Associate Professor, Jiangsu Ocean University, China
Verified email at westernsydney.edu.au - Homepage
Cited by
Cited by
Optimal DoS attack scheduling in wireless networked control system
H Zhang, P Cheng, L Shi, J Chen
IEEE Transactions on Control Systems Technology 24 (3), 843 - 852, 2016
Optimal Denial-of-Service Attack Scheduling with Energy Constraint
Heng Zhang,Peng Cheng, Ling Shi,Jiming Chen
IEEE Transactions on Automatic Control 60 (11), 3023-3028, 2015
Detecting faulty nodes with data errors for wireless sensor networks
S Guo, H Zhang, Z Zhong, J Chen, Q Cao, T He
ACM Transactions on Sensor Networks (TOSN) 10 (3), 1-27, 2014
DoS Attack Energy Management Against Remote State Estimation
Heng Zhang, Yifei Qi, Junfeng Wu, Lingkun Fu, Lidong He
IEEE Transactions on Control of Network Systems 5 (1), 383-394, 2018
Privacy and Performance Trade-off in Cyber-Physical Systems
Heng Zhang, Yuanchao Shu, Peng Cheng, Jiming Chen
IEEE Network 30 (2), 62-66, 2016
Distributed load sharing under false data injection attack in inverter-based microgrid
H Zhang, W Meng, J Qi, X Wang, WX Zheng
IEEE Transactions on Industrial Electronics, 2018
Testing and Defending Methods Against DOS Attack in State Estimation
H Zhang, Y Qi, H Zhou, J Zhang, J Sun
Asian Journal of Control 19 (4), 1295–1305, 2017
Analysis of event-driven warning message propagation in Vehicular Ad Hoc Networks
H Zhou, S Xu, D Ren, C Huang, H Zhang
Ad Hoc Networks 55, 87-96, 2017
Denial-of-Service Power Dispatch against Linear Quadratic Control via a Fading Channel
H Zhang, WX Zheng
IEEE Transactions on Automatic Control 63 (9), 3032–3039, 2018
Optimal DoS attack policy against remote state estimation
H Zhang, P Cheng, L Shi, J Chen
Decision and Control (CDC), 2013 IEEE 52nd Annual Conference on, 5444-5449, 2013
A novel data fusion algorithm to combat false data injection attacks in networked radar systems
C Yang, L Feng, H Zhang, S He, Z Shi
IEEE Transactions on Signal and Information Processing over Networks 4 (1 …, 2018
Optimal Denial-of-Service attack scheduling against linear quadratic gaussian control
H Zhang, P Cheng, L Shi, J Chen
American Control Conference (ACC), 2014, 3996-4001, 2014
Achieving bilateral utility maximization and location privacy preservation in database-driven cognitive radio networks
Z Zhang, H Zhang, S He, P Cheng
2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems …, 2015
Online deception attack against remote state estimation
H Zhang, P Cheng, J Wu, L Shi, J Chen
Proceedings of World Congress of the International Federation of Automatic …, 2014
Secured Measurement Fusion Scheme Against Deceptive ECM Attack in Radar Network
Chaoqun Yang, Heng Zhang, Fengzhong Qu, Zhiguo Shi
Security and Communication Networks, 2016
Bilateral Privacy-preserving Utility Maximization Protocol in Database-driven Cognitive Radio Networks
Z Zhang, H Zhang, S He, P Cheng
IEEE Transactions on Dependable and Secure Computing, 2017
Robust Transmission Power Management for Remote State Estimation with Wireless Energy Harvesting
H Zhang, WX Zheng
IEEE Internet of Things Journal 5 (4), 2682–2690, 2018
A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop
L Zhang, H Zhang
Sensors 16 (4), 443, 2016
Performance of Target Tracking in Radar Network System Under Deception Attack
Chaoqun Yang, Heng Zhang, Fengzhong Qu, Zhiguo Shi
Wireless Algorithms, Systems, and Applications, 2015
Multiple Attacks Detection in Cyber-Physical Systems Using Random Finite Set Theory
C Yang, Z Shi, H Zhang, J Wu, X Shi
IEEE transactions on cybernetics, 2019
The system can't perform the operation now. Try again later.
Articles 1–20