[1] |
王领, 申晓红, 康玉柱, 等. 水声传感器网络信号到达时间差目标定位的最小二乘法估计性能[J]. 兵工学报, 2020, 41(3):542-551.
doi: 10.3969/j.issn.1000-1093.2020.03.015
|
|
WANG L, SHEN X H, KANG Y Z, et al. Least squares estimation performance for TDOA target localization in underwater acoustic sensor networks[J]. Acta Armamentarii, 2020, 41(3): 542-551. (in Chinese)
doi: 10.3969/j.issn.1000-1093.2020.03.015
|
[2] |
崔令飞, 郭永红, 修全发, 等. 基于国产嵌入式智能计算平台的无人机检测方法[J]. 兵工学报, 2022, 43(增刊1): 146-154.
|
|
CUI L F, GUO Y H, XIU Q F, et al. UAV detection method based on domestic embedded intelligent computing platform[J]. Acta Armamentarii, 2022, 43(S1):146-154. (in Chinese)
doi: 10.12382/bgxb.2022.A013
|
[3] |
刘烃, 田决, 王稼舟, 等. 信息物理融合系统综合安全威胁与防御研究[J]. 自动化学报, 2019, 45(1): 5-24.
|
|
LIU T, TIAN J, WANG J Z, et al. Integrated security threats and defense of cyber-physical systems[J]. Acta Automatica Sinica, 2019, 45(1): 5-24. (in Chinese)
|
[4] |
LIAN Y D, YANG Q F, XIE W, et al. Cyber-physical system-based heuristic planning and scheduling method for multiple automatic guided vehicles in logistics systems[J]. IEEE Transactions on Industrial Informatics, 2020, 17(11):7882-7893.
doi: 10.1109/TII.2020.3034280
URL
|
[5] |
SHEN Z Y, DING F, JOLFAEI A, et al. DeformableGAN: generating medical images with improved integrity for healthcare cyber physical systems[J]. IEEE Transactions on Network Science and Engineering, 2022(Early Access):1-13.
|
[6] |
ABDELMAWGOUD A, JAMSHIDI M, BENAVIDEZ P. Distributed estimation in multimissile cyber-physical systems with time delay[J]. IEEE Systems Journal, 2020, 14(1): 1491-1502.
doi: 10.1109/JSYST.4267003
URL
|
[7] |
WANG H J, ZHAO H T, ZHANG J, et al. Survey on unmanned aerial vehicle networks: a cyber physical system perspective[J]. IEEE Communications Surveys & Tutorials, 2019, 22(2): 1027-1070.
|
[8] |
ALREFAEI F, ALZAHRANI A, SONG H, et al. Cyber physical systems, a new challenge and security issue for the aviation[C]// Proceeding of the 2021 IEEE International IOT, Electronics and Mechatronics Conference. Toronto,ON, Canada: IEEE, 2021:1-5.
|
[9] |
PONGSAKORNSATHIEN N, LIM Y, GARDI A, et al. Sensor networks for aerospace human-machine systems[J]. Sensors, 2019, 19(16): 3465.
doi: 10.3390/s19163465
URL
|
[10] |
CHEN G D, LIU Y, YAO D Y, et al. Event-triggered tracking control of nonlinear systems under sparse attacks and its application to rigid aircraft[J]. IEEE Transactions on Aerospace and Electronic Systems, 2023, 59(4): 4640-4650.
doi: 10.1109/TAES.2023.3246436
URL
|
[11] |
DENG C, GUO F H, WEN C Y, et al. Distributed resilient secondary control for DC microgrids against heterogeneous communication delays and DoS attacks[J]. IEEE Transactions on Industrial Electronics, 2021, 69(11):11560-11568.
doi: 10.1109/TIE.2021.3120492
URL
|
[12] |
HUANG X, DONG J X. Reliable cooperative control and plug-and-play operation for networked heterogeneous systems under cyber-physical attacks[J]. ISA Transactions, 2020, 104: 62-72.
doi: S0019-0578(19)30461-6
pmid: 31690455
|
[13] |
LI X L, WEN C Y, CHEN C. Adaptive formation control of networked robotic systems with bearing-only measurements[J]. IEEE Transactions on Cybernetics, 2020, 51(1): 199-209.
doi: 10.1109/TCYB.6221036
URL
|
[14] |
WU G Y, SUN J, CHEN J. Optimal data injection attacks in cyber-physical systems[J]. IEEE Transactions on Cybernetics, 2018, 48(12): 3302-3312.
doi: 10.1109/TCYB.2018.2846365
pmid: 29994695
|
[15] |
李小杭, 张志虎, 宋春林, 等. 虚假数据注入攻击下的自适应补偿控制[J]. 兵工学报, 2020, 41(11):2260-2265.
