2022
DOI: 10.1109/tsmc.2020.3003801
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Control of Second-Order Nonlinear Systems With Injection and Deception Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
26
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 78 publications
(32 citation statements)
references
References 46 publications
0
26
0
Order By: Relevance
“…Consider the solvable parameters P and Ψ in Theorem 2. The states of system (1) will be driven onto the sliding region under the condition of security SMC law (8) with χ satisfying…”
Section: Reachability Of Sliding Surfacementioning
confidence: 99%
See 1 more Smart Citation
“…Consider the solvable parameters P and Ψ in Theorem 2. The states of system (1) will be driven onto the sliding region under the condition of security SMC law (8) with χ satisfying…”
Section: Reachability Of Sliding Surfacementioning
confidence: 99%
“…In fact, the false data injection attacks are recognized as a typical representative of deception attacks. Recently, a wonderful amount of significant research works have been developed for the corresponding security control system with deception attacks [6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…The decentralized adaptive control issue is investigated for cyber physical systems subject to intermittent DoS attacks in Reference 37. The adaptive control problem is addressed for systems with nonlinear dynamics in Reference 38 and the hybrid attacks including deception and injection attacks are also considered. Unfortunately, to our best knowledge, there are relatively few researches on ILC subject to DoS attacks under the networked environment.…”
Section: Introductionmentioning
confidence: 99%
“…When there exist deception attacks in networks, the transmitted data packet cannot reach processor for calculation accurately. Then, these malicious data may further damage system performance and even paralyze the system operation [32], [33]. Compared with deception attacks, the latter mainly injects a large number of useless data packets to interrupt normal communication.…”
Section: Introductionmentioning
confidence: 99%