J Wang, X Deng, J Guo, Z Zeng - Sensors, 2023 - mdpi.com
Due to the openness of communication network and the complexity of system structures, multi-agent systems are vulnerable to malicious network attacks, which can cause intense …
C Wang, Z Wang, H Dong - IEEE/ASME Transactions on …, 2023 - ieeexplore.ieee.org
This article is concerned with weak-shot learning, a practical yet challenging scenario in transfer learning where only a limited amount of weakly labeled data are available in the …
C Gao, D Zhao, J Li, H Lin - Information Fusion, 2024 - Elsevier
This paper addresses the differentially private bipartite consensus control problem for general linear discrete-time multi-agent systems (MASs), where the initial states of the …
This paper examines a nonlinear Networked Control System (NCS) incorporating Takagi– Sugeno (T–S) fuzzy models to address the output tracking control problem in the presence …
Y Luo, Z Wang, J Hu, H Dong… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this article, the security-guaranteed fuzzy networked state estimation issue is investigated for a class of two-dimensional (2-D) systems with norm-bounded disturbances. Considering …
J Yang, Y Chen, L Ma, J Yang - Journal of the Franklin Institute, 2024 - Elsevier
This paper considers the regional stabilization problem for networked T–S fuzzy systems with communication delays and actuator saturations under the event-triggered mechanism …
Q Li, J Liang, W Gong, K Wang, J Wang - Mathematics and Computers in …, 2024 - Elsevier
This paper tackles the problem of nonfragile state estimation for semi-Markovian switching complex-valued networks with time-varying delay. The concerned transition rates of the semi …
Y Wang, Z Wang, L Zou, L Ma… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This article investigates the ultimately bounded proportional–integral–derivative (PID) control problem for a class of discrete-time Takagi–Sugeno fuzzy systems subject to …
Z Hu, K Chen, F Deng, S Luo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this article, the stochastic analysis and controller design problems of networked systems with packet dropouts and false data injection attacks are investigated. Different from the …