May 25, 2016May 25, 2016Julia Solomon-StraussPublicationsFei Miao, Quanyan Zhu, Miroslav Pajic, and George J. Pappas This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks.