Loading publications…
The last 5 uploaded publications
Distributed filtering under false data injection attacks
Wen Yang, Yu Zhang, Guanrong Chen, Chao Yang, Ling Shi (2019). Distributed filtering under false data injection attacks. Automatica, 102, pp. 34-44, DOI: 10.1016/j.automatica.2018.12.027.
Article145 days agoStochastic sensor activation for distributed state estimation over a sensor network
Wen Yang, Guanrong Chen, Xiaofan Wang, Ling Shi (2014). Stochastic sensor activation for distributed state estimation over a sensor network. Automatica, 50(8), pp. 2070-2076, DOI: 10.1016/j.automatica.2014.05.025.
Article145 days agoStochastic link activation for distributed filtering under sensor power constraint
Wen Yang, Chao Yang, Hongbo Shi, Ling Shi, Guanrong Chen (2016). Stochastic link activation for distributed filtering under sensor power constraint. Automatica, 75, pp. 109-118, DOI: 10.1016/j.automatica.2016.09.009.
Article145 days agoSecurity Analysis of a Distributed Networked System Under Eavesdropping Attacks
Wen Yang, Ziqian Zheng, Guanrong Chen, Yang Tang, Xiaofan Wang (2019). Security Analysis of a Distributed Networked System Under Eavesdropping Attacks. IEEE Transactions on Circuits & Systems II Express Briefs, 67(7), pp. 1254-1258, DOI: 10.1109/tcsii.2019.2928558.
Article145 days agoSecurity analysis and defense of multi-encoding mechanism against eavesdropping attacks
Jie Wang, Wen Yang, Guanrong Chen, Jiayu Zhou, Wenjie Ding (2025). Security analysis and defense of multi-encoding mechanism against eavesdropping attacks. IEEE Transactions on Network Science and Engineering, pp. 1-12, DOI: 10.1109/tnse.2025.3565302.
Article145 days ago