2021
DOI: 10.1109/tfuzz.2020.2983904
|View full text |Cite
|
Sign up to set email alerts
|

Event-Based Impulsive Control of IT2 T–S Fuzzy Interconnected System Under Deception Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(21 citation statements)
references
References 52 publications
0
21
0
Order By: Relevance
“…Literature [ 22 ] assumes that the process of packet loss obeys independent distribution, analyzes the influence of packet loss rate on the dynamic performance of single-input single-output control system by power spectral density method, and gives the upper bound of data loss rate to maintain certain dynamic characteristics. As per literature [ 23 ], under the constraint of information rate, the stability of WNCS with time-varying transmission period is studied, the sufficient conditions to ensure the stable transmission period of the system are derived, and the upper bound of the transmission period is determined by the exhaustive method. Literature [ 24 ] proposed a dynamic programming method in the process of solving multilevel decision-making problems.…”
Section: Related Workmentioning
confidence: 99%
“…Literature [ 22 ] assumes that the process of packet loss obeys independent distribution, analyzes the influence of packet loss rate on the dynamic performance of single-input single-output control system by power spectral density method, and gives the upper bound of data loss rate to maintain certain dynamic characteristics. As per literature [ 23 ], under the constraint of information rate, the stability of WNCS with time-varying transmission period is studied, the sufficient conditions to ensure the stable transmission period of the system are derived, and the upper bound of the transmission period is determined by the exhaustive method. Literature [ 24 ] proposed a dynamic programming method in the process of solving multilevel decision-making problems.…”
Section: Related Workmentioning
confidence: 99%
“…A j = P 2 Âj P −1 3 P T 2 , B j = P 2 Bj , C j = Ĉj P −1 3 P T 2 , D j = Dj P −1 3 P T 2 . Bringing them into Equations ( 20)-( 22), we can obtain Equations ( 33)- (35). By using Schur Complement Lemma, the matrix P is equivalent to P 1 − P 2 P −1 3 P T 2 = P 1 − Y > 0.…”
Section: Fault Diagnosis Filter Designmentioning
confidence: 99%
“…When this issue is considered, the general T-S fuzzy modeling scheme cannot achieve the desired results [15]. The IT2 fuzzy model was developed because of its good proxy for nonlinear systems with parameter uncertainty [29][30][31][32][33][34][35][36][37]. The problem of the FD filtering method is proposed with event-based, which is the application in IT2 fuzzy theory under the framework of networked timedelay control systems [29].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Compared to the aforementioned two forms of cyber-attacks, the deception attack is difficult to detect and prevent [48]. Therefore, much effort has been devoted to alleviating the negative impacts from deception attack, and great progress has been made in recent years [49][50][51][52].…”
Section: Introductionmentioning
confidence: 99%