Heng ZHANG
Heng ZHANG
Associate Professor, Jiangsu Ocean University, China
Verified email at westernsydney.edu.au - Homepage
TitleCited byYear
Optimal DoS attack scheduling in wireless networked control system
H Zhang, P Cheng, L Shi, J Chen
IEEE Transactions on Control Systems Technology 24 (3), 843 - 852, 2016
2782016
Optimal Denial-of-Service Attack Scheduling with Energy Constraint
Heng Zhang,Peng Cheng, Ling Shi,Jiming Chen
IEEE Transactions on Automatic Control 60 (11), 3023-3028, 2015
2512015
Detecting faulty nodes with data errors for wireless sensor networks
S Guo, H Zhang, Z Zhong, J Chen, Q Cao, T He
ACM Transactions on Sensor Networks (TOSN) 10 (3), 1-27, 2014
1712014
Privacy and Performance Trade-off in Cyber-Physical Systems
Heng Zhang, Yuanchao Shu, Peng Cheng, Jiming Chen
IEEE Network 30 (2), 62-66, 2016
662016
DoS Attack Energy Management Against Remote State Estimation
Heng Zhang, Yifei Qi, Junfeng Wu, Lingkun Fu, Lidong He
IEEE Transactions on Control of Network Systems 5 (1), 383-394, 2018
65*2018
Analysis of event-driven warning message propagation in Vehicular Ad Hoc Networks
H Zhou, S Xu, D Ren, C Huang, H Zhang
Ad Hoc Networks 55, 87-96, 2017
632017
Testing and Defending Methods Against DOS Attack in State Estimation
H Zhang, Y Qi, H Zhou, J Zhang, J Sun
Asian Journal of Control 19 (4), 1295–1305, 2017
612017
Optimal DoS attack policy against remote state estimation
H Zhang, P Cheng, L Shi, J Chen
Decision and Control (CDC), 2013 IEEE 52nd Annual Conference on, 5444-5449, 2013
502013
Denial-of-Service Power Dispatch against Linear Quadratic Control via a Fading Channel
H Zhang, WX Zheng
IEEE Transactions on Automatic Control 63 (9), 3032–3039, 2018
482018
Distributed load sharing under false data injection attack in inverter-based microgrid
H Zhang, W Meng, J Qi, X Wang, WX Zheng
IEEE Transactions on Industrial Electronics, 2018
462018
Optimal Denial-of-Service attack scheduling against linear quadratic gaussian control
H Zhang, P Cheng, L Shi, J Chen
American Control Conference (ACC), 2014, 3996-4001, 2014
282014
A novel data fusion algorithm to combat false data injection attacks in networked radar systems
C Yang, L Feng, H Zhang, S He, Z Shi
IEEE Transactions on Signal and Information Processing over Networks 4 (1 …, 2018
252018
Achieving bilateral utility maximization and location privacy preservation in database-driven cognitive radio networks
Z Zhang, H Zhang, S He, P Cheng
2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems …, 2015
252015
Online deception attack against remote state estimation
H Zhang, P Cheng, J Wu, L Shi, J Chen
Proceedings of World Congress of the International Federation of Automatic …, 2014
232014
Secured Measurement Fusion Scheme Against Deceptive ECM Attack in Radar Network
Chaoqun Yang, Heng Zhang, Fengzhong Qu, Zhiguo Shi
Security and Communication Networks, 2016
142016
Bilateral Privacy-preserving Utility Maximization Protocol in Database-driven Cognitive Radio Networks
Z Zhang, H Zhang, S He, P Cheng
IEEE Transactions on Dependable and Secure Computing, 2017
102017
A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop
L Zhang, H Zhang
Sensors 16 (4), 443, 2016
92016
Performance of Target Tracking in Radar Network System Under Deception Attack
Chaoqun Yang, Heng Zhang, Fengzhong Qu, Zhiguo Shi
Wireless Algorithms, Systems, and Applications, 2015
7*2015
Robust Transmission Power Management for Remote State Estimation with Wireless Energy Harvesting
H Zhang, WX Zheng
IEEE Internet of Things Journal 5 (4), 2682–2690, 2018
52018
Cyber Security for Industrial Control Systems: From Viewpoint Of Close-loop
Peng Cheng, Heng Zhang, Jiming Chen
CRC Press, 2016
52016
The system can't perform the operation now. Try again later.
Articles 1–20