Security of networked control systems subject to deception attacks: A survey

ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …

Resilient consensus control for multi-agent systems: A comparative survey

J Wang, X Deng, J Guo, Z Zeng - Sensors, 2023 - mdpi.com
Due to the openness of communication network and the complexity of system structures,
multi-agent systems are vulnerable to malicious network attacks, which can cause intense …

A novel prototype-assisted contrastive adversarial network for weak-shot learning with applications: Handling weakly labeled data

C Wang, Z Wang, H Dong - IEEE/ASME Transactions on …, 2023 - ieeexplore.ieee.org
This article is concerned with weak-shot learning, a practical yet challenging scenario in
transfer learning where only a limited amount of weakly labeled data are available in the …

Ultimately bounded PID control for TS fuzzy systems under FlexRay communication protocol

Y Wang, Z Wang, L Zou, L Ma… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This article investigates the ultimately bounded proportional–integral–derivative (PID)
control problem for a class of discrete-time Takagi–Sugeno fuzzy systems subject to …

Security-guaranteed fuzzy networked state estimation for 2-D systems with multiple sensor arrays subject to deception attacks

Y Luo, Z Wang, J Hu, H Dong… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this article, the security-guaranteed fuzzy networked state estimation issue is investigated
for a class of two-dimensional (2-D) systems with norm-bounded disturbances. Considering …

Controller Design for Networked Systems With Two-Channel Packet Dropouts and FDI Attacks

Z Hu, K Chen, F Deng, S Luo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this article, the stochastic analysis and controller design problems of networked systems
with packet dropouts and false data injection attacks are investigated. Different from the …

Nonfragile state estimation for semi-Markovian switching CVNs with general uncertain transition rates: An event-triggered scheme

Q Li, J Liang, W Gong, K Wang, J Wang - Mathematics and Computers in …, 2024 - Elsevier
This paper tackles the problem of nonfragile state estimation for semi-Markovian switching
complex-valued networks with time-varying delay. The concerned transition rates of the semi …

A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber–Physical Networks

Y Wan, J Cao - Sensors, 2023 - mdpi.com
Complex cyber–physical networks combine the prominent features of complex networks and
cyber–physical systems (CPSs), and the interconnections between the cyber layer and …

Private bipartite consensus control for multi-agent systems: A hierarchical differential privacy scheme

C Gao, D Zhao, J Li, H Lin - Information Fusion, 2024 - Elsevier
This paper addresses the differentially private bipartite consensus control problem for
general linear discrete-time multi-agent systems (MASs), where the initial states of the …

Aperiodic intermittent sampling for nonlinear discrete-time event-based model predictive control

Z Luo, B Zhu - International Journal of Systems Science, 2024 - Taylor & Francis
In this article, an aperiodic intermittent sampling method is designed in event-based model
predictive control for nonlinear discrete systems subject to external disturbances. The …