-Sensor Kalman Filtering with Intermittent Measurements C Yang, J Zheng, X Ren, W Yang, H Shi, L Shi IEEE Transactions on Automatic Control 63 (3), 797-804, 2018 | 81 | 2018 |
DoS attack in centralised sensor network against state estimation C Yang, W Yang, H Shi IET Control Theory & Applications 12 (9), 1244-1253, 2018 | 73 | 2018 |
Deterministic Sensor Data Scheduling Under Limited Communication Resource C Yang, L Shi IEEE Transactions on Signal Processing 59 (10), 5050-5056, 2011 | 72 | 2011 |
Event-based distributed state estimation under deception attack W Yang, L Lei, C Yang Neurocomputing 270, 145-151, 2017 | 65 | 2017 |
Deterministic Sensor Selection for Centralized State Estimation under Limited Communication Resource C Yang, J Wu, X Ren, W Yang, H Shi, L Shi IEEE Transactions on Signal Processing 63 (9), 2336 - 2348, 2015 | 51 | 2015 |
False data injection attack on consensus‐based distributed estimation L Lei, W Yang, C Yang, HB Shi International Journal of Robust and Nonlinear Control 27 (9), 1419-1432, 2017 | 40 | 2017 |
Schedule Communication for Decentralized State Estimation C Yang, J Wu, W Zhang, L Shi IEEE Transactions on Signal Processing 61 (10), 2525-2535, 2013 | 38 | 2013 |
Online power scheduling for distributed filtering over an energy-limited sensor network W Yang, Y Zhang, C Yang, Z Zuo, X Wang IEEE Transactions on Industrial Electronics 65 (5), 4216-4226, 2017 | 34 | 2017 |
Nodes selection strategy in cooperative tracking problem W Yang, Z Wang, Z Zuo, C Yang, H Shi Automatica 74, 118-125, 2016 | 31 | 2016 |
Jamming attack in centralized state estimation C Yang, X Ren, W Yang, H Shi, L Shi 2015 34th Chinese Control Conference (CCC), 6530-6535, 2015 | 18 | 2015 |
Optimal linear attack on cyber physical systems with multiplicative noise F Li, C Yang, Y Tang IEEE Access 6, 33318-33328, 2018 | 8 | 2018 |
Sensor scheduling for lifetime maximization in centralized state estimation C Yang, J Lu, W Yang, H Shi Neurocomputing 270, 43-53, 2017 | 7 | 2017 |
Event-based distributed state estimation over a WSN with false data injection attack L Lei, W Yang, C Yang IFAC-PapersOnLine 49 (22), 286-290, 2016 | 7 | 2016 |
False data injection attack on distributed state estimation over a wireless sensor network L Lei, W Yang, C Yang, H Shi, H Yan 2016 35th Chinese Control Conference (CCC), 8108-8113, 2016 | 5 | 2016 |
A study of estimation and communication tradeoff using an event-based approach C Yang, L Shi, WJ Ma 2013 Asilomar Conference on Signals, Systems and Computers, 32-36, 2013 | 4 | 2013 |
Privacy preserving consensus under interception attacks H Zhou, W Yang, C Yang 2017 36th Chinese Control Conference (CCC), 8485-8490, 2017 | 3 | 2017 |
Majorization theory in sensor scheduling C Yang, W Yang, H Shi 2015 54th IEEE Conference on Decision and Control (CDC), 3063-3068, 2015 | 3 | 2015 |
Communication-saving design by stochastic event triggers C Yang, W Yang, H Shi Journal of the Franklin Institute 356 (17), 10532-10546, 2019 | 2 | 2019 |