2022
DOI: 10.1016/j.isatra.2022.03.012
|View full text |Cite
|
Sign up to set email alerts
|

Security control for nonlinear systems under quantization and Round-Robin protocol subject to deception attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 41 publications
0
6
0
Order By: Relevance
“…1. It is different from the existing fuzzy systems 21,[24][25][26][27][28] and IT2 fuzzy systems. [29][30][31][32][33][34][35] The uncertainty of nonlinear systems was considered from two aspects, that is, the uncertainty of MFs and norm-bounded uncertainty.…”
mentioning
confidence: 84%
See 1 more Smart Citation
“…1. It is different from the existing fuzzy systems 21,[24][25][26][27][28] and IT2 fuzzy systems. [29][30][31][32][33][34][35] The uncertainty of nonlinear systems was considered from two aspects, that is, the uncertainty of MFs and norm-bounded uncertainty.…”
mentioning
confidence: 84%
“…For example, in Reference 24, a H$$ {H}_{\infty } $$ fuzzy filter for nonlinear NCSs (NNCSs) with quantization, event‐triggered and deception attacks was designed. The problem of sensor networks security distributed filter design with deception attacks was considered in References 25 and 26 addressed the security control problem based on the network protocol of the NNCSs under quantization and deception attacks. Through the description of the above literature, we can see the challenges and difficulties of state reconstruction brought by the introduction of privacy protection strategy.…”
Section: Introductionmentioning
confidence: 99%
“…Remark Although some secure control method for T‐S fuzzy systems with limited networked resources and cyber attacks can be found in the existing literature, the discussed problem in this paper is distinct from these publications 16,23,30 . In Reference 16, a secure control method for T‐S fuzzy systems is proposed under consideration of quantization and RR protocol.…”
Section: Problem Descriptionmentioning
confidence: 98%
“…Although some secure control method for T-S fuzzy systems with limited networked resources and cyber attacks can be found in the existing literature, the discussed problem in this paper is distinct from these publications. 16,23,30 In Reference 16, a secure control method for T-S fuzzy systems is proposed under consideration of quantization and RR protocol. In References 23 and 30, for T-S fuzzy systems, the authors discussed the secure control problem against cyber-attacks by introducing event-triggered schemes to avoid waste of network resources.…”
Section: Outlier-resistant Observed-based Controllermentioning
confidence: 99%
See 1 more Smart Citation