2022
DOI: 10.1109/tcyb.2021.3125851
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Event-Triggered Output Feedback Control for Networked Systems Subject to Multiple Cyber Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 105 publications
(35 citation statements)
references
References 33 publications
0
28
0
Order By: Relevance
“…Owing to the influence caused by the torus-event-based mechanism and the time delay, the fuzzy premise variables of  ∞ fuzzy controllers shown in (11) are not consistent with those of the networked T-S fuzzy system in (2). In other words, 𝜚 i (𝜔(t)) and 𝜚 j (𝜔(t k h)) are asynchronous.…”
Section: Fuzzy Control With Asynchronous Premise Variablesmentioning
confidence: 99%
See 2 more Smart Citations
“…Owing to the influence caused by the torus-event-based mechanism and the time delay, the fuzzy premise variables of  ∞ fuzzy controllers shown in (11) are not consistent with those of the networked T-S fuzzy system in (2). In other words, 𝜚 i (𝜔(t)) and 𝜚 j (𝜔(t k h)) are asynchronous.…”
Section: Fuzzy Control With Asynchronous Premise Variablesmentioning
confidence: 99%
“…The networked control systems (NCSs) are a class of integrated digital systems, where the control components such as plants, sensors, controllers, and actuators are connected via real-time communication network. 1,2 Compared with the traditional control systems based on a point-to-point connection, the NCSs have many advantages of easy installation and maintenance, low cost-effectiveness, as well as high flexibility and reliability. 3 Thanks to these distinctive advantages, the NCSs have been widely utilized in the fields of smart factory, telemedicine, remote monitoring, and so forth.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Owing to the system safety requirements, the estimator design confronting multiple cyber attacks is now attracting research. 40,41 Fortunately, the proposed IDB attack strategy in this article can be easily extended to the above case as follows:…”
Section: Important-data-based Attack Modelmentioning
confidence: 99%
“…Remark Owing to the system safety requirements, the estimator design confronting multiple cyber attacks is now attracting research 40,41 . Fortunately, the proposed IDB attack strategy in this article can be easily extended to the above case as follows: truey˜ifalse(kfalse)=false(1prefix−λifalse(kfalse)false)false(βifalse(kfalse)yifalse(kfalse)+false(1prefix−βifalse(kfalse)false)trueyifalse(kfalse)false),$$ {\tilde{y}}_i(k)=\left(1-{\lambda}_i(k)\right)\left({\beta}_i(k){y}_i(k)+\left(1-{\beta}_i(k)\right){\overline{y}}_i(k)\right), $$ where truey˜ifalse(kfalse)$$ {\tilde{y}}_i(k) $$ is the measurement that the estimator received and trueyk$$ {\overline{y}}_k $$ represents the deception attack data of the i$$ i $$th node.…”
Section: Complex Network and Idb Attack Modelmentioning
confidence: 99%