Heng ZHANG
Heng ZHANG
Associate Professor, Jiangsu Ocean University, China
Verified email at westernsydney.edu.au - Homepage
Title
Cited by
Cited by
Year
Optimal DoS attack scheduling in wireless networked control system
H Zhang, P Cheng, L Shi, J Chen
IEEE Transactions on Control Systems Technology 24 (3), 843 - 852, 2016
3392016
Optimal Denial-of-Service Attack Scheduling with Energy Constraint
Heng Zhang,Peng Cheng, Ling Shi,Jiming Chen
IEEE Transactions on Automatic Control 60 (11), 3023-3028, 2015
3082015
Detecting faulty nodes with data errors for wireless sensor networks
S Guo, H Zhang, Z Zhong, J Chen, Q Cao, T He
ACM Transactions on Sensor Networks (TOSN) 10 (3), 1-27, 2014
1862014
DoS Attack Energy Management Against Remote State Estimation
Heng Zhang, Yifei Qi, Junfeng Wu, Lingkun Fu, Lidong He
IEEE Transactions on Control of Network Systems 5 (1), 383-394, 2018
94*2018
Privacy and Performance Trade-off in Cyber-Physical Systems
Heng Zhang, Yuanchao Shu, Peng Cheng, Jiming Chen
IEEE Network 30 (2), 62-66, 2016
792016
Distributed load sharing under false data injection attack in inverter-based microgrid
H Zhang, W Meng, J Qi, X Wang, WX Zheng
IEEE Transactions on Industrial Electronics, 2018
782018
Testing and Defending Methods Against DOS Attack in State Estimation
H Zhang, Y Qi, H Zhou, J Zhang, J Sun
Asian Journal of Control 19 (4), 1295–1305, 2017
692017
Analysis of event-driven warning message propagation in Vehicular Ad Hoc Networks
H Zhou, S Xu, D Ren, C Huang, H Zhang
Ad Hoc Networks 55, 87-96, 2017
682017
Denial-of-Service Power Dispatch against Linear Quadratic Control via a Fading Channel
H Zhang, WX Zheng
IEEE Transactions on Automatic Control 63 (9), 3032–3039, 2018
672018
Optimal DoS attack policy against remote state estimation
H Zhang, P Cheng, L Shi, J Chen
Decision and Control (CDC), 2013 IEEE 52nd Annual Conference on, 5444-5449, 2013
542013
A novel data fusion algorithm to combat false data injection attacks in networked radar systems
C Yang, L Feng, H Zhang, S He, Z Shi
IEEE Transactions on Signal and Information Processing over Networks 4 (1 …, 2018
392018
Optimal Denial-of-Service attack scheduling against linear quadratic gaussian control
H Zhang, P Cheng, L Shi, J Chen
American Control Conference (ACC), 2014, 3996-4001, 2014
312014
Achieving bilateral utility maximization and location privacy preservation in database-driven cognitive radio networks
Z Zhang, H Zhang, S He, P Cheng
2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems …, 2015
292015
Online deception attack against remote state estimation
H Zhang, P Cheng, J Wu, L Shi, J Chen
Proceedings of World Congress of the International Federation of Automatic …, 2014
262014
Secured Measurement Fusion Scheme Against Deceptive ECM Attack in Radar Network
Chaoqun Yang, Heng Zhang, Fengzhong Qu, Zhiguo Shi
Security and Communication Networks, 2016
152016
Bilateral Privacy-preserving Utility Maximization Protocol in Database-driven Cognitive Radio Networks
Z Zhang, H Zhang, S He, P Cheng
IEEE Transactions on Dependable and Secure Computing, 2017
122017
Robust Transmission Power Management for Remote State Estimation with Wireless Energy Harvesting
H Zhang, WX Zheng
IEEE Internet of Things Journal 5 (4), 2682–2690, 2018
92018
A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop
L Zhang, H Zhang
Sensors 16 (4), 443, 2016
92016
Performance of Target Tracking in Radar Network System Under Deception Attack
Chaoqun Yang, Heng Zhang, Fengzhong Qu, Zhiguo Shi
Wireless Algorithms, Systems, and Applications, 2015
7*2015
Multiple Attacks Detection in Cyber-Physical Systems Using Random Finite Set Theory
C Yang, Z Shi, H Zhang, J Wu, X Shi
IEEE transactions on cybernetics, 2019
62019
The system can't perform the operation now. Try again later.
Articles 1–20