2021
DOI: 10.1080/00207721.2021.1884917
|View full text |Cite
|
Sign up to set email alerts
|

Observer-based non-fragile H-consensus control for multi-agent systems under deception attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(6 citation statements)
references
References 54 publications
0
6
0
Order By: Relevance
“…Experiment results have shown that the proposed DOTLF outperforms some selected PLD methods under both normal and fault conditions. In the future, we aim to 1) optimize the source domain data to efficiently transfer detection knowledge [10], [19], [48], [55], [57]; and 2) design an advanced control strategy to further improve the detection accuracy and detection rate of the TL-LSTM-Ri-based PLD method [18], [21], [28], [50], [60].…”
Section: Discussionmentioning
confidence: 99%
“…Experiment results have shown that the proposed DOTLF outperforms some selected PLD methods under both normal and fault conditions. In the future, we aim to 1) optimize the source domain data to efficiently transfer detection knowledge [10], [19], [48], [55], [57]; and 2) design an advanced control strategy to further improve the detection accuracy and detection rate of the TL-LSTM-Ri-based PLD method [18], [21], [28], [50], [60].…”
Section: Discussionmentioning
confidence: 99%
“…In the context of state estimation for NCSs, it is often the case that the designed estimator gains cannot be exactly implemented due to various factors such as the aging of the devices, the finite word length in digital systems and the analogue‐digital conversion, and even a small fluctuation of the estimator gain could lead to dramatic deterioration of the algorithm performance. As such, the so‐called non‐fragile estimation problem has aroused much interest with several descriptions proposed on gain variations which include the norm‐bounded uncertainties 37,38 and the stochastic variables (with bounded variance) 39,40 . For instance, in Reference 40, the gain variations have been reflected in the estimator gains to model the computation/execution error, and the distributed resilient scheme has been developed to jointly estimate the actuator fault and the system state for a class of complex networks.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, in the above researches of containment control, the information communication are known as ideal. However, due to the openness and interconnectedness, communication channels between agents are vulnerable to various cyber attacks [22,23], for example, denial-of-service (DoS) attacks [24,25], and deception attacks [26,27]. When DoS attacks occur in MASs, the information communication between agents will be blocked [28,29], and when deception attacks occur in MASs, the authenticity and integrity of the information will be tampered with or destructed [30,31].…”
Section: Introductionmentioning
confidence: 99%