Xiaoqiang REN
Title
Cited by
Cited by
Year
Infinite horizon optimal transmission power control for remote state estimation over fading channels
X Ren, J Wu, KH Johansson, G Shi, L Shi
IEEE Transactions on Automatic Control 63 (1), 85-100, 2017
512017
Multi-sensor Kalman filtering with intermittent measurements
C Yang, J Zheng, X Ren, W Yang, H Shi, L Shi
IEEE Transactions on Automatic Control 63 (3), 797-804, 2017
392017
Deterministic sensor selection for centralized state estimation under limited communication resource
C Yang, J Wu, X Ren, W Yang, H Shi, L Shi
IEEE transactions on signal processing 63 (9), 2336-2348, 2015
312015
Attack allocation on remote state estimation in multi-systems: Structural results and asymptotic solution
X Ren, J Wu, S Dey, L Shi
Automatica 87, 184-194, 2018
282018
DoS attacks on remote state estimation with asymmetric information
K Ding, X Ren, DE Quevedo, S Dey, L Shi
IEEE Transactions on Control of Network Systems 6 (2), 653-666, 2018
222018
Optimal scheduling of multiple sensors over shared channels with packet transmission constraint
S Wu, X Ren, S Dey, L Shi
Automatica 96, 22-31, 2018
212018
Finite-horizon Gaussianity-preserving event-based sensor scheduling in Kalman filter applications
J Wu, X Ren, D Han, D Shi, L Shi
Automatica 72, 100-107, 2016
172016
Jamming attack in centralized state estimation
C Yang, X Ren, W Yang, H Shi, L Shi
2015 34th Chinese Control Conference (CCC), 6530-6535, 2015
142015
Binary hypothesis testing with byzantine sensors: Fundamental tradeoff between security and efficiency
X Ren, J Yan, Y Mo
IEEE Transactions on Signal Processing 66 (6), 1454-1468, 2018
132018
Whittle index policy for dynamic multichannel allocation in remote state estimation
J Wang, X Ren, Y Mo, L Shi
IEEE Transactions on Automatic Control 65 (2), 591-603, 2019
122019
Learning optimal scheduling policy for remote state estimation under uncertain channel condition
S Wu, X Ren, QS Jia, KH Johansson, L Shi
IEEE Transactions on Control of Network Systems 7 (2), 579-591, 2019
112019
Optimal scheduling of multiple sensors with packet length constraint
S Wu, X Ren, S Dey, L Shi
IFAC-PapersOnLine 50 (1), 14430-14435, 2017
112017
Deception-based sensor scheduling for remote estimation under DoS attacks
K Ding, X Ren, L Shi
IFAC-PapersOnLine 49 (22), 169-174, 2016
102016
Secure state estimation with byzantine sensors: A probabilistic approach
X Ren, Y Mo, J Chen, KH Johansson
IEEE Transactions on Automatic Control 65 (9), 3742-3757, 2020
92020
Secure distributed filtering for unstable dynamics under compromised observations
X He, X Ren, H Sandberg, KH Johansson
2019 IEEE 58th Conference on Decision and Control (CDC), 5344-5349, 2019
92019
Quickest change detection with observation scheduling
X Ren, KH Johansson, L Shi
IEEE Transactions on Automatic Control 62 (6), 2635-2647, 2016
92016
Secure detection: Performance metric and sensor deployment strategy
X Ren, Y Mo
IEEE Transactions on Signal Processing 66 (17), 4450-4460, 2018
72018
Secure and privacy preserving average consensus
Q Liu, X Ren, Y Mo
2017 11th Asian Control Conference (ASCC), 274-279, 2017
72017
Sequential detection in adversarial environment
J Yan, X Ren, Y Mo
2017 IEEE 56th Annual Conference on Decision and Control (CDC), 170-175, 2017
62017
Optimal dos attacks on bayesian quickest change detection
X Ren, Y Mo, L Shi
53rd IEEE Conference on Decision and Control, 3765-3770, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20