Abstract: This study addresses a tampered-data recovery problem for linear discrete-time systems with completely unknown system dynamics under stealthy attacks. The basic idea is to identify the ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果一些您可能无法访问的结果已被隐去。
显示无法访问的结果