2022
DOI: 10.1109/tcsii.2022.3178881
|View full text |Cite
|
Sign up to set email alerts
|

Event-Triggered MFAC of Nonlinear NCSs Against Sensor Faults and DoS Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…In Reference 36, by using a discrete‐time model to describe the DoS attacks, two static ETSs with different thresholds were designed to switch the situations where the DoS attacks occur or not. In Reference 37, a model free adaptive controller was proposed based on ETS for nonlinear NCSs subjected to sensor failures and DoS attacks. By considering dual‐terminal DoS attacks and time‐delay, the switching rate was used to design the ETS to cope with the switching system 38 .…”
Section: Introductionmentioning
confidence: 99%
“…In Reference 36, by using a discrete‐time model to describe the DoS attacks, two static ETSs with different thresholds were designed to switch the situations where the DoS attacks occur or not. In Reference 37, a model free adaptive controller was proposed based on ETS for nonlinear NCSs subjected to sensor failures and DoS attacks. By considering dual‐terminal DoS attacks and time‐delay, the switching rate was used to design the ETS to cope with the switching system 38 .…”
Section: Introductionmentioning
confidence: 99%
“…There are also many papers applying NNs and ILC to MFAC [26], [28]- [31]. In [30], [31], the MFAC is used to solve the problem of imprecise model and NNs is used to estimate the sensor error.…”
Section: Introductionmentioning
confidence: 99%
“…There are also many papers applying NNs and ILC to MFAC [26], [28]- [31]. In [30], [31], the MFAC is used to solve the problem of imprecise model and NNs is used to estimate the sensor error. The network computation in these papers is set up in the cloud due to high computing burden, but there is also a hidden danger of cyber attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Cyberattacks are regarded as a process that aims to reduce the reliability of the network and jam the transmission of data, thereby degrading system normal performance. There are common attacks such as DoS attacks, 30,31 deception attacks, 32,33 and replay attacks 34 . In Reference 35, it studies $$ {\mathscr{H}}_{\infty } $$ control problem for discrete‐time T‐S fuzzy MJSs with aperiodic DoS attacks.…”
Section: Introductionmentioning
confidence: 99%