[1] |
FARIVAR F, SAYAD HAGHIGHI M, BARCHINEZHAD S, et al. Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems Through Intelligent Adaptive Control[C]// Proceedings of the 2019 IEEE International Conference on Industrial Technology.Piscataway:IEEE, 2019: 1143-1148.
|
[2] |
常玲, 赵蓓, 薛姗, 等. 车联网信息安全威胁分析及防护思路[J]. 移动通信, 2019,43(11):47-50.
|
|
CHANG Ling, ZHAO Bei, XUE Shan, et al. Internetof Vehicles Information Security Threat Analysis and Protection Ideas[J]. Mobile Communication, 2019,43(11):47-50.
|
[3] |
王晨希, 孟祥峰, 王浩, 等. 医用机器人网络安全问题研究与探讨[J]. 中国医疗设备, 2020,35(9):13-17.
|
|
WANG Chenxi, MENG Xiangfeng, WANG Hao, et al. Research and Discussion on Network Securityof Medical Robot[J]. China Medical Equipment, 2020,35(9):13-17.
|
[4] |
WANG Z, MA P, ZOU X, et al. Security of Medical Cyber-physical Systems:an Empirical Study on Imaging Devices[C]// Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).Piscataway:IEEE, 2020: 997-1002.
|
[5] |
邹洪. 智能电网信息安全防御体系架构与关键技术研究[J]. 网络安全技术与应用, 2020,1:113-115.
|
|
ZOU Hong. Smart Grid Information Security Defense Architectureand Key Technology Research[J]. Network Security Technology and Application, 2020,1:113-115.
|
[6] |
刘鑫蕊, 吴泽群. 面向智能电网的空间隐蔽型恶性数据注入攻击在线防御研究[J]. 中国电机工程学报, 2020,40(8):2546-2559.
|
|
LIU Xinrui, WU Zequn. Researchon Online Defense of Space Hidden Malignant Data Injection Attack for Smart Grid[J]. Chinese Journal of Electrical Engineering, 2020,40(8):2546-2559.
|
[7] |
ZHANG X M, HAN Q L, GE X H, et al. Networked Control Systems:a Survey of Trends and Techniques[J]. IEEE/CAA Journal of Automatica Sinica, 2020,7(01):1-17.
|
[8] |
MALHI A K, BATRA S, PANNU H S. Security of Vehicular Ad-Hoc Networks:a Comprehensive Survey[J]. Computers and Security, 2020,89:101664.
doi: 10.1016/j.cose.2019.101664
|
[9] |
杨荣悦, 张鹏洲, 宋卿. 基于5G技术的智能车联网研究与展望[J]. 电信科学, 2020,36(5):106-114.
|
|
YANG Rongyue, ZHANG Pengzhou, SONG Qing. Research and Prospect of Intelligent Vehicle Networking Basedon 5G Technology[J]. Telecom Science, 2020,36(5):106-114.
|
[10] |
武晓婷. 在“被黑”中汽车产业驶入新革命时代黑客PK车企 “战火”再升级[J]. 信息安全与通信保密, 2015,10:66-67.
|
|
WU Xiaoting. In The Process of Being Hacked,the Automobile Industry Has Entered a New Revolutionary Era.Hackers PK The "Fire of War" of Automobile Enterprises to Upgrade Again[J]. Information Security and Communication Confidentiality, 2015,10:66-67.
|
[11] |
舒文琼. 国内首家车载信息安全产业联盟成立[J]. 通信世界, 2016,25:40.
|
|
SHU Wenqiong. The First in Vehicle Information Security Industry Alliance in China Was Established[J]. Communication World, 2016,25:40.
|
[12] |
KANG M J, KANG J W. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security[J]. Plos One, 2016,11(6):0155781.
|
[13] |
SA A O D. Covert Attacks in Cyber-Physical Control Systems[J]. IEEE Transactions on Industrial Informatics, 2017,13(4):1641-1651.
doi: 10.1109/TII.2017.2676005
|
[14] |
SHAKOURI P, ORDYS A W, LAILA D S, et al. Adaptive Cruise Control System:Comparing Gain-Scheduling PI and LQ Controllers[J]. IFAC Proceedings Volumes, 2011,44(1):12964-12969.
doi: 10.3182/20110828-6-IT-1002.02250
|
[15] |
BENGIO Y, SIMARD P, FRASCONI P. Learning Long-Term Dependencies with Gradient Descent Is Difficult[J]. IEEE Transactions on Neural Networks, 1994,5(2):157-166.
doi: 10.1109/TNN.72
|
[16] |
ERHAN D, COURVILLE A, BENGIO Y, et al. Why Does Unsupervised Pre-Training Help Deep Learning?[C]// Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics.Piscataway:IEEE, 2010: 201-208.
|
[17] |
BENGIO Y, LAMBLIN P, POPOVICI D, et al. Greedy Layer-Wise Training of Deep Networks[J]. Advances in Neural Information Processing Systems 19, 2007,19:153-160.
|
[18] |
CHRISTOPHER E E, DAMON M. OCTANE:Open Car Testbed and Network Experiments Bringing Cyber-Physical Security Research to Researchers and Students[C]// Proceedings of the 2012 6th Workshop on Cyber Security Experimentation and Test({CSET}13).Washington:USENIX Association, 2013: 226-235.
|
[19] |
TZOVLA V, MEHTA A. A Simplified and Integrated Approach to Model Predictive Control Implementation[J]. Advances in Instrumentation and Control, 2000,53:84-91.
|
[20] |
ELSAYED A, HAFEZ A, OUDA A N, et al. Design of Longitudinal Motion Controller of a Small Unmanned Aerial Vehicle[J]. International Journal of Intelligent Systems and Applications, 2015,7(10):37-47.
|
[21] |
PAGE P R, ABU-MAHFOUZ A M, YOYO S. Real-Time Adjustment of Pressure to Demand in Water Distribution Systems:Parameter-Less P-Controller Algorithm[J]. Procedia Engineering, 2016,154:391-397.
doi: 10.1016/j.proeng.2016.07.498
|