The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2023
DOI: 10.1002/rnc.6684
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive containment control of nonlinear multi‐agent systems about privacy preservation with multiple attacks

Abstract: Summary This paper focuses on the problem of adaptive containment control about privacy preservation in nonlinear multi‐agent systems, where followers suffer from multiple cyber‐attacks and leaders have non‐zero control inputs. A multiple attacks mold consisting of denial‐of‐service (DoS) attacks and false data‐injection attacks is constructed for nonlinear systems. The containment control protocol is updated by applying an event‐triggered scheme. This scheme is proposed to dispatch the updating information in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 44 publications
0
5
0
Order By: Relevance
“…Theorem 1. For UAV formation (2), the prescribed performance function is chosen as (10) and (11), the error transformation function is presented in (13), and the distributed finite-time containment tracking control inputs u f i and u f j are designed in (26) and (28). Given a positive constant 𝛾, if there exist matrices K L , K F and positive definite matrices P, Q, which satisfies…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Theorem 1. For UAV formation (2), the prescribed performance function is chosen as (10) and (11), the error transformation function is presented in (13), and the distributed finite-time containment tracking control inputs u f i and u f j are designed in (26) and (28). Given a positive constant 𝛾, if there exist matrices K L , K F and positive definite matrices P, Q, which satisfies…”
Section: Resultsmentioning
confidence: 99%
“…Lemma 1 (28). From Assumption 1, all eigenvalues of L 11 and L 22 have positive real parts, and each entry of −L −1 22 L 21 is nonnegative.…”
Section: The Establishment Of the Uav Formation Modelmentioning
confidence: 96%
“…To be specific, the proposed controller (9) is updated at a lower frequency than those in References 16–18. On the other hand, mechanism (10) allows the triggering instant to occur at the sampling instant, which overcomes the uninterrupted judgment of triggering conditions in References 26,27 and avoids the Zeno behavior naturally.…”
Section: Secure Group Consensus With Replay Attacksmentioning
confidence: 99%
“…Fortunately, the development of event‐triggered control (ETC) provides a direction to solve the problem, 24,25 that is, sampling actions are taken when the triggering function exceeds a certain threshold. Under the appropriate ETC strategies, the single and multiple attacks were handled respectively in References 26 and 27,28 for nonlinear MASs, however, the above work needs to monitor the triggering function in real time and proves that no Zeno behavior occurs. Notably, the periodic event‐triggered (PET) control combines the advantages of sampled‐data control and ETC, which periodically detects the triggering function at sampling instants, thereby avoiding Zeno behavior in nature 29 .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation