2022
DOI: 10.1049/cth2.12359
|View full text |Cite
|
Sign up to set email alerts
|

An outlier‐resistant approach to observer‐based security control for interval type‐2 T‐S fuzzy systems subject to deception attacks

Abstract: This article focuses on the outlier‐resistant observer‐based controller for the interval type‐2 T‐S fuzzy discrete‐time systems with distributed delays under deception attacks. The deception attack takes place between sensor channel and observer channel. A neoteric guidance for safety performance is constructed to explain the randomly happening spoofing offensive on the control structure. The random events of parameter uncertainty and spoofing offensives are controlled via two sets of Bernoulli stochastic vari… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 50 publications
0
4
0
Order By: Relevance
“…Remark 2. In this paper, we do not directly encode and decode the measured output signal 𝑦(k), but construct an auxiliary system (16), ý(k) set to predict the decoding result ȳ(k), which can solve the unrealistic problem of dynamic regression from the decoder to the encoder, where ỳ(k) ≡ ȳ(k). The decoding scheme is essentially an estimate of (16).…”
Section: Cdsmentioning
confidence: 99%
See 1 more Smart Citation
“…Remark 2. In this paper, we do not directly encode and decode the measured output signal 𝑦(k), but construct an auxiliary system (16), ý(k) set to predict the decoding result ȳ(k), which can solve the unrealistic problem of dynamic regression from the decoder to the encoder, where ỳ(k) ≡ ȳ(k). The decoding scheme is essentially an estimate of (16).…”
Section: Cdsmentioning
confidence: 99%
“…IT2 models are also often combined with protocols for channel transmission, for example, in the literature [15] combined IT2 T-S hybrid time lag fuzzy systems with multi-description coding and decoding and presents the stability case of the system in the presence of packet loss. The literature [16] discussed the security control problem when the IT2 T-S distributed time lag fuzzy system faced a network attack and gives an anti-network attack scheme.…”
Section: Introductionmentioning
confidence: 99%
“…By combining the system, the event trigger (13), the quantization (17), the hybrid attack (21), and the controller (23), we have the following results, namely the vehicle dynamic output-feedback system.…”
Section: System Formulationmentioning
confidence: 99%
“…Since T-S is an approximate model, some smooth nonlinear functions can be approximated with certain precision under convex sets. Under normal circumstances, Type-1 T-S cannot handle highly uncertain systems, whereas Type-2 T-S can.Compared with the dynamic system dealing with uncertainty, fuzzy Type-2 has more advantages [16,17,18]. It is a good choice to control vehicle lateral Angle in this paper [19].…”
Section: Introductionmentioning
confidence: 99%