2021
DOI: 10.1016/j.isatra.2020.10.050
|View full text |Cite
|
Sign up to set email alerts
|

Dual-terminal decentralized event-triggered control for switched systems with cyber attacks and quantization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
10
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(10 citation statements)
references
References 27 publications
0
10
0
Order By: Relevance
“…For the switched systems with partly unstabilizable subsystems affected by jamming attacks, Reference 29 designs an observer‐based controller, but quantization is not discussed. Based on the event‐triggered mechanism, a decentralized quantized controller is proposed in Reference 30 to guarantee the stability of the switched systems with cyber attacks. However, Reference 30 does not relate to unstabilizable subsystems, and a logarithmic quantizer with infinite quantization level is used.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For the switched systems with partly unstabilizable subsystems affected by jamming attacks, Reference 29 designs an observer‐based controller, but quantization is not discussed. Based on the event‐triggered mechanism, a decentralized quantized controller is proposed in Reference 30 to guarantee the stability of the switched systems with cyber attacks. However, Reference 30 does not relate to unstabilizable subsystems, and a logarithmic quantizer with infinite quantization level is used.…”
Section: Introductionmentioning
confidence: 99%
“…Based on the event‐triggered mechanism, a decentralized quantized controller is proposed in Reference 30 to guarantee the stability of the switched systems with cyber attacks. However, Reference 30 does not relate to unstabilizable subsystems, and a logarithmic quantizer with infinite quantization level is used. This article will adopt an uniform quantizer with finite quantization level.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, for the case where communication networks exist in both sensor‐to‐controller (SC) channel and controller‐to‐actuator (CA) channel, integrating data quantization, and ETM in both channels is a feasible solution for reducing additional network resources. However, all the related works (for example, References 22–24) employ SETM rather than the better‐performing DETM, which is wasteful from a resource conservatism perspective. Therefore, there is plenty of room for improvement.…”
Section: Introductionmentioning
confidence: 99%
“…It is worth noting that the LMIs often contain a series of tunning parameters that need to be preset, and their selection greatly affects the feasibility of the LMIs. However, many works configure these parameters based on experience (for example, References 23–25), which inevitably limits the performance of the results. For some simple problems, the empirical design may suffice.…”
Section: Introductionmentioning
confidence: 99%
“…Jamming attacks were also studied in [20]. Event-triggered communication and decentralized control of switched systems under cyber attacks are analyzed in [21]; in particular, conditions on the dwell-time and the gain for the controller are derived to ensure stability. Other lines of work have studied the robustness properties with respect to attacks of different (discrete-time) optimization algorithms; e.g., [22,23,24].…”
Section: Introductionmentioning
confidence: 99%