Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2020
DOI: 10.1109/tifs.2019.2917373
|View full text |Cite
|
Sign up to set email alerts
|

Active Defense-Based Resilient Sliding Mode Control Under Denial-of-Service Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
33
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 112 publications
(33 citation statements)
references
References 42 publications
0
33
0
Order By: Relevance
“…Pre-and post-multiply  1 ,  2 and the transpositions to (48) and (49), respectively. At the same time, utilizing Φ −1 1 and its transposition to pre-and post-multiply (50) to (53). Define Φ −1…”
Section: Proof It Is Effortless To Derive Thatmentioning
confidence: 99%
See 1 more Smart Citation
“…Pre-and post-multiply  1 ,  2 and the transpositions to (48) and (49), respectively. At the same time, utilizing Φ −1 1 and its transposition to pre-and post-multiply (50) to (53). Define Φ −1…”
Section: Proof It Is Effortless To Derive Thatmentioning
confidence: 99%
“…▪ Remark 5. Conditions (48)(49)(50)(51)(52)(53) of Theorem 3 are sufficient criteria for designing containment controller in the form of LMIs. Notice that when we solve these LMIs of Theorem 3 by MATLAB, the computational complexity will not increase with the raise of the number of followers.…”
Section: Proof It Is Effortless To Derive Thatmentioning
confidence: 99%
“…The DoS switch sequences represent a transition from zero corresponding to attack occurrence, to one corresponding to no attacks. Vivid examples with reference to this process involving the active and silent subintervals of DoS attacks were properly depicted in ( Figure 2 in the work of De Persis and Tesi 7 and Figure 2 in the work of Wu et al 25 ). In that case, for the time interval [1,19), we can see n (1,19) = 3 while the number of total switchings is 5, which in turn verifies that the number of DoS attacks is not equal to the total switching times obviously.…”
Section: Assumptionmentioning
confidence: 99%
“…On account of the extensively practical applications, studies on adaptive trajectory tracking control design for uncertain nonlinear systems have made a major breakthrough, such as adaptive control, sliding mode control, robust control, fault tolerant control, and so on. In addition, backstepping‐based adaptive neural control and fuzzy control for nonlinear systems have been well studied in the past few years, in which fuzzy logic systems (FLSs) or neural networks (NNs) were viewed as universal approximators to identify the uncertain system nonlinearities, and then, an adaptive controller was designed by combining with the backstepping technique.…”
Section: Introductionmentioning
confidence: 99%