Abstract: This article studies the problem of identifying both stealthy and nonstealthy integrity attacks for unknown linear discrete-time systems. By establishing a necessary and sufficient condition ...
Abstract: Due to the complex correlation within data collection, it is a challenging task to detect leakage in the water supply network. The Graph Convolutional Network (GCN) has recently gained ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results