doi: 10.3969/j.issn.1000-1093.2020.11.013
|
|
LI X H, ZHANG Z H, SONG C L, et al. Adaptive compensation control under false data injection attack[J]. Acta Armamentarii, 2020, 41(11): 2260-2265. (in Chinese)
doi: 10.3969/j.issn.1000-1093.2020.11.013
|
[16] |
HUANG X, DONG J X. An adaptive secure control scheme for T-S fuzzy systems against simultaneous stealthy sensor and actuator attacks[J]. IEEE Transactions on Fuzzy Systems, 2020, 29(7):1978-1991.
doi: 10.1109/TFUZZ.2020.2990772
URL
|
[17] |
HUANG X, DONG J X. Robust dynamic actuator failure compensation control of nonlinear systems via cooperative interaction design[J]. IEEE Transactions on Cybernetics, 2021, 52(7):6013-6023.
doi: 10.1109/TCYB.2021.3049508
URL
|
[18] |
EDWARDS C, SPURGEON S K, PATTON R J. Sliding mode observers for fault detection and isolation[J]. Automatica, 2000, 36(4): 541-553.
doi: 10.1016/S0005-1098(99)00177-6
URL
|
[19] |
DONG J X, HOU J T. Output feedback fault-tolerant control by a set-theoretic description of T-S fuzzy systems[J]. Applied Mathematics and Computation, 2017, 301:117-134.
doi: 10.1016/j.amc.2016.12.017
URL
|
[20] |
TORRES I, AVILES J D. Observer-based sensor fault detection in a dark fermenter for hydrogen production[J]. IEEE Control Systems Letters, 2020, 5(5):1621-1626.
doi: 10.1109/LCSYS.7782633
URL
|
[21] |
SUN Y S, JI Z J, QI Q Y, et al. Bipartite consensus of multi-agent systems with intermittent interaction[J]. IEEE Access, 2019, 7:130300-130311.
doi: 10.1109/ACCESS.2019.2940541
|
[22] |
WANG J R, HONG Y T, WANG J L, et al. Cooperative and competitive multi-agent systems:from optimization to games[J]. IEEE/CAA Journal of Automatica Sinica, 2022, 9(5):763-783.
doi: 10.1109/JAS.2022.105506
URL
|
[23] |
ZHAO M, PENG C, TIAN E G. Finite-time and fixed-time bipartite consensus tracking of multi-agent systems with weighted antagonistic interactions[J]. IEEE Transactions on Circuits and Systems I:Regular Papers, 2020, 68(1): 426-433.
doi: 10.1109/TCSI.8919
URL
|
[24] |
李洪阳, 魏慕恒, 黄洁, 等. 信息物理系统技术综述[J]. 自动化学报, 2019, 45(1):37-50.
|
|
LI H Y, WEI M H, HUANG J, et al. Overview of cyber-physical system technology[J]. Acta Automatica Sinica, 2019, 45(1): 37-50. (in Chinese)
|
[25] |
TEIXEIRA A, SHAMES I, SANDBERG H, et al. A secure control framework for resource-limited adversaries[J]. Automatica, 2015, 51:135-148.
doi: 10.1016/j.automatica.2014.10.067
URL
|
[26] |
LIAN Y D, YANG Q F, XIE W, et al. Cyber-physical system-based heuristic planning and scheduling method for multiple automatic guided vehicles in logistics systems[J]. IEEE Transactions on Industrial Informatics, 2020, 17(11):7882-7893.
doi: 10.1109/TII.2020.3034280
URL
|
[27] |
CROSBY G V, PISSINOU N, GADZE J. A framework for trust-based cluster head election in wireless sensor networks[C]// Proceeding of the Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems. Columbia, MD,US:IEEE, 2006.
|
[28] |
LI Y Z, SHI L, CHEN T W. Detection against linear deception attacks on multi-sensor remote state estimation[J]. IEEE Transactions on Control of Network Systems, 2017, 5(3):846-856.
doi: 10.1109/TCNS.2017.2648508
URL
|
[29] |
TEIXEIRA A, SHAMES I, SANDBERG H, et al. A secure control framework for resource-limited adversaries[J]. Automatica, 2015, 51:135-148.
doi: 10.1016/j.automatica.2014.10.067
URL
|
[30] |
HE W L, GAO X Y, ZHONG W, et al. Secure impulsive synchronization control of multi-agent systems under deception attacks[J]. Information Sciences, 2018, 459:354-368.
doi: 10.1016/j.ins.2018.04.020
URL
|
[31] |
HUANG X, DONG J X. Reliable leader-to-follower formation control of multiagent systems under communication quantization and attacks[J]. IEEE Transactions on Systems, Man, and Cybernetics:Systems, 2019, 50(1):89-99.
doi: 10.1109/TSMC.6221021
URL
|
[32] |
KHALIL H K. Nonlinear systems[M]. 3rd ed. London,UK: Prentice-Hall, 2002:175-180.
|