Folgen
Yilin Mo
Yilin Mo
Associate Professor, Department of Automation, Tsinghua University
Bestätigte E-Mail-Adresse bei tsinghua.edu.cn
Titel
Zitiert von
Zitiert von
Jahr
Cyber–physical security of a smart grid infrastructure
Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli
Proceedings of the IEEE 100 (1), 195-209, 2011
13722011
Secure control against replay attacks
Y Mo, B Sinopoli
2009 47th annual Allerton conference on communication, control, and …, 2009
10772009
Detecting integrity attacks on SCADA systems
Y Mo, R Chabukswar, B Sinopoli
IEEE Transactions on Control Systems Technology 22 (4), 1396-1407, 2013
6392013
Integrity data attacks in power market operations
L Xie, Y Mo, B Sinopoli
IEEE Transactions on Smart Grid 2 (4), 659-666, 2011
5472011
Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs
Y Mo, S Weerakkody, B Sinopoli
IEEE Control Systems Magazine 35 (1), 93-109, 2015
5352015
False data injection attacks in control systems
Y Mo, B Sinopoli
Preprints of the 1st workshop on Secure Control Systems 1, 2010
5332010
False data injection attacks against state estimation in wireless sensor networks
Y Mo, E Garone, A Casavola, B Sinopoli
49th IEEE Conference on Decision and Control (CDC), 5967-5972, 2010
5062010
False data injection attacks in electricity markets
L Xie, Y Mo, B Sinopoli
2010 First IEEE International Conference on Smart Grid Communications, 226-231, 2010
4942010
Privacy preserving average consensus
Y Mo, RM Murray
IEEE Transactions on Automatic Control 62 (2), 753-765, 2016
4822016
On the performance degradation of cyber-physical systems under stealthy integrity attacks
Y Mo, B Sinopoli
IEEE Transactions on Automatic Control 61 (9), 2618-2624, 2015
4152015
Stochastic event-triggered sensor schedule for remote state estimation
D Han, Y Mo, J Wu, S Weerakkody, B Sinopoli, L Shi
IEEE Transactions on Automatic Control 60 (10), 2661-2675, 2015
3542015
Sensor selection strategies for state estimation in energy constrained wireless sensor networks
Y Mo, R Ambrosino, B Sinopoli
Automatica 47 (7), 1330-1338, 2011
2322011
Secure estimation in the presence of integrity attacks
Y Mo, B Sinopoli
IEEE Transactions on Automatic Control 60 (4), 1145-1151, 2014
1902014
Kalman filtering with intermittent observations: Tail distribution and critical value
Y Mo, B Sinopoli
IEEE Transactions on Automatic Control 57 (3), 677-689, 2011
1792011
Integrity attacks on cyber-physical systems
Y Mo, B Sinopoli
Proceedings of the 1st international conference on High Confidence Networked …, 2012
1482012
The vulnerability of cyber-physical system under stealthy attacks
T Sui, Y Mo, D Marelli, X Sun, M Fu
IEEE Transactions on Automatic Control 66 (2), 637-650, 2020
1252020
Detecting integrity attacks on control systems using robust physical watermarking
S Weerakkody, Y Mo, B Sinopoli
53rd IEEE Conference on Decision and Control, 3757-3764, 2014
1212014
Detection in adversarial environments
KG Vamvoudakis, JP Hespanha, B Sinopoli, Y Mo
IEEE Transactions on Automatic Control 59 (12), 3209-3223, 2014
1202014
A characterization of the critical value for Kalman filtering with intermittent observations
Y Mo, B Sinopoli
2008 47th IEEE Conference on Decision and Control, 2692-2697, 2008
1192008
Multi-sensor scheduling for state estimation with event-based, stochastic triggers
S Weerakkody, Y Mo, B Sinopoli, D Han, L Shi
IEEE Transactions on Automatic Control 61 (9), 2695-2701, 2015
1172015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20