2022
DOI: 10.1016/j.ins.2022.09.018
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive non-singular finite time control of nonlinear disturbed cyber-physical systems with actuator cyber-attacks and time-varying delays

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

3
5

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 39 publications
0
11
0
Order By: Relevance
“…36,37 The SMC essential properties are the suitable response, the robustness versus parametric uncertainties, and computational simplicity in comparison with other robust control approaches. [38][39][40] The design procedure of conventional SMC has been segregated to two phases as: reaching phase and switching phase. In the reaching phase, the control law is specified to oblige the system state variables to follow the determined sliding surface.…”
Section: Background and Motivationmentioning
confidence: 99%
“…36,37 The SMC essential properties are the suitable response, the robustness versus parametric uncertainties, and computational simplicity in comparison with other robust control approaches. [38][39][40] The design procedure of conventional SMC has been segregated to two phases as: reaching phase and switching phase. In the reaching phase, the control law is specified to oblige the system state variables to follow the determined sliding surface.…”
Section: Background and Motivationmentioning
confidence: 99%
“…Because of lengthy information communication, the inherent time delay within the communication channel is negligible [42,43]. Master-slave synchronization [44] and stability analysis of the teleoperation systems under various time delays such as constant delay [11], time-variable delays [45,46] and random delays [47] are considered as interesting topics in the field of teleoperation systems.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, some effective and robust control strategies that are not targeted at CAVs also need to be further studied and are worthy of being applied to deal with CAV cyberattacks [ 15 , 16 ], but we will not make a further detailed summary here.…”
Section: Introductionmentioning
confidence: 99%