2023
DOI: 10.1109/tsmc.2022.3203176
|View full text |Cite
|
Sign up to set email alerts
|

Robust Adaptive Safety-Critical Control for Unknown Systems With Finite-Time Elementwise Parameter Estimation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 43 publications
0
4
0
Order By: Relevance
“…Edge computing helps on-board Artificial Intelligence processing for faster decision making and greater independence. These AI systems have fail-safe mechanisms which hold safety in high regards (Wang, et al, 2023). 2.…”
Section: Concept Of Autonomous Carsmentioning
confidence: 99%
“…Edge computing helps on-board Artificial Intelligence processing for faster decision making and greater independence. These AI systems have fail-safe mechanisms which hold safety in high regards (Wang, et al, 2023). 2.…”
Section: Concept Of Autonomous Carsmentioning
confidence: 99%
“…Control barrier function (CBF) is an effective way to deal with safety control problem of dynamic systems. 22 CBF combines the state constraints of the system into the controller design, which can ensure the safety of the system. 23 Fruitful results have been achieved in this field.…”
Section: Introductionmentioning
confidence: 99%
“…To deal with the problem of information safety when information interaction in MASs, many strategies about how to solve the problem of agents have been proposed 37 . These strategies of proposing privacy protection can be divided into three categories.…”
Section: Introductionmentioning
confidence: 99%
“…To deal with the problem of information safety when information interaction in MASs, many strategies about how to solve the problem of agents have been proposed. 37 These strategies of proposing privacy protection can be divided into three categories. The one category is the differential privacy, this approach works by decaying the transmitted information with noise, and the observer then establishes the original information to a pre-specified level of accuracy, 38 the authors proposed a algorithm to achieve minimum privacy breach by adding and subtracting random noises.…”
Section: Introductionmentioning
confidence: 99%