2022
DOI: 10.1016/j.amc.2021.126874
|View full text |Cite
|
Sign up to set email alerts
|

Attack resilient control for vehicle platoon system with full states constraint under actuator faulty scenario

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(18 citation statements)
references
References 32 publications
0
18
0
Order By: Relevance
“…Remark 2. Differing from the FDI attacks estimation observers given by Negash et al (2017), Pasqualetti et al (2012), and Zhou et al (2022), the observer (10) is not only designed for FDI attacks but also the unmeasurable velocity. Then, a controller without velocity information will be proposed in the next section.…”
Section: Fao Designmentioning
confidence: 99%
See 2 more Smart Citations
“…Remark 2. Differing from the FDI attacks estimation observers given by Negash et al (2017), Pasqualetti et al (2012), and Zhou et al (2022), the observer (10) is not only designed for FDI attacks but also the unmeasurable velocity. Then, a controller without velocity information will be proposed in the next section.…”
Section: Fao Designmentioning
confidence: 99%
“…Broadly speaking, typical cyber-attack manners can be roughly categorized into two kinds (Gu et al, 2021): one is the repressive attack to destroy the network connectivity or data availability, for example, denial of service (DoS) attacks (Biron et al, 2018; Huang and Karimi, 2021). The other one is the deception attack for the purpose of corrupting the factual information, such as false data injection (FDI) attacks (Gu et al, 2021; Jin and Haddad, 2020; Liu et al, 2021; Negash et al, 2017; Pasqualetti et al, 2012; Yang et al, 2022; Zhou et al, 2022) and replay attacks (Ye et al, 2019). Concerning the DoS attack, a non-fragile H control strategy is proposed for CACC systems in Huang and Karimi (2021), where the DoS attack is modeled as the packet loss with a sequence of binary random variables.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Although there are so many problems with the transmission over the network, one of the problems that affect the system most is the network attack. There are two main types of attacks: denial‐of‐service (DoS) attacks and false data injection (FDI) attacks 7,8 . Research on DoS attacks has been studied for many years 9‐16 .…”
Section: Introductionmentioning
confidence: 99%
“…There are two main types of attacks: denial-of-service (DoS) attacks and false data injection (FDI) attacks. 7,8 Research on DoS attacks has been studied for many years. 9-16 DoS attacks are usually handled in three ways: detection attacks, resistance attacks, and compensation attacks.…”
mentioning
confidence: 99%