2020
DOI: 10.1016/j.jfranklin.2019.09.002
|View full text |Cite
|
Sign up to set email alerts
|

Event-triggered finite-time H∞ filtering for networked systems under deception attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 51 publications
(21 citation statements)
references
References 33 publications
0
21
0
Order By: Relevance
“…Theorem 2. For given positive scalars 𝛼, 𝛽, s, h, 𝜇 i , 𝜔, 𝜑 1 , T and matrices K 𝜙 , F 𝜙 , R 𝜙 , J i > 0, the augmented system (11) and ( 12) is H ∞ FTB with (𝜑 1 , 𝜑 2 , T, J i , 𝛾, 𝜔) if there exist positive scalars 𝜚 p (p = 1, 2, 3, 4, 5), 𝜆, 𝜑 2 , 𝛾 and matrices…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Theorem 2. For given positive scalars 𝛼, 𝛽, s, h, 𝜇 i , 𝜔, 𝜑 1 , T and matrices K 𝜙 , F 𝜙 , R 𝜙 , J i > 0, the augmented system (11) and ( 12) is H ∞ FTB with (𝜑 1 , 𝜑 2 , T, J i , 𝛾, 𝜔) if there exist positive scalars 𝜚 p (p = 1, 2, 3, 4, 5), 𝜆, 𝜑 2 , 𝛾 and matrices…”
Section: Resultsmentioning
confidence: 99%
“…The modes of the system and estimator are given in Figure 1. Under the obtained triggering matrices and the estimator gains in (48), the state response is shown in Figure 2, from which one can see that the augmented system (11) and ( 12) is H ∞ FTB. Under the AETS, the transmitting instants of modes 1-3 are illustrated in Figure 3, 13% sampled instants are released by the event generator.…”
Section: Numerical Examplesmentioning
confidence: 99%
See 1 more Smart Citation
“…There are many forms of cyber‐attacks, and they fall into two main categories: denial of service (DoS) attacks and deception attacks (including replay and false data injection attacks). The DoS attacks cause data loss by jamming wireless communication channels 9‐11 and the deception attacks interfere with network communication by injecting duplicate or spurious data, 12‐15 both of which deteriorate systems' security.…”
Section: Introductionmentioning
confidence: 99%
“…Cyber attacks are classified into three types: repeated attack, denial of service attack, and deception attack, in which the biggest threat to network security is deception attacks. Some interesting results associated with deception attacks have been given [31][32][33][34]. For instance, a secure filter is devised for the delayed stochastic nonlinear systems with a novel multiple-channel attack model [33].…”
Section: Introductionmentioning
confidence: 99%