“…H∞ filtering and LMI Fading measurements [11,23] Quantization effects [74] Stochastic additive faults [15,28] Medium access constraints [14] Unknown transition probability [75] Comprehensive incomplete measurements [12,13,25,26] EM algorithm under the Bayesian framework Asynchronous measurements in distributed systems [54] Residual generating based on fault diagnosis filters and observers Additive faults & incomplete measurements [7,8,17,24,27,31,32,46,47] Attacks on sensors [73] Soft faults & packet dropouts [48] Actuator faults [42,45] Faulty periodic communication [30] Cyber attacks [39,76] Sliding mode observer Attacks on sensors [72] Unknown input observer False data injection attacks [35] Minimum-variance filtering and Kalman filtering Cyber attacks [20,37,64,70] Additive faults [49] Homomorphic encryption [77] Particle filtering Cyber attacks [41,69] Strong tracking filtering Packet dropouts [78] Distributed resilient filtering Sensor degradation [79] Self-learning approaches Additive sensor fault [71,75,…”