Yilin Mo
Yilin Mo
Associate Professor, Department of Automation, Tsinghua University
Verified email at tsinghua.edu.cn
Title
Cited by
Cited by
Year
Cyber–physical security of a smart grid infrastructure
Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli
Proceedings of the IEEE 100 (1), 195-209, 2011
9382011
Secure control against replay attacks
Y Mo, B Sinopoli
2009 47th annual Allerton conference on communication, control, and …, 2009
5902009
Integrity data attacks in power market operations
L Xie, Y Mo, B Sinopoli
IEEE Transactions on Smart Grid 2 (4), 659-666, 2011
3662011
Detecting integrity attacks on SCADA systems
Y Mo, R Chabukswar, B Sinopoli
IEEE Transactions on Control Systems Technology 22 (4), 1396-1407, 2013
3572013
False data injection attacks in electricity markets
L Xie, Y Mo, B Sinopoli
2010 First IEEE International Conference on Smart Grid Communications, 226-231, 2010
3402010
False data injection attacks against state estimation in wireless sensor networks
Y Mo, E Garone, A Casavola, B Sinopoli
49th IEEE Conference on Decision and Control (CDC), 5967-5972, 2010
3352010
False data injection attacks in control systems
Y Mo, B Sinopoli
Preprints of the 1st workshop on Secure Control Systems, 1-6, 2010
2952010
Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs
Y Mo, S Weerakkody, B Sinopoli
IEEE Control Systems Magazine 35 (1), 93-109, 2015
2682015
Privacy preserving average consensus
Y Mo, RM Murray
IEEE Transactions on Automatic Control 62 (2), 753-765, 2016
1882016
Stochastic event-triggered sensor schedule for remote state estimation
D Han, Y Mo, J Wu, S Weerakkody, B Sinopoli, L Shi
IEEE Transactions on Automatic Control 60 (10), 2661-2675, 2015
1792015
On the performance degradation of cyber-physical systems under stealthy integrity attacks
Y Mo, B Sinopoli
IEEE Transactions on Automatic Control 61 (9), 2618-2624, 2015
1742015
Sensor selection strategies for state estimation in energy constrained wireless sensor networks
Y Mo, R Ambrosino, B Sinopoli
Automatica 47 (7), 1330-1338, 2011
1642011
Secure estimation in the presence of integrity attacks
Y Mo, B Sinopoli
IEEE Transactions on Automatic Control 60 (4), 1145-1151, 2014
1282014
Kalman filtering with intermittent observations: Tail distribution and critical value
Y Mo, B Sinopoli
IEEE Transactions on Automatic Control 57 (3), 677-689, 2011
1242011
A characterization of the critical value for Kalman filtering with intermittent observations
Y Mo, B Sinopoli
2008 47th IEEE Conference on Decision and Control, 2692-2697, 2008
1032008
Integrity attacks on cyber-physical systems
Y Mo, B Sinopoli
Proceedings of the 1st international conference on High Confidence Networked …, 2012
912012
Stochastic sensor scheduling for energy constrained estimation in multi-hop wireless sensor networks
Y Mo, E Garone, A Casavola, B Sinopoli
IEEE Transactions on Automatic Control 56 (10), 2489-2495, 2011
752011
Detecting integrity attacks on control systems using robust physical watermarking
S Weerakkody, Y Mo, B Sinopoli
53rd IEEE Conference on Decision and Control, 3757-3764, 2014
722014
Detection in adversarial environments
KG Vamvoudakis, JP Hespanha, B Sinopoli, Y Mo
IEEE Transactions on Automatic Control 59 (12), 3209-3223, 2014
672014
Multi-sensor scheduling for state estimation with event-based, stochastic triggers
S Weerakkody, Y Mo, B Sinopoli, D Han, L Shi
IEEE Transactions on Automatic Control 61 (9), 2695-2701, 2015
592015
The system can't perform the operation now. Try again later.
Articles 1–20