2023
DOI: 10.1109/tcns.2023.3269007
|View full text |Cite
|
Sign up to set email alerts
|

Secure Control of Markovian Jumping Systems Under Deception Attacks: An Attack-Probability-Dependent Adaptive Event-Triggered Mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 41 publications
0
4
0
Order By: Relevance
“…The consensus or synchronization problem has always been a central issue in MASs, aiming to achieve agreement among multiagents through communication. The issue of consensus in MASs has been extensively explored, including H ∞ consensus [4,5], event-triggered consensus [6][7][8], distributed consensus [9], finite/fixed-time consensus [10,11], and so on.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The consensus or synchronization problem has always been a central issue in MASs, aiming to achieve agreement among multiagents through communication. The issue of consensus in MASs has been extensively explored, including H ∞ consensus [4,5], event-triggered consensus [6][7][8], distributed consensus [9], finite/fixed-time consensus [10,11], and so on.…”
Section: Introductionmentioning
confidence: 99%
“…Signal quantization is a prevalent control strategy in digital communication for optimizing network communication resources. In practical applications, the eventtriggering mechanisms (ETMs) [6][7][8]11,[26][27][28][29] are instrumental in lowering communication burdens among multiagents and conserving network resources. Building upon this, MAS consensus has been studied by combining quantization strategies and ETMs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, the security control problem of SDC systems has been widely discussed by researchers. There are many types of cyber attacks, mainly including deception attacks [18][19][20][21], DoS attacks [22], and false data injection attacks (FDIA) [23][24][25]. Therein, FDIA, as a common type of attack, can destroy the integrity of communication data by sending error information to the receiver, thus causing unpredictable damage to the SDC system.…”
Section: Introductionmentioning
confidence: 99%