Follow
Xiaoqiang REN
Title
Cited by
Cited by
Year
Infinite horizon optimal transmission power control for remote state estimation over fading channels
X Ren, J Wu, KH Johansson, G Shi, L Shi
IEEE Transactions on Automatic Control 63 (1), 85-100, 2017
792017
Multi-sensor Kalman filtering with intermittent measurements
C Yang, J Zheng, X Ren, W Yang, H Shi, L Shi
IEEE Transactions on Automatic Control 63 (3), 797-804, 2017
752017
Attack allocation on remote state estimation in multi-systems: Structural results and asymptotic solution
X Ren, J Wu, S Dey, L Shi
Automatica 87, 184-194, 2018
612018
DoS attacks on remote state estimation with asymmetric information
K Ding, X Ren, DE Quevedo, S Dey, L Shi
IEEE Transactions on Control of Network Systems 6 (2), 653-666, 2018
552018
Optimal scheduling of multiple sensors over shared channels with packet transmission constraint
S Wu, X Ren, S Dey, L Shi
Automatica 96, 22-31, 2018
492018
Deterministic sensor selection for centralized state estimation under limited communication resource
C Yang, J Wu, X Ren, W Yang, H Shi, L Shi
IEEE transactions on signal processing 63 (9), 2336-2348, 2015
452015
How to secure distributed filters under sensor attacks
X He, X Ren, H Sandberg, KH Johansson
IEEE Transactions on Automatic Control 67 (6), 2843-2856, 2021
392021
Remote state estimation in the presence of an active eavesdropper
K Ding, X Ren, AS Leong, DE Quevedo, L Shi
IEEE Transactions on Automatic Control 66 (1), 229-244, 2020
382020
Learning optimal scheduling policy for remote state estimation under uncertain channel condition
S Wu, X Ren, QS Jia, KH Johansson, L Shi
IEEE Transactions on Control of Network Systems 7 (2), 579-591, 2019
362019
Whittle index policy for dynamic multichannel allocation in remote state estimation
J Wang, X Ren, Y Mo, L Shi
IEEE Transactions on Automatic Control 65 (2), 591-603, 2019
362019
Finite-horizon Gaussianity-preserving event-based sensor scheduling in Kalman filter applications
J Wu, X Ren, D Han, D Shi, L Shi
Automatica 72, 100-107, 2016
332016
Secure state estimation with byzantine sensors: A probabilistic approach
X Ren, Y Mo, J Chen, KH Johansson
IEEE Transactions on Automatic Control 65 (9), 3742-3757, 2020
272020
Defensive deception against reactive jamming attacks in remote state estimation
K Ding, X Ren, DE Quevedo, S Dey, L Shi
Automatica 113, 108680, 2020
272020
Binary hypothesis testing with byzantine sensors: Fundamental tradeoff between security and efficiency
X Ren, J Yan, Y Mo
IEEE Transactions on Signal Processing 66 (6), 1454-1468, 2018
232018
Secure distributed filtering for unstable dynamics under compromised observations
X He, X Ren, H Sandberg, KH Johansson
2019 IEEE 58th Conference on Decision and Control (CDC), 5344-5349, 2019
212019
Deception-based sensor scheduling for remote estimation under DoS attacks
K Ding, X Ren, L Shi
IFAC-PapersOnLine 49 (22), 169-174, 2016
162016
Jamming attack in centralized state estimation
C Yang, X Ren, W Yang, H Shi, L Shi
2015 34th Chinese Control Conference (CCC), 6530-6535, 2015
162015
Optimal scheduling of multiple sensors with packet length constraint
S Wu, X Ren, S Dey, L Shi
IFAC-PapersOnLine 50 (1), 14430-14435, 2017
152017
Quickest change detection with observation scheduling
X Ren, KH Johansson, L Shi
IEEE Transactions on Automatic Control 62 (6), 2635-2647, 2016
142016
Secure detection: Performance metric and sensor deployment strategy
X Ren, Y Mo
IEEE Transactions on Signal Processing 66 (17), 4450-4460, 2018
132018
The system can't perform the operation now. Try again later.
Articles 1–20