2021
DOI: 10.1002/rnc.5554
|View full text |Cite
|
Sign up to set email alerts
|

Neural‐network‐based distributed security filtering for networked switched systems

Abstract: In this paper, distributed security filtering is investigated for networked switched systems under the round‐robin protocol (RRP). In order to fully take the practical situation into account, a cyber attack without additional bounded constraint is considered by introducing the neural network approximate technique. Moreover, the scattered sensor nodes are universally utilized to transmit and collect system information. The distributed filtering is proposed for the networked switched systems to estimate the syst… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…Remark 3: This paper is different from the existing results [35], [36] in the following two aspects:…”
Section: Resultsmentioning
confidence: 61%
See 1 more Smart Citation
“…Remark 3: This paper is different from the existing results [35], [36] in the following two aspects:…”
Section: Resultsmentioning
confidence: 61%
“…The reference [35] has studied the neural networks-based security control problem for stochastic system under mixed attacks. The reference [36] has developed neural networks distributed security filters for networked switching systems in the presence of deception attacks. As we can see, neural networks-based security control issues have paid little attention to discrete-time networked singular systems under deception attacks, which inspires our interest.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, some existing research results have approximated deception attack signals with NN techniques. The authors investigated the filtering problem of networked switched systems by approximating deception attacks with these techniques [14] . The event-triggered mechanism was designed based on NN, and the deception attacks were approximated by NN, which solved the security control problem [15] .…”
Section: Introductionmentioning
confidence: 99%
“…A switched system is presented by a family of subsystems and a commen law between them 1‐3 . In the past few years, the dynamics of switched systems have exerted much attention owning to their extensive applications in all kinds of fields, such as networked control systems, 4 multiagent systems, 5 communication systems 6 . On the other hand, as a fundamental property of danymic systems, it is inevitable to encountere time delays in modes describing engineering process, and they will cause destabilizing factors.…”
Section: Introductionmentioning
confidence: 99%