System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy
Crossref DOI link: https://doi.org/10.1007/s11768-021-00075-7
Published Online: 2022-01-26
Published Print: 2022-02
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Guo, Jin
Wang, Xuebin
Zhang, Yanling
Xue, Wenchao
Zhao, Yanlong
Text and Data Mining valid from 2022-01-26
Version of Record valid from 2022-01-26
Article History
Received: 21 May 2021
Revised: 26 July 2021
Accepted: 30 July 2021
First Online: 26 January 2022