Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach

Z. Guo, D. Shi, D.E. Quevedo, L. Shi, Trans. Signal Processing 67 (2019) 194–207.

Download
No fulltext has been uploaded.
Journal Article | English
Author
Guo, Z.; Shi, D.; Quevedo, D. E.; Shi, L.
Publishing Year
Journal Title
Trans. Signal Processing
Volume
67
Issue
1
Page
194–207
LibreCat-ID

Cite this

Guo Z, Shi D, Quevedo DE, Shi L. Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach. Trans Signal Processing. 2019;67(1):194–207.
Guo, Z., Shi, D., Quevedo, D. E., & Shi, L. (2019). Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach. Trans. Signal Processing, 67(1), 194–207.
@article{Guo_Shi_Quevedo_Shi_2019, title={Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach}, volume={67}, number={1}, journal={Trans. Signal Processing}, author={Guo, Z. and Shi, D. and Quevedo, D. E. and Shi, L.}, year={2019}, pages={194–207} }
Guo, Z., D. Shi, D. E. Quevedo, and L. Shi. “Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach.” Trans. Signal Processing 67, no. 1 (2019): 194–207.
Z. Guo, D. Shi, D. E. Quevedo, and L. Shi, “Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach,” Trans. Signal Processing, vol. 67, no. 1, pp. 194–207, 2019.
Guo, Z., et al. “Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach.” Trans. Signal Processing, vol. 67, no. 1, 2019, pp. 194–207.

Export

Marked Publications

Open Data LibreCat

Search this title in

Google Scholar