• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4607996)   Today's Articles (2185)   Subscriber (49375)
For: Liu J, Wang Y, Cao J, Yue D, Xie X. Secure Adaptive-Event-Triggered Filter Design With Input Constraint and Hybrid Cyber Attack. IEEE Trans Cybern 2021;51:4000-4010. [PMID: 32886621 DOI: 10.1109/tcyb.2020.3003752] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Number Cited by Other Article(s)
1
Cheng Z, Yang L, Yuan Q, Long Y, Ren H. Distributed Consensus Estimation for Networked Multi-Sensor Systems under Hybrid Attacks and Missing Measurements. SENSORS (BASEL, SWITZERLAND) 2024;24:4071. [PMID: 39000850 PMCID: PMC11244270 DOI: 10.3390/s24134071] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 05/07/2024] [Revised: 05/30/2024] [Accepted: 06/20/2024] [Indexed: 07/16/2024]
2
Liu X, Yang GH. Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation. IEEE TRANSACTIONS ON CYBERNETICS 2024;54:3577-3587. [PMID: 37768802 DOI: 10.1109/tcyb.2023.3312346] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/30/2023]
3
Sun Y, Ju Y, Ding D, Liu H. Distributed H filtering of replay attacks over sensor networks. ISA TRANSACTIONS 2023;141:113-120. [PMID: 37156690 DOI: 10.1016/j.isatra.2023.04.018] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/03/2022] [Revised: 04/05/2023] [Accepted: 04/14/2023] [Indexed: 05/10/2023]
4
Qu F, Tian E, Zhao X. Chance-Constrained H State Estimation for Recursive Neural Networks Under Deception Attacks and Energy Constraints: The Finite-Horizon Case. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2023;34:6492-6503. [PMID: 34995198 DOI: 10.1109/tnnls.2021.3137426] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/14/2023]
5
Lian Z, Shi P, Lim CC, Yuan X. Fuzzy-Model-Based Lateral Control for Networked Autonomous Vehicle Systems Under Hybrid Cyber-Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2023;53:2600-2609. [PMID: 35286271 DOI: 10.1109/tcyb.2022.3151880] [Citation(s) in RCA: 3] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/14/2023]
6
Du D, Zhang C, Li X, Fei M, Yang T, Zhou H. Secure Control of Networked Control Systems Using Dynamic Watermarking. IEEE TRANSACTIONS ON CYBERNETICS 2022;52:13609-13622. [PMID: 34543220 DOI: 10.1109/tcyb.2021.3110402] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
7
Zha L, Liao R, Liu J, Xie X, Tian E, Cao J. Dynamic Event-Triggered Output Feedback Control for Networked Systems Subject to Multiple Cyber Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2022;52:13800-13808. [PMID: 34797773 DOI: 10.1109/tcyb.2021.3125851] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
8
Zha L, Liao R, Liu J, Cao J, Xie X. Dynamic event-triggered security control of cyber-physical systems against missing measurements and cyber-attacks. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2022.05.096] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
9
Event-based security tracking control for networked control systems against stochastic cyber-attacks. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.08.085] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
10
Deng Y, Lu H, Zhou W. Security Event-Triggered Filtering for Delayed Neural Networks Under Denial-of-Service Attack and Randomly Occurring Deception Attacks. Neural Process Lett 2022. [DOI: 10.1007/s11063-022-10860-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 09/29/2022]
11
Liu Y, Zhu Q, Zhao N. Event-triggered adaptive fuzzy control for switched nonlinear systems with state constraints. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2021.01.030] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA