“…For example, in Reference
24, a
fuzzy filter for nonlinear NCSs (NNCSs) with quantization, event‐triggered and deception attacks was designed. The problem of sensor networks security distributed filter design with deception attacks was considered in References
25 and
26 addressed the security control problem based on the network protocol of the NNCSs under quantization and deception attacks. Through the description of the above literature, we can see the challenges and difficulties of state reconstruction brought by the introduction of privacy protection strategy.…